Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be manipulable by the clients (e.g., the frontend code can be modified to bypass some validation steps), which incurs the runtime anomaly when operating the web service. Existing state-of-the-art anomaly detectors largely learn a deep learning model from the collected logs to predict abnormal logs with a probability. While effective in general, those approaches can suffer from (1) inaccuracy caused by subtle difference between the normal and abnormal/attack logs and (2) additional efforts for root cause analysis. In this work, we propose WebNorm, an anomaly detection ap- proach to detect and explain the attack-caused anomalies on web applications in a unified way. Our rationale lies in learning the behaviorial normalities of a running web application as invariants. The normalities are designed regarding data normality (e.g., what information must be consistent across different events), flow nor- mality (e.g., what events must happen under certain circumstances), and common-sense normality (e.g., what is the normal range of some parameters). The violation of the invariants indicates both the alarm and its explanation. WebNorm first monitors the normal behaviors of subject application and captures its information flows between entities such as frontend, service, and database. Then, it learns the behaviorial normalities in terms of logical rules so that it can detect and explain behaviorial anomaly by the inconsistency between the learned normalities and the runtime application be- haviors. We model the invariants as first-order logics, transferrable to executable Python scripts to generate alarm with explainable root cause. Our extensive experiment shows that, on detecting the tamper attacks on the web applications as TrainTicket and NiceFish. WebNorm improves the precision and the recall of the baselines such as LogAnomaly, LogRobust, DeepLog, NeuralLog, PLELog, ReplicaWatcher by more than 56.1% and 35.1% respectively, serving as a new state-of-the-art anomaly detection solution.
Wed 30 OctDisplayed time zone: Pacific Time (US & Canada) change
13:30 - 15:00 | Anomaly and fault detectionResearch Papers / NIER Track at Compagno Chair(s): Xing Hu Zhejiang University | ||
13:30 15mTalk | SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice Research Papers Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China | ||
13:45 15mTalk | ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems Research Papers Yongqian Sun Nankai University, Binpeng Shi Nankai University, Mingyu Mao Nankai University, Minghua Ma Microsoft Research, Sibo Xia Nankai University, Shenglin Zhang Nankai University, Dan Pei Tsinghua University | ||
14:00 15mTalk | Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality Research Papers Yifan Liao Shanghai Jiao Tong University / National University of Singapore, Ming Xu Shanghai Jiao Tong University / National University of Singapore, Yun Lin Shanghai Jiao Tong University, Xiwen Teoh National University of Singapore, Xiaofei Xie Singapore Management University, Ruitao Feng Singapore Management University, Frank Liauw Government Technology Agency Singapore, Hongyu Zhang Chongqing University, Jin Song Dong National University of Singapore DOI Pre-print | ||
14:15 15mTalk | End-to-End AutoML for Unsupervised Log Anomaly Detection Research Papers Shenglin Zhang Nankai University, Yuhe Ji Nankai University, Jiaqi Luan Nankai University, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Zi`ang Cheng Nankai University, Minghua Ma Microsoft Research, Yongqian Sun Nankai University, Dan Pei Tsinghua University | ||
14:30 10mTalk | Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network NIER Track Yuanlin Li Tsinghua University, Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Hai Wan Tsinghua University, Xibin Zhao Tsinghua University | ||
14:40 10mTalk | A vision on a methodology for the application of an Intrusion Detection System for satellites NIER Track Sébastien Gios UCLouvain, Charles-Henry Bertrand Van Ouytsel UCLouvain, Mark Diamantino Caribé Telespazio - ESA, Axel Legay Université Catholique de Louvain, Belgium DOI |