Network Security and Cryptography |
Foundation of Computer Science USA |
NSC - Number 2 |
December 2011 |
Authors: K. Sivakumar, Anil. K. Sarje, K. Garg |
e5a6fb20-6bb1-4317-a5a9-8c032a1f62c7 |
K. Sivakumar, Anil. K. Sarje, K. Garg . �Yukti�: A Dynamic Agents Based IDS with Suspect Engine to Detect Diverse XSS Attacks. Network Security and Cryptography. NSC, 2 (December 2011), 20-27.
Injecting malicious script through links, URLs (Unified resource locator) or as user inputs and getting it executed (when inputs are not validated) in the client side is called cross site scripting (XSS) attack. It is called XSS because the script that is executed here is not originated from the same client or from a trusted server. Our solution “Yukti” is devised to detect these application specific XSS attacks at network level by deep packet inspection in the live environment. Existing solutions do static security code review or scans the application for known attack patterns. “Yukti’ is dynamic as the suspect engine in the solution is unique and has the capability to suspect a new attack pattern. If the suspect is analyzed to be true, the rule that would detect the attack is built into rule base dynamically. This paper discusses the design, components, architecture, dependencies, techniques, implementation and analysis of results obtained. Our results show that out of huge test cases (70000- both XSS and Non XSS) the solution is able to detect 28546 numbers of XSS attacks initially (before appending new rules in detection engine). After appending new rules based on recommendations from suspect engine, it is able to detect 32363 XSS. Yukti demonstrates considerable improvement in the performance when analyzed with leading IDS engine SNORT while detecting XSS attacks.