Puppetnets: misusing web browsers as a distributed attack infrastructure

  • Authors:
  • V. T. Lam;S. Antonatos;P. Akritidis;K. G. Anagnostakis

  • Affiliations:
  • Institute for Infocomm Research, Singapore;FORTH-ICS and University of Crete, Greece;FORTH-ICS, Greece;Institute for Infocomm Research, Singapore

  • Venue:
  • Proceedings of the 13th ACM conference on Computer and communications security
  • Year:
  • 2006

Quantified Score

Hi-index 0.02

Visualization

Abstract

Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attacking third parties. Specifically, we look at how the existing Web infrastructure (e.g., the languages, protocols, and security policies) can be exploited by malicious Web sites to remotely instruct browsers to orchestrate actions including denial of service attacks, worm propagation and reconnaissance scans. We show that, depending mostly on the popularity of a malicious Web site and user browsing patterns, attackers are able to create powerful botnet-like infrastructures that can cause significant damage. We explore the effectiveness of countermeasures including anomaly detection and more fine-grained browser security policies.