Supercharge Your Innovation With Domain-Expert AI Agents!

CSRFToken defense system and method for CSRF attack

A defense system and attacker's technology, applied in the field of network communication, can solve the problems of inaccurate identification of CSRF vulnerabilities, large impact of CSRF attacks, and inability to truly protect against CSRF attacks, and achieve fast and efficient CSRF vulnerabilities, protection against CSRF vulnerabilities, and convenient development and The effect of maintainers

Active Publication Date: 2018-01-26
NANJING UNIV
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] CSRF attacks are relatively hidden. Under normal circumstances, the user visits a webpage carefully constructed by the attacker, or clicks on an unknown network link, and the attack takes effect. The attacker is like a hunter, first looking for easy-to-set traps Whether it is a cross-domain or same-domain website (looking for an occasion); then forges a request to set a trap (waiting for prey) in a relatively hidden occasion, and finally waits for the user to click a link or visit a certain webpage to cause the attack to take effect (successful capture); regardless of the Internet Whether the user actively clicks on a malicious link or visits a webpage unintentionally, it is possible to enter the CSRF trap carefully designed by the attacker
[0007] CSRF attacks are highly concealed, destructive, and easily overlooked. How to effectively identify and locate CSRF attack points becomes very important. If these points that can be attacked can be quickly found, software architects can prevent them from the design. Software development engineers can also carry out targeted protection, and software test engineers can also perform targeted CSRF attack verification tests, thereby eliminating potential CSRF threats and providing a relatively safe Internet environment for network users. Unfortunately, currently There is no specific and accurate tool for scanning CSRF attack vulnerabilities on the market. At the same time, since CSRF attacks are mostly artificially designed traps, the identification and positioning of CSRF are very weak through the current tools for scanning or penetration attacks based on pattern matching. , taking static scanning tools such as Coverity and JTest as examples, these tools can easily scan out XSS attacks, but they are basically powerless against CSRF attacks, while security dynamic penetration tools such as AppScan, ZAP, etc., can easily penetrate SQL Injection or XSS attacks, but only a small amount of CSRF attacks can be scanned, and the scanned results need to be manually analyzed to see if the scanned results are correct, and a large number of CSRF vulnerabilities cannot be accurately identified. So far, there is no one on the market. The tool can accurately identify and locate CSRF attacks
[0008] Due to the great impact of CSRF attacks, the research on the defense of CSRF attacks mainly includes the following aspects; early developers believe that the reason why CSRF attacks can be successful is that the attacker simulates an executable URL, and the parameters in this URL They are all displayed in the address bar of the browser, which is very convenient for attackers to forge the same URL to attack, but developers soon found that this protection only slightly increases the threshold for attackers, in fact, as long as there is a little HTML web programming foundation It is very easy for people to change Get to Post to send out, so this kind of protection can not really protect against CSRF attacks, but only increases the threshold of attacks; in addition, HTTP Referer header protection is proposed, and early developers think that CSRF can happen , mainly due to cross-domain forged URL requests, which lead to successful CSRF attacks, so programmers think that checking the HTTP Referer header will be a very effective way to avoid CSRF attacks. As long as the linked domain is inconsistent with the original domain of the website, it will not be allowed Its access, so that it can prevent CSRF attacks. This method can indeed have a certain protective effect, but the current browser Referer header can be tampered with, and the Referer header in the pop-up window is often empty, which leads to the Referer header. There are flaws in the solution. At the same time, the Referer header can only prevent cross-domain attacks, and it can’t do anything to CSRF attacks in the same domain. Another solution is to install a plug-in in the browser. This plug-in is used to limit which sites can jump and which The site cannot be redirected. Many security engineers and programmers think this is a good method. You don’t need to change the code of each application. As long as the browser adds a plug-in to do this, all problems can be solved, but this The problem is that not all users know that this plug-in needs to be installed in the browser to access the Internet. In addition, even if the plug-in is installed, ordinary users do not know how to set it up, because browser plug-in protection can only prevent cross-domain CSRF attacks. Attacks in the same domain cannot be protected. At the same time, the client plug-in is easily disabled by other programs. Once the plug-in is disabled, this protection is useless; it is also proposed that each key operation requires user confirmation, or secondary authentication (possibly Graphical verification code, SMS verification code, payment password, etc.), for example, you may need to log in again when you need to check out. At present, Amazon adopts this method. For example, you need to enter the payment password when you finally check out. Currently, Alipay adopts this method, such as when paying online banking. , the system will send a text message to the user to confirm the payment behavior, such as key operations, requiring the user to enter a graphic verification code or select a suitable graphic (12306 ticket purchase), etc. If the user does not confirm further, the corresponding operation cannot be performed. This can prevent users from performing some key operations in the case of ignorance. These designs can indeed remind users and prevent some Unnecessary losses, but at the same time bring inconvenience to user operations; there is also a proposal to use CSRFToken for protection, because CSRFToken is always changing, and the attacker cannot predict it, so it can ensure that each key link cannot be constructed by the attacker. CSRF attacks can be protected. This solution is currently the most widely used by major software companies in CSRF protection. It is considered to be the safest solution without changing user behavior or increasing the burden of frequent user authentication. However, based on CSRFToken protection needs to first consider how to generate CSRFToken. At the same time, it is necessary to consider when CSRFToken is generated and when to verify CSRFToken. The existing technology basically brings and verifies CSRFToken in every step, which requires an additional database for effective support. , used to save and verify CSRFToken, which will greatly increase additional overhead and increase the input cost of the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CSRFToken defense system and method for CSRF attack
  • CSRFToken defense system and method for CSRF attack
  • CSRFToken defense system and method for CSRF attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make those skilled in the art better understand the technical scheme of the present invention, the present invention will be further described below in conjunction with embodiment:

[0041] Such as figure 1 As shown, the CSRFToken defense system of a CSRF attack of the present invention includes an HTTP request information collection module 101, a user identity authentication module 102, a user authority authorization module 103, a Csrftoken-verify-list.xml module 104, and a CSRFTokenManager module 105.

[0042] Wherein TTP request information collection module 101, the URL that the user visits certain website sends data to server by Get or Post request;

[0043] User identity authentication module 102, the server end carries out the authentication of user identity, confirms whether this user has logged in;

[0044] User authority authorization module 103, whether the server end authorizes the user to allow access to specific functions;

[0045] Csrftoken-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a CSRFToken defense system and method for a CSRF attack. The CSRFToken defense system and method for the CSRF attack comprises an HTTP request information collection module, a user identity authentication module, a user authority authorization module, a Csrftoken-verify-list.xml module and a CSRFTokenManager module. A performance request of a user can be prevented, the CSRFattack can be effectively identified, the CSRF attack can be defended, and the effective protection can be achieved efficiently and rapidly.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a CSRF Token defense system and method for CSRF attacks. Background technique [0002] With the development of science and technology, various existing network applications are prevalent, and security attacks at the level of web applications are gradually occupying the mainstream. Cross-site request forgery (CSRF) has been ranked among the top ten web security attacks in the past ten years from 2007 to 2017 because of its strong attack concealment and great harm. It poses a great threat to the life and property safety of Internet users. However, At present, both manual and automated detection lack accurate identification of CSRF vulnerabilities. There are also many CSRF defense methods, but most of them are suitable for specific occasions, and it is difficult to obtain comprehensive protection, making this kind of attack hard to prevent. [0003] The idea of ​​CSRF...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 聂长海王顺
Owner NANJING UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More