WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning

01/07/2020
by   Luca Demetrio, et al.
0

Web Application Firewalls are widely used in production environments to mitigate security threats like SQL injections. Many industrial products rely on signature-based techniques, but machine learning approaches are becoming more and more popular. The main goal of an adversary is to craft semantically malicious payloads to bypass the syntactic analysis performed by a WAF. In this paper, we present WAF-A-MoLE, a tool that models the presence of an adversary. This tool leverages on a set of mutation operators that alter the syntax of a payload without affecting the original semantics. We evaluate the performance of the tool against existing WAFs, that we trained using our publicly available SQL query dataset. We show that WAF-A-MoLE bypasses all the considered machine learning based WAFs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/19/2019

VizWiz Dataset Browser: A Tool for Visualizing Machine Learning Datasets

We present a visualization tool to exhaustively search and browse throug...
research
06/22/2020

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications

SQL injection (SQLi) attacks pose a significant threat to the security o...
research
09/14/2022

Collaborative SQL-injections detection system with machine learning

Data mining and information extraction from data is a field that has gai...
research
08/09/2023

Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning

ModSecurity is widely recognized as the standard open-source Web Applica...
research
02/01/2020

Alias Resolution Based on ICMP Rate Limiting

Alias resolution techniques (e.g., Midar) associate, mostly through acti...
research
01/29/2020

A4 : Evading Learning-based Adblockers

Efforts by online ad publishers to circumvent traditional ad blockers to...

Please sign up or login with your details

Forgot password? Click here to reset