Cargando…

Web Runner 2049: Evaluating Third-Party Anti-bot Services

Given the ever-increasing number of malicious bots scouring the web, many websites are turning to specialized services that advertise their ability to detect bots and block them. In this paper, we investigate the design and implementation details of commercial anti-bot services in an effort to under...

Descripción completa

Detalles Bibliográficos
Autores principales: Amin Azad, Babak, Starov, Oleksii, Laperdrix, Pierre, Nikiforakis, Nick
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338186/
http://dx.doi.org/10.1007/978-3-030-52683-2_7
_version_ 1783554630116966400
author Amin Azad, Babak
Starov, Oleksii
Laperdrix, Pierre
Nikiforakis, Nick
author_facet Amin Azad, Babak
Starov, Oleksii
Laperdrix, Pierre
Nikiforakis, Nick
author_sort Amin Azad, Babak
collection PubMed
description Given the ever-increasing number of malicious bots scouring the web, many websites are turning to specialized services that advertise their ability to detect bots and block them. In this paper, we investigate the design and implementation details of commercial anti-bot services in an effort to understand how they operate and whether they can effectively identify and block malicious bots in practice. We analyze the JavaScript code which their clients need to include in their websites and perform a set of gray box and black box analyses of their proprietary back-end logic, by simulating bots utilizing well-known automation tools and popular browsers. On the positive side, our results show that by relying on browser fingerprinting, more than 75% of protected websites in our dataset, successfully defend against attacks by basic bots built with Python scripts or PhantomJS. At the same time, by using less popular browsers in terms of automation (e.g., Safari on Mac and Chrome on Android) attackers can successfully bypass the protection of up to 82% of protected websites. Our findings show that the majority of protected websites are prone to bot attacks and the existing anti-bot solutions cannot substantially limit the ability of determined attackers. We have responsibly disclosed our findings with the anti-bot service providers.
format Online
Article
Text
id pubmed-7338186
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73381862020-07-07 Web Runner 2049: Evaluating Third-Party Anti-bot Services Amin Azad, Babak Starov, Oleksii Laperdrix, Pierre Nikiforakis, Nick Detection of Intrusions and Malware, and Vulnerability Assessment Article Given the ever-increasing number of malicious bots scouring the web, many websites are turning to specialized services that advertise their ability to detect bots and block them. In this paper, we investigate the design and implementation details of commercial anti-bot services in an effort to understand how they operate and whether they can effectively identify and block malicious bots in practice. We analyze the JavaScript code which their clients need to include in their websites and perform a set of gray box and black box analyses of their proprietary back-end logic, by simulating bots utilizing well-known automation tools and popular browsers. On the positive side, our results show that by relying on browser fingerprinting, more than 75% of protected websites in our dataset, successfully defend against attacks by basic bots built with Python scripts or PhantomJS. At the same time, by using less popular browsers in terms of automation (e.g., Safari on Mac and Chrome on Android) attackers can successfully bypass the protection of up to 82% of protected websites. Our findings show that the majority of protected websites are prone to bot attacks and the existing anti-bot solutions cannot substantially limit the ability of determined attackers. We have responsibly disclosed our findings with the anti-bot service providers. 2020-06-11 /pmc/articles/PMC7338186/ http://dx.doi.org/10.1007/978-3-030-52683-2_7 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Amin Azad, Babak
Starov, Oleksii
Laperdrix, Pierre
Nikiforakis, Nick
Web Runner 2049: Evaluating Third-Party Anti-bot Services
title Web Runner 2049: Evaluating Third-Party Anti-bot Services
title_full Web Runner 2049: Evaluating Third-Party Anti-bot Services
title_fullStr Web Runner 2049: Evaluating Third-Party Anti-bot Services
title_full_unstemmed Web Runner 2049: Evaluating Third-Party Anti-bot Services
title_short Web Runner 2049: Evaluating Third-Party Anti-bot Services
title_sort web runner 2049: evaluating third-party anti-bot services
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338186/
http://dx.doi.org/10.1007/978-3-030-52683-2_7
work_keys_str_mv AT aminazadbabak webrunner2049evaluatingthirdpartyantibotservices
AT starovoleksii webrunner2049evaluatingthirdpartyantibotservices
AT laperdrixpierre webrunner2049evaluatingthirdpartyantibotservices
AT nikiforakisnick webrunner2049evaluatingthirdpartyantibotservices