Avoiding Zombies in Archival Replay Using ServiceWorker
نویسندگان
چکیده
A Composite Memento is an archived representation of a web page with all the page requisites such as images and stylesheets. All embedded resources have their own URIs, hence, they are archived independently. For a meaningful archival replay, it is important to load all the page requisites from the archive within the temporal neighborhood of the base HTML page. To achieve this goal, archival replay systems try to rewrite all the resource references to appropriate archived versions before serving HTML, CSS, or JS. However, an effective server-side URL rewriting is difficult when URLs are generated dynamically using JavaScript. A failure of correct URL rewriting might yield an invalid/unintended URI or resolve to a live resource. Such live resources, leaking in a composite memento, are called “zombies”. ServiceWorker (SW) is a new client-side web API [2] that can be used to intercept all the network requests for embedded resources originating from web pages in its scope. We use SW API to reconstruct composite mementos from the originally captured data without any URL rewriting. By intercepting requests on the client-side, we are essentially rerouting instead of rewriting. Rerouting is an effective mechanism to block zombies, as it takes effect when the user-agent resolves a reference. Figure 1 illustrates how our SW implementation, reconstructive.js, intercepts a live leakage and reroutes it correctly to the corresponding archived copy. To evaluate the archival replay reconstruction quality we created the Archival Capture Replay Test Suite (ACRTS) with different scenarios of how a web page might initiate a network request. We archived ACRTS and saved the resulting Web ARChive (WARC) file. We then changed the live ACRTS site in a way that all the resource references remained the same, but their content was changed. Using various replay systems we loaded the archived ACRTS from the stored
منابع مشابه
Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
متن کاملFact-Checking of Reports in Kalamat-e Anjoman Using Archival Documents on the History of Kashan during the Qajar Era
This research aims to do a content review on the materials printed and published in “Kalamat-e Anjoman” about the history of Kashan. This study also assesses these materials using archival documents in order to confirm or refute the contents. This research used a descriptive/analytical method and the data were obtained from “Kalamat-e Anjoman” and archival documents. Findings show that Abdolras...
متن کاملDetection of NAD(P)H: Quinone Oxidoreductase 609C T Polymorphism in Blood and Archival Human Tissues Using a Simple PCR Method
متن کامل
Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model
A DDoS attacker attempts to disrupt a target, by flooding it with illegitimate packets which are generated from a large number of zombies, usurping its bandwidth and overtaxing it to prevent legitimate inquiries from getting through. This paper reports the evaluation results of proposed approach that is used to predict number of zombies using Pace Regression Model. A relationship is established...
متن کاملDeteriorating Distributed Denial of Service Attack by Recovering Zombies Using Penalty Scheme
Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence there is not yet a proper method to make the zombies accountable to the economical loss materialized as the effects of highly zombie oriented DDoS attacks. Therefore th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017