skip to main content
10.5555/1972441.1972452guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Inflight modifications of content: who are the culprits?

Published: 29 March 2011 Publication History

Abstract

When a user requests content from a cloud service provider, sometimes the content sent by the provider is modified inflight by third-party entities. To our knowledge, there is no comprehensive study that examines the extent and primary root causes of the content modification problem. We design a lightweight experiment and instrument a vast number of clients in the wild to make two additional DNS queries every day. We identify candidate rogue servers and develop a measurement methodology to determine, for each candidate rogue server, whether the server is performing inflight modifications or not. In total, we discover 349 servers as malicious, that is, as modifying content inflight, and more than 1.9% of all US clients are affected by these malicious servers. We investigate the root causes of the problem. We identify 9 ISPs, whose clients are predominately affected. We find that the root cause is not sophisticated transparent in-network services, but instead local DNS servers in the problematic ISPs.

References

[1]
Beware the Bahama Botnet. http://blog.clickforensics.com/?p=314.
[2]
Google Public DNS. code.google.com/speed/public-dns/.
[3]
Summary of ASes. http://bgp.potaroo.net/cidr/autnums.html.
[4]
Wireshark. www.wireshark.org.
[5]
BOLIN, M., WEBBER, M., RHA, P., WILSON, T., AND MILLER, R. C. Automation and Customization of Rendered Web Pages. In Proceedings of the 18th annual ACM symposium on User interface software and technology (2005), UIST '05.
[6]
CASADO, M., AND FREEDMAN, M. J. Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification. In 4th USENIX Symposium on Networked Systems Design & Implementation (2007), NSDI '07.
[7]
DAGON, D., PROVOS, N., LEE, C., AND LEE, W. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. In Proceedings of The 15th Annual Network and Distributed System Security Symposium (2008), NDSS '08.
[8]
GENNARO, R., AND ROHATGI, P. How to Sign Digital Streams. Inf. Comput. 165 (February 2001), 100-116.
[9]
GUHA, S., CHENG, B., AND FRANCIS, P. Challenges in measuring online advertising systems. In Proceedings of the 10th annual conference on Internet measurement (2010), IMC '10.
[10]
HUANG, C., MALTZ, D. A., GREENBERG, A., AND LI, J. Public DNS System and Global Traffic Management. In IEEE INFOCOM (2011).
[11]
KICIMAN, E., AND LIVSHITS, B. AjaxScope: A Platform for RemotelyMonitoring the Client-side Behavior of Web 2.0 Applications. In 21st ACM SIGOPS symposium on Operating systems principles (2007), SOSP '07.
[12]
KOUNAVIS, M., KANG, X., GREWAL, K., ESZENYI, M., GUERON, S., AND DURHAM, D. Encrypting the Internet. In ACM SIGCOMM (2010).
[13]
KREIBICH, C., WEAVER, N., NECHAEV, B., AND PAXSON, V. Netalyzr: Illuminating the Edge Network. In Proceedings of the 10th annual conference on Internet measurement (2010), IMC '10.
[14]
REIS, C., GRIBBLE, S. D., WEAVER, N. C., AND KOHNO, T. Automation and Customization of Rendered Web Pages Detecting In-Flight Page Changes with Web Tripwires, 2008.
[15]
RESCORLA, E. SSL and TLS: Designing and Building Secure Systems. Addison Wesley, 2010.
[16]
VRATONJIC, N., FREUDIGER, J., AND HUBAUX, J.-P. Integrity of the Web Content: The Case of Online Advertising. In Usenix CollSec'10 (2010).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
LEET'11: Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
March 2011
11 pages

Sponsors

  • Google Inc.

Publisher

USENIX Association

United States

Publication History

Published: 29 March 2011

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media