Scraping Airlines Bots: Insights Obtained Studying Honeypot Data

Author:

Chiapponi ElisaORCID,Dacier MarcORCID,Catakoglu Onur,Thonnard Olivier,Todisco MassimilianoORCID

Abstract

Airline websites are the victims of unauthorised online travel agencies and aggregators that use armies of bots to scrape prices and flight information. These so-called Advanced Persistent Bots (APBs) are highly sophisticated. On top of the valuable information taken away, these huge quantities of requests consume a very substantial amount of resources on the airlines' websites. In this work, we propose a deceptive approach to counter scraping bots. We present a platform capable of mimicking airlines' sites changing prices at will. We provide results on the case studies we performed with it. We have lured bots for almost 2 months, fed them with indistinguishable inaccurate information. Studying the collected requests, we have found behavioural patterns that could be used as complementary bot detection. Moreover, based on the gathered empirical pieces of evidence, we propose a method to investigate the claim commonly made that proxy services used by web scraping bots have millions of residential IPs at their disposal. Our mathematical models indicate that the amount of IPs is likely 2 to 3 orders of magnitude smaller than the one claimed. This finding suggests that an IP reputation-based blocking strategy could be effective, contrary to what operators of these websites think today.

Publisher

Concept Tech Publishing

Reference47 articles.

1. Web runner 2049: Evaluating third-party anti-bot services

2. The Bait and Switch Honeypot. (n.d.)

3. Automatic extraction of indicators of compromise for web applications

4. Cheswick, B. (1992). An evening with berferd in which a cracker is lured, endured, and studied. In Proc. Winter USENIX Conference (pp. 20-24). San Francisco, CA, USA.

5. Chiapponi, E., Catakoglu, O., Thonnard, O., & Dacier, M. (2020). HoPLA: a Honeypot Platform to Lure Attackers. In Computer & Electronics Security Applications Rendez-vous, Deceptive security Conference (C&ESAR 2020), part of European Cyber Week. Rennes, France.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Inside Residential IP Proxies: Lessons Learned from Large Measurement Campaigns;2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2023-07

2. ImMuNE: Improved Multilateration in Noisy Environments;2022 IEEE 11th International Conference on Cloud Networking (CloudNet);2022-11-07

3. An industrial perspective on web scraping characteristics and open issues;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2022-06

4. BADPASS: Bots Taking ADvantage of Proxy as a Service;Information Security Practice and Experience;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3