Online Submission!

Open Journal Systems

AN ANALYTICAL STUDY AND SYNTHESIS ON WEB SERVER SECURITY

Jyoti Pandey, Manoj Jain

Abstract


Web servers are being as a viable means to access Internet-based applications. Latest Approaches to secure Web servers are not much efficient or robust enough to protect and their applications from hackers. There are several approaches and analogies to examine the minimum-security requirements of a system. But The Highly efficient Techniques approaches as Protection profile, a systematic approach Therefore, we derive the Web security components that make a secure Web server from the Web Server Protection Profile. Study of A component-based framework as well as an open source solution has been done subsequently in this paper We believe that after the studying of such a system (implemented and deployed later), it will function reliably and effectively. This work aims at establishing the provable reliability of construction and the feasibility of component-based solutions for the secure Web server. This paper gives a theoretical approach and analogy of Profiling a web server including All three basic security models together( System security, Transmission security & Access Control System)etc.

Full Text:

PDF

References


. Dustin Lee, Jeff Rowe, Calvin Ko, Karl Levitt," Detecting and Defending againstWeb-Server Fingerprinting.

. Aviel D. Rubin (AT&T Labs), Daniel E. Geer Jr. Certco,"A Servey of Web Security .

. A.D. Rubin, D. Geer, and M.J. Ranum, Web Security Sourcebook, John Wiley & Sons, New York, 1997.

. Jared Karro, Jie Wang," Protecting Web Servers from Security Holes in Server-Side Includes.

. Sheng-Kang Lin ," From Web Server Security to Web Components Security.

. Christian Gilmore, David Kormann, and Aviel D. Rubin ―Secure Remote Access to an Internal Web Server,‖ IEEE Network, Val. 13, Issue 6, pp. 31-37, Nov.lDec., 1999.

. Dustin Lee, Jeff Rowe, Calvin KO, & Karl Levitt, detecting & defending against web server Fingerprinting, II In the 18-Annual Computer security Application Conference (ACSAC’OZj, pp. 321-330, Dec. 9. 2002).

. 8) S. Jiang, S. Smith, and K. Minami, ―Securing Web Servers against Insider Attack,‖ In the 17‗h Annual Computer Security Applications Conference (ACSAC‘OI j, pp. 265-276,

. Jane Curry.”Methods of monitoring processes with Zenoss Draft. www.skills-1st.co.uk

. JJ.G. Steiner, C. NEuman & J.I. Schiller-Kerberos: An Authenticatin service for open Network Systems, II Proc. Winter 1988 general Conf. USENIX Assoc., Berkeley, Calif. 1988, pp. 191-202.

. M.K. Reiter and A.D. Rubin, ―Crowds: Anonymous nWeb Transactions,‖ ACM Trans. Information Systems Security, Apr. 1998; see also http://www.research.att. com/projects/crowds.




DOI: http://dx.doi.org/10.6084/ijact.v4i4.120

Refbacks

  • There are currently no refbacks.




Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"