AN ANALYTICAL STUDY AND SYNTHESIS ON WEB SERVER SECURITY
AbstractWeb servers are being as a viable means to access Internet-based applications. Latest Approaches to secure Web servers are not much efficient or robust enough to protect and their applications from hackers. There are several approaches and analogies to examine the minimum-security requirements of a system. But The Highly efficient Techniques approaches as Protection profile, a systematic approach Therefore, we derive the Web security components that make a secure Web server from the Web Server Protection Profile. Study of A component-based framework as well as an open source solution has been done subsequently in this paper We believe that after the studying of such a system (implemented and deployed later), it will function reliably and effectively. This work aims at establishing the provable reliability of construction and the feasibility of component-based solutions for the secure Web server. This paper gives a theoretical approach and analogy of Profiling a web server including All three basic security models together( System security, Transmission security & Access Control System)etc.
. Dustin Lee, Jeff Rowe, Calvin Ko, Karl Levitt," Detecting and Defending againstWeb-Server Fingerprinting.
. Aviel D. Rubin (AT&T Labs), Daniel E. Geer Jr. Certco,"A Servey of Web Security .
. A.D. Rubin, D. Geer, and M.J. Ranum, Web Security Sourcebook, John Wiley & Sons, New York, 1997.
. Jared Karro, Jie Wang," Protecting Web Servers from Security Holes in Server-Side Includes.
. Sheng-Kang Lin ," From Web Server Security to Web Components Security.
. Christian Gilmore, David Kormann, and Aviel D. Rubin â€•Secure Remote Access to an Internal Web Server,â€– IEEE Network, Val. 13, Issue 6, pp. 31-37, Nov.lDec., 1999.
. Dustin Lee, Jeff Rowe, Calvin KO, & Karl Levitt, detecting & defending against web server Fingerprinting, II In the 18-Annual Computer security Application Conference (ACSACâ€™OZj, pp. 321-330, Dec. 9. 2002).
. 8) S. Jiang, S. Smith, and K. Minami, â€•Securing Web Servers against Insider Attack,â€– In the 17â€—h Annual Computer Security Applications Conference (ACSACâ€˜OI j, pp. 265-276,
. Jane Curry.â€Methods of monitoring processes with Zenoss Draft. www.skills-1st.co.uk
. JJ.G. Steiner, C. NEuman & J.I. Schiller-Kerberos: An Authenticatin service for open Network Systems, II Proc. Winter 1988 general Conf. USENIX Assoc., Berkeley, Calif. 1988, pp. 191-202.
. M.K. Reiter and A.D. Rubin, â€•Crowds: Anonymous nWeb Transactions,â€– ACM Trans. Information Systems Security, Apr. 1998; see also http://www.research.att. com/projects/crowds.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.