An Analytical Study and Synthesis on Web server Security

Authors

  • Pandey J
  • Jain M

Keywords:

Adjustable, Open Source, Protection Profile, Security, Web Server, Web Component

Abstract

Web servers are being as a viable means to access Internet-based applications. Latest Approaches to secure Web servers are not much efficient or robust enough to protect and their applications from hackers. There are several approaches and analogies to examine the minimum-security requirements of a system. But The Highly efficient Techniques approaches as Protection profile, a systematic approach Therefore, we derive the Web security components that make a secure Web server from the Web Server Protection Profile. Study of A component-based framework as well as an open source solution has been done subsequently in this paper We believe that after the studying of such a system (implemented and deployed later), it will function reliably and effectively. This work aims at establishing the provable reliability of construction and the feasibility of component-based solutions for the secure Web server. This paper gives a theoretical approach and analogy of Profiling a web server including All three basic security models together( System security, Transmission security & Access Control System)etc.

References

. Dustin Lee, Jeff Rowe, Calvin Ko, Karl Levitt," Detecting and Defending againstWeb-Server Fingerprinting.

. Aviel D. Rubin (AT&T Labs), Daniel E. Geer Jr. Certco,"A Servey of Web Security .

. A.D. Rubin, D. Geer, and M.J. Ranum, Web Security Sourcebook, John Wiley & Sons, New York, 1997.

. Jared Karro, Jie Wang," Protecting Web Servers from Security Holes in Server-Side Includes.

. Sheng-Kang Lin ," From Web Server Security to Web Components Security.

. Christian Gilmore, David Kormann, and Aviel D. Rubin ―Secure Remote Access to an Internal Web Server,‖ IEEE Network, Val. 13, Issue 6, pp. 31-37, Nov.lDec., 1999.

. Dustin Lee, Jeff Rowe, Calvin KO, & Karl Levitt, detecting & defending against web server Fingerprinting, II In the 18-Annual Computer

security Application Conference (ACSAC’OZj, pp. 321-330, Dec. 9. 2002).

. 8) S. Jiang, S. Smith, and K. Minami, ―Securing Web Servers against Insider Attack,‖ In the 17‗h Annual Computer Security Applications

Conference (ACSAC‘OI j, pp. 265-276,

. Jane Curry.”Methods of monitoring processes with Zenoss Draft. www.skills-1st.co.uk

. JJ.G. Steiner, C. NEuman & J.I. SchillerKerberos: An Authenticatin service for open Network Systems, II Proc. Winter 1988 general Conf. USENIX Assoc., Berkeley, Calif. 1988, pp. 191-202.

. M.K. Reiter and A.D. Rubin, ―Crowds: Anonymous nWeb Transactions,‖ ACM Trans. Information Systems Security, Apr. 1998; see

also http://www.research.att. com/projects/crowds.

Downloads

Published

2024-02-26

How to Cite

Pandey, J., & Jain, M. (2024). An Analytical Study and Synthesis on Web server Security. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1690–1694. Retrieved from https://ijact.in/index.php/j/article/view/298

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.