Securing Web servers against insider attack

被引:10
|
作者
Jiang, S [1 ]
Smith, S [1 ]
Minami, K [1 ]
机构
[1] Dartmouth Coll, Inst Secur Technol Studies, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
10.1109/ACSAC.2001.991542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Too often, "security of Web transactions" reduces to "encryption of the channel" -and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator-but gives clients no basis for that trust. In this paper, we apply secure coprocessing and cryptography to solve this real problem in Web technology. We present a vision: using secure coprocessors to establish trusted co-servers at Web servers and moving sensitive computations inside these co-servers; we present a prototype implementation of this vision that scales to realistic workloads; and we validate this approach by building a simple E-voting application on top of our prototype. By showing the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments-such as at web servers with risk of insider attack-this work also helps demonstrate that "secure hardware" can be more than synonym for "cryptographic accelerator'.
引用
收藏
页码:265 / 276
页数:12
相关论文
共 50 条
  • [1] Securing the Internet against attack
    Goth, G
    IEEE INTERNET COMPUTING, 2003, 7 (01) : 8 - 10
  • [2] Securing VPN from insider and outsider bandwidth flooding attack
    Shunmuganathan, Saraswathi
    Saravanan, Renuka Devi
    Palanichamy, Yogesh
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 79
  • [3] HTB: A Very Effective Method to Protect Web Servers Against BREACH Attack to HTTPS
    Palacios, Rafael
    Farina Fernandez-Portillo, Andrea
    Sanchez-Ubeda, Eugenio F.
    Garcia-De-Zuniga, Pablo
    IEEE ACCESS, 2022, 10 : 40381 - 40390
  • [4] Securing Cloud Servers against Flooding Based DDOS Attacks
    Chopade, S. S.
    Pandey, K. U.
    Bhade, D. S.
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 524 - 528
  • [5] Intrusion detection system for securing Geographical Information System web servers
    Park, JS
    Jin, HT
    Kim, DS
    WEB AND WIRELESS GEOGRAPHICAL INFORMATION SYSTEMS, 2005, 3428 : 110 - 119
  • [6] Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
    Bangalore, Anantha K.
    Sood, Arun K.
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 60 - 65
  • [7] Securing TORA against Sybil Attack in MANETs
    Thawani, Suraj
    Upadhyay, Hardik
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 475 - 478
  • [8] Securing RSA Algorithm against Timing Attack
    Arjunan, Amuthan
    Narayanan, Praveena
    Ramu, Kaviarasan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 471 - 476
  • [9] Increasing the Attractiveness of False Objects of Attack on the Web-servers
    Shumakov, Ivan U.
    Troitskiy, Sergei S.
    Silnov, Dmitry S.
    2017 18TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2017, : 195 - 198
  • [10] Securing Threshold Cryptosystems against Chosen Ciphertext Attack
    Victor Shoup
    Rosario Gennaro
    Journal of Cryptology, 2002, 15 : 75 - 96