Securing Web servers against insider attack

被引:10
|
作者
Jiang, S [1 ]
Smith, S [1 ]
Minami, K [1 ]
机构
[1] Dartmouth Coll, Inst Secur Technol Studies, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
10.1109/ACSAC.2001.991542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Too often, "security of Web transactions" reduces to "encryption of the channel" -and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator-but gives clients no basis for that trust. In this paper, we apply secure coprocessing and cryptography to solve this real problem in Web technology. We present a vision: using secure coprocessors to establish trusted co-servers at Web servers and moving sensitive computations inside these co-servers; we present a prototype implementation of this vision that scales to realistic workloads; and we validate this approach by building a simple E-voting application on top of our prototype. By showing the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments-such as at web servers with risk of insider attack-this work also helps demonstrate that "secure hardware" can be more than synonym for "cryptographic accelerator'.
引用
收藏
页码:265 / 276
页数:12
相关论文
共 50 条
  • [41] Securing ZigBee Communications Against Constant Jamming Attack Using Neural Network
    Pirayesh, Hossein
    Sangdeh, Pedram Kheirkhah
    Zeng, Huacheng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4957 - 4968
  • [42] Securing Mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 50 - 55
  • [43] Securing heterogeneous embedded devices against XSS attack in intelligent IoT system
    Chaudhary, Pooja
    Gupta, Brij B.
    Singh, A. K.
    COMPUTERS & SECURITY, 2022, 118
  • [44] Information servers on the web
    Bulseco, D
    BIOTECHNOLOGY SOFTWARE JOURNAL, 1995, 12 (04): : 34 - 41
  • [45] An Insider Attack on Shilling Attack Detection for Recommendation Systems
    Luo, Zhifeng
    Liang, Chen
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 277 - 280
  • [46] Securing Software-Defined Vehicular Network Architecture against DDoS attack
    Amari, Houda
    Louati, Wassef
    Khoukhi, Lyes
    Belguith, Lamia Hadrich
    PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, : 653 - 656
  • [47] Securing ZigBee IoT Network Against HULK Distributed Denial of Service Attack
    Asonye, Ekele A.
    Anwuna, Ifeoma
    Musa, Sarhan M.
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, : 156 - 162
  • [48] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [49] Greening Web Servers: A Case for Ultra Low-power Web Servers
    Varghese, Benoy
    Carlsson, Niklas
    Jourjon, Guillaume
    Mahanti, Anirban
    Shenoy, Prashant
    2014 INTERNATIONAL GREEN COMPUTING CONFERENCE (IGCC), 2014,
  • [50] Efficient Group ID-Based Encryption With Equality Test Against Insider Attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Zhong, Yijian
    Ling, Yunzhi
    COMPUTER JOURNAL, 2021, 64 (04): : 661 - 674