Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ARES.2011.31guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Early Detection of Security Misconfiguration Vulnerabilities in Web Applications

Published: 22 August 2011 Publication History

Abstract

This paper presents a web-based tool to supplement defense against security misconfiguration vulnerabilities in web applications. The tool automatically audits security configuration settings of server environments in web application development and deployment. It also offers features to automatically adjust security configuration settings and quantitatively rates level of safety for server environments before deploying web applications. Using the tool, we were able to evaluate eleven server packages for Apache, PHP and MySQL across three operating system platforms. Our evaluation revealed that the tool is able to audit current security configuration settings and alert users to fix the server environment to achieve the level of safety of security configuration with respect to recommended configurations for real-life web application deployment.

Cited By

View all
  • (2024)Deep learning trends and future perspectives of web security and vulnerabilitiesJournal of High Speed Networks10.3233/JHS-23003730:1(115-146)Online publication date: 1-Jan-2024
  • (2022)Survey and Taxonomy of Adversarial Reconnaissance TechniquesACM Computing Surveys10.1145/353870455:6(1-38)Online publication date: 7-Dec-2022
  • (2022)ChevroCrypto – Cryptography APIProcedia Computer Science10.1016/j.procs.2022.08.014204:C(116-122)Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ARES '11: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
August 2011
772 pages
ISBN:9780769544854

Publisher

IEEE Computer Society

United States

Publication History

Published: 22 August 2011

Author Tags

  1. Configuration
  2. Deployment
  3. Security
  4. Web Applications
  5. Web Server Environments

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Deep learning trends and future perspectives of web security and vulnerabilitiesJournal of High Speed Networks10.3233/JHS-23003730:1(115-146)Online publication date: 1-Jan-2024
  • (2022)Survey and Taxonomy of Adversarial Reconnaissance TechniquesACM Computing Surveys10.1145/353870455:6(1-38)Online publication date: 7-Dec-2022
  • (2022)ChevroCrypto – Cryptography APIProcedia Computer Science10.1016/j.procs.2022.08.014204:C(116-122)Online publication date: 1-Jan-2022
  • (2020)NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL ServicesProceedings of the 36th Annual Computer Security Applications Conference10.1145/3427228.3427260(567-581)Online publication date: 7-Dec-2020
  • (2018)There's a Hole in that Bucket!Proceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274736(702-711)Online publication date: 3-Dec-2018
  • (2017)Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application VulnerabilitiesInternational Journal of Cloud Applications and Computing10.4018/IJCAC.20170701017:3(1-43)Online publication date: 1-Jul-2017
  • (2014)A large-scale analysis of the security of embedded firmwaresProceedings of the 23rd USENIX conference on Security Symposium10.5555/2671225.2671232(95-110)Online publication date: 20-Aug-2014

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media