Design and Implementation of Automatic Defensive Websites Tamper-Resistant System
نویسندگان
چکیده
Webpages tampering attack has become one of the most serious hazards to network security. Security measures of Website system were limited to install network layer protection devices, thus they could not provide effective monitoring and protection for illegal page tampering attack which making use of vulnerabilities of operating system. In this paper, we analyzed the research development of domestic and international Webpages tamper-resistant technologies, presented Website tamperresistant technology system architecture of combining the third-generation anti-tampering technology with hardware device. We also established an integrated anti-tampering system that could actively detect attacks and dynamically defend tampering attack for Websites. Test results showed that the system could effectively prevent Webpages to be tampered, and could recovery real time in the event of tampering and alert administrators. It was proved that the deployment of this system would not result in a performance loss of Web server environment.
منابع مشابه
Design and implementation of an automatic car turning system
In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملImpact of Tamper Shape on the Efficiency and Vibrations Induced During Dynamic Compaction of Dry Sands by 3D Finite Element Modeling
Dynamic compaction is a soil improvement method which has been widely used for the increase of bearing capacity through stress wave propagation during heavy tamping. The cost and time of project implementation can be effectively curtailed by developing a model that can be used in the design of dynamic compaction operations. The numerical models offered so far are mostly one or two-dimensional, ...
متن کاملWCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation
The current state of web accessibility evaluation systems is encouraging, yet not sufficient. Many evaluation systems were developed for evaluating websites based on WCAG 2.0 recommendations, however, their effectiveness is somewhat incomplete. Specifically, web accessibility evaluation systems, not being able to handle a website language poses a series of challenges for web accessibility evalu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 7 شماره
صفحات -
تاریخ انتشار 2012