Skip to main content

Methods for Preventing Search Engine-Based Web Server Attacks

  • Conference paper
Trends in Computer Science, Engineering and Information Technology (CCSEIT 2011)

Abstract

Many Internet users make use of search engines to locate a web page or information they want. These search engines have become a fundamental tool in the World Wide Web. Since the capability of search engines to reach any part of the web has increased, security loopholes of any websites face the risk of being exposed globally. This poses serious security threats on the web. In this paper, we discuss various methods to prevent web server attacks through search engines.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hernandez, J.C., Sierra, J.M., Ribagorda, A., Ramos, B.: Search engines as a security threat. Computer 34, 25–30 (2001)

    Article  Google Scholar 

  2. Newman, A.C.: Search Engines used to attack databases. White Paper, Application Security, Inc.

    Google Scholar 

  3. Arasu, A., Cho, J., Molina, H.G., Paepcke, A., Raghavan, S.: Searching the Web. ACM Trans. Internet Technol. 1, 2–43 (2001)

    Article  Google Scholar 

  4. Google Trends, https://www.google.com/trends

  5. Symantec Threats and Risks, http://www.symantec.com/security_response/writeup.jsp?docid=2004-072615-3527-99

  6. United States Computer Emergency Readiness Team, http://www.us-cert.gov/cas/techalerts/TA04-356A.html

  7. McAfee Virus Profile and Definition, http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=130471

  8. Symantec Threats and Risks, http://www.symantec.com/security_response/writeup.jsp?docid=2004-122610-5904-99

  9. Dell SecureWorks, http://www.secureworks.com/research/threats/danmecasprox

  10. Shin, Y., Myers, S., Gupta, M.: A Case Study on Asprox Infection Dynamics. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 1–20. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. TWiki Security Alert, http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-3195

  12. Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. In: ACM SIGCOMM Conference on Data Communication (SIGCOMM 2008), pp. 171–182. ACM, New York (2008)

    Chapter  Google Scholar 

  13. Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards Automatic Generation of Vulnerability-Based Signatures. In: IEEE Symposium on Security and Privacy (SP 2006), pp. 2–16. IEEE Computer Society, Washington, DC (2006)

    Google Scholar 

  14. White, R., Jose, J., Ruthven, I.: Comparing explicit and implicit feedback techniques for web retrieval: Trec-10 interactive track report. In: Text Retrieval Conference, TREC (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Murugesan, K., Singhal, M. (2011). Methods for Preventing Search Engine-Based Web Server Attacks. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24043-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24042-3

  • Online ISBN: 978-3-642-24043-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics