Abstract
Many Internet users make use of search engines to locate a web page or information they want. These search engines have become a fundamental tool in the World Wide Web. Since the capability of search engines to reach any part of the web has increased, security loopholes of any websites face the risk of being exposed globally. This poses serious security threats on the web. In this paper, we discuss various methods to prevent web server attacks through search engines.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hernandez, J.C., Sierra, J.M., Ribagorda, A., Ramos, B.: Search engines as a security threat. Computer 34, 25–30 (2001)
Newman, A.C.: Search Engines used to attack databases. White Paper, Application Security, Inc.
Arasu, A., Cho, J., Molina, H.G., Paepcke, A., Raghavan, S.: Searching the Web. ACM Trans. Internet Technol. 1, 2–43 (2001)
Google Trends, https://www.google.com/trends
Symantec Threats and Risks, http://www.symantec.com/security_response/writeup.jsp?docid=2004-072615-3527-99
United States Computer Emergency Readiness Team, http://www.us-cert.gov/cas/techalerts/TA04-356A.html
McAfee Virus Profile and Definition, http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=130471
Symantec Threats and Risks, http://www.symantec.com/security_response/writeup.jsp?docid=2004-122610-5904-99
Dell SecureWorks, http://www.secureworks.com/research/threats/danmecasprox
Shin, Y., Myers, S., Gupta, M.: A Case Study on Asprox Infection Dynamics. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 1–20. Springer, Heidelberg (2009)
TWiki Security Alert, http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-3195
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. In: ACM SIGCOMM Conference on Data Communication (SIGCOMM 2008), pp. 171–182. ACM, New York (2008)
Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards Automatic Generation of Vulnerability-Based Signatures. In: IEEE Symposium on Security and Privacy (SP 2006), pp. 2–16. IEEE Computer Society, Washington, DC (2006)
White, R., Jose, J., Ruthven, I.: Comparing explicit and implicit feedback techniques for web retrieval: Trec-10 interactive track report. In: Text Retrieval Conference, TREC (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Murugesan, K., Singhal, M. (2011). Methods for Preventing Search Engine-Based Web Server Attacks. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-24043-0_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24042-3
Online ISBN: 978-3-642-24043-0
eBook Packages: Computer ScienceComputer Science (R0)