Detection of Configuration Vulnerabilities in Distributed (Web) Environments
Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2012-07 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Casalino, Matteo Maria Mangili, Michele Plate, Henrik Ponta, Serena Elisa |
description | Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2086400191</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2086400191</sourcerecordid><originalsourceid>FETCH-proquest_journals_20864001913</originalsourceid><addsrcrecordid>eNqNissKgkAUQIcgSMp_GGhTC2GcUbO1Gi1aRi1lrGtcsTs1j76_iD6g1YFzzoRFUqk0KTMpZyx2bhBCyGIj81xF7FCDh4tHQ9z0vDLU4y1Y_RWnMBJY3eGIHsFxJF6j8xa74OHKV2fo1ryhF1pDdyDvFmza69FB_OOcLXfNsdonD2ueAZxvBxMsfVIrRVlkQqTbVP13vQF9fz2-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2086400191</pqid></control><display><type>article</type><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><source>Free E- Journals</source><creator>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</creator><creatorcontrib>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</creatorcontrib><description>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Applications programs ; Cybersecurity ; Internet ; Open source software ; Operating systems ; Scanners ; Vulnerability</subject><ispartof>arXiv.org, 2012-07</ispartof><rights>2012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Casalino, Matteo Maria</creatorcontrib><creatorcontrib>Mangili, Michele</creatorcontrib><creatorcontrib>Plate, Henrik</creatorcontrib><creatorcontrib>Ponta, Serena Elisa</creatorcontrib><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><title>arXiv.org</title><description>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</description><subject>Applications programs</subject><subject>Cybersecurity</subject><subject>Internet</subject><subject>Open source software</subject><subject>Operating systems</subject><subject>Scanners</subject><subject>Vulnerability</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNissKgkAUQIcgSMp_GGhTC2GcUbO1Gi1aRi1lrGtcsTs1j76_iD6g1YFzzoRFUqk0KTMpZyx2bhBCyGIj81xF7FCDh4tHQ9z0vDLU4y1Y_RWnMBJY3eGIHsFxJF6j8xa74OHKV2fo1ryhF1pDdyDvFmza69FB_OOcLXfNsdonD2ueAZxvBxMsfVIrRVlkQqTbVP13vQF9fz2-</recordid><startdate>20120712</startdate><enddate>20120712</enddate><creator>Casalino, Matteo Maria</creator><creator>Mangili, Michele</creator><creator>Plate, Henrik</creator><creator>Ponta, Serena Elisa</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120712</creationdate><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><author>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20864001913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Applications programs</topic><topic>Cybersecurity</topic><topic>Internet</topic><topic>Open source software</topic><topic>Operating systems</topic><topic>Scanners</topic><topic>Vulnerability</topic><toplevel>online_resources</toplevel><creatorcontrib>Casalino, Matteo Maria</creatorcontrib><creatorcontrib>Mangili, Michele</creatorcontrib><creatorcontrib>Plate, Henrik</creatorcontrib><creatorcontrib>Ponta, Serena Elisa</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Casalino, Matteo Maria</au><au>Mangili, Michele</au><au>Plate, Henrik</au><au>Ponta, Serena Elisa</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</atitle><jtitle>arXiv.org</jtitle><date>2012-07-12</date><risdate>2012</risdate><eissn>2331-8422</eissn><abstract>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2012-07 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2086400191 |
source | Free E- Journals |
subjects | Applications programs Cybersecurity Internet Open source software Operating systems Scanners Vulnerability |
title | Detection of Configuration Vulnerabilities in Distributed (Web) Environments |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T04%3A42%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Detection%20of%20Configuration%20Vulnerabilities%20in%20Distributed%20(Web)%20Environments&rft.jtitle=arXiv.org&rft.au=Casalino,%20Matteo%20Maria&rft.date=2012-07-12&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2086400191%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2086400191&rft_id=info:pmid/&rfr_iscdi=true |