Detection of Configuration Vulnerabilities in Distributed (Web) Environments

Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2012-07
Hauptverfasser: Casalino, Matteo Maria, Mangili, Michele, Plate, Henrik, Ponta, Serena Elisa
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Casalino, Matteo Maria
Mangili, Michele
Plate, Henrik
Ponta, Serena Elisa
description Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2086400191</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2086400191</sourcerecordid><originalsourceid>FETCH-proquest_journals_20864001913</originalsourceid><addsrcrecordid>eNqNissKgkAUQIcgSMp_GGhTC2GcUbO1Gi1aRi1lrGtcsTs1j76_iD6g1YFzzoRFUqk0KTMpZyx2bhBCyGIj81xF7FCDh4tHQ9z0vDLU4y1Y_RWnMBJY3eGIHsFxJF6j8xa74OHKV2fo1ryhF1pDdyDvFmza69FB_OOcLXfNsdonD2ueAZxvBxMsfVIrRVlkQqTbVP13vQF9fz2-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2086400191</pqid></control><display><type>article</type><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><source>Free E- Journals</source><creator>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</creator><creatorcontrib>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</creatorcontrib><description>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Applications programs ; Cybersecurity ; Internet ; Open source software ; Operating systems ; Scanners ; Vulnerability</subject><ispartof>arXiv.org, 2012-07</ispartof><rights>2012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784</link.rule.ids></links><search><creatorcontrib>Casalino, Matteo Maria</creatorcontrib><creatorcontrib>Mangili, Michele</creatorcontrib><creatorcontrib>Plate, Henrik</creatorcontrib><creatorcontrib>Ponta, Serena Elisa</creatorcontrib><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><title>arXiv.org</title><description>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</description><subject>Applications programs</subject><subject>Cybersecurity</subject><subject>Internet</subject><subject>Open source software</subject><subject>Operating systems</subject><subject>Scanners</subject><subject>Vulnerability</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNissKgkAUQIcgSMp_GGhTC2GcUbO1Gi1aRi1lrGtcsTs1j76_iD6g1YFzzoRFUqk0KTMpZyx2bhBCyGIj81xF7FCDh4tHQ9z0vDLU4y1Y_RWnMBJY3eGIHsFxJF6j8xa74OHKV2fo1ryhF1pDdyDvFmza69FB_OOcLXfNsdonD2ueAZxvBxMsfVIrRVlkQqTbVP13vQF9fz2-</recordid><startdate>20120712</startdate><enddate>20120712</enddate><creator>Casalino, Matteo Maria</creator><creator>Mangili, Michele</creator><creator>Plate, Henrik</creator><creator>Ponta, Serena Elisa</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20120712</creationdate><title>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</title><author>Casalino, Matteo Maria ; Mangili, Michele ; Plate, Henrik ; Ponta, Serena Elisa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20864001913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Applications programs</topic><topic>Cybersecurity</topic><topic>Internet</topic><topic>Open source software</topic><topic>Operating systems</topic><topic>Scanners</topic><topic>Vulnerability</topic><toplevel>online_resources</toplevel><creatorcontrib>Casalino, Matteo Maria</creatorcontrib><creatorcontrib>Mangili, Michele</creatorcontrib><creatorcontrib>Plate, Henrik</creatorcontrib><creatorcontrib>Ponta, Serena Elisa</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Casalino, Matteo Maria</au><au>Mangili, Michele</au><au>Plate, Henrik</au><au>Ponta, Serena Elisa</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Detection of Configuration Vulnerabilities in Distributed (Web) Environments</atitle><jtitle>arXiv.org</jtitle><date>2012-07-12</date><risdate>2012</risdate><eissn>2331-8422</eissn><abstract>Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to detect security vulnerabilities caused by missing patches or misconfiguration, but current approaches center much around the concepts of hosts and operating systems. This paper presents a language and an approach for the declarative specification and execution of machine-readable security checks for sets of more fine-granular system components depending on each other in a distributed environment. Such a language, building on existing standards, fosters the creation and sharing of security content among security stakeholders. Our approach is exemplified by vulnerabilities of and corresponding checks for Open Source Software commonly used in today's Internet applications.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2012-07
issn 2331-8422
language eng
recordid cdi_proquest_journals_2086400191
source Free E- Journals
subjects Applications programs
Cybersecurity
Internet
Open source software
Operating systems
Scanners
Vulnerability
title Detection of Configuration Vulnerabilities in Distributed (Web) Environments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T04%3A42%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Detection%20of%20Configuration%20Vulnerabilities%20in%20Distributed%20(Web)%20Environments&rft.jtitle=arXiv.org&rft.au=Casalino,%20Matteo%20Maria&rft.date=2012-07-12&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2086400191%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2086400191&rft_id=info:pmid/&rfr_iscdi=true