A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers


With the growing of network technology along with the need of human for social interaction, using websites nowadays becomes critically important which leads in the increasing number of websites and servers. One popular solution for managing these large numbers of websites is using shared web hosting servers in order to decrease the overall cost of server maintenance. Despite affordability, this solution is insecure and risky according to high amount of reported defaces and attacks during recent years.

In this paper, we introduce top ten most common attacks in shared web hosting servers which can occur because of the nature and bad configuration in these servers. Moreover, we present several simple scenarios that are capable of penetrating these kinds of servers even with the existence of several securing mechanisms. Finally, we provide a comprehensive secure configuration for confronting these attacks.

IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013

Comments

Popular posts from this blog

Performance Evaluation of Shared Hosting Security Methods

Alert Correlation Algorithms: A Survey and Taxonomy

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions