Design of lightweight Web page tamper-resistant mechanism for Linux

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Resisting malicious Web page tampering is critical to provide robust web services. Existing Web page tamper-resistant solutions either require extra equipments (e.g., storage equipments or content distribution systems), or suffer from significant performance degradation. In this paper, we design and implement a lightweight Web page tamper-resistant system for the Linux system. In our design, we adopt the system call interception, event-trigger mechanism, the attribute of Linux file system, and combine them together to resist tampering attempts to the Web page files. Our solution is very lightweight and does not require any additional storage equipments or content distribution systems. We implement a prototype of our mechanism on Linux with kernel version 2.6, and deploy it in a campus Web server. Experiment results show that our mechanism can effectively protect Web page files from being tampered, incurring only negligible increase in response delay and CPU utilization ratio. © Springer International Publishing Switzerland 2013.

Cite

CITATION STYLE

APA

Mi, A., Wang, W., Zhang, S., & Song, H. (2013). Design of lightweight Web page tamper-resistant mechanism for Linux. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8300 LNCS, pp. 29–39). https://doi.org/10.1007/978-3-319-03584-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free