NUST Institutional Repository

State-of-the-art Web Server Spoofer

Show simple item record

dc.contributor.author Syed Kashif Jehan
dc.date.accessioned 2020-11-20T15:16:26Z
dc.date.available 2020-11-20T15:16:26Z
dc.date.issued 2005
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/13245
dc.description Supervisor: Mr. Ahsan Ahmad Chaudhry en_US
dc.description.abstract As businesses place more applications on the Web, they expose more of their sensitive customer data to hackers. Web server Fingerprinting is a relatively new topic of discussion in the context of application security. One of the biggest challenges of maintaining a high level of network security is to have a complete and accurate inventory of networked assets. Web servers and web applications have now become a part of the scope of a network security assessment exercise. Traditional firewalls, which have historically done an excellent job preventing outsiders from accessing networks, are no longer sufficient. As Internet Dynamics Corporation (IDC) noted even back in 2002, "firewalls offer little protection at the application layer because ports within the firewall have to be left open for communication." In this project, different techniques for identifying web servers and how to perform HTTP server fingerprinting have been discussed. Solutions on how to detect fingerprinting attempts and how to protect against HTTP server fingerprinting have been proposed. en_US
dc.publisher SEECS, National University of Sciences and Technology, Islamabad en_US
dc.subject Information Technology en_US
dc.title State-of-the-art Web Server Spoofer en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • BS [440]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account