期刊文献+

基于LAMP技术的服务器安全配置方案研究 被引量:2

Research on Server Sercurity Confi guration Scheme based on LAMP
下载PDF
导出
摘要 文章通过实验归纳并整理了基于LAMP架构的服务器配置策略,实现了通过在服务器上修改Apache配置后,Apache可根据相关配置信息使登录者根据域名访问不同站点的方法,同时也实现了拒绝IP地址访问和服务器处理错误返回结果的"伪造"方法。另外文章还总结并研究了服务器安全威胁的成因、攻击流程和应对方案。这些方法将提升服务器安全等级,对中小型服务器防御某些恶意攻击起到重要作用。 This article summarize and organize some server policies under the framework of LAMP according to some real experiments. The article realize function of making different user who uses different URL visit different websites erected on one server by setting Apache configuration files. Besides, this method can also be used to deny users who use IP address to visit this website and falsify server error. And this article discuss a way to collect and classify logs to different files. In addition, the article discusses the causes, process and resolution.The method discussed above will be used to prevent server from malicious attacks.
出处 《信息网络安全》 2014年第3期39-45,共7页 Netinfo Security
基金 国家自然科学基金[60973107]
关键词 服务器配置 服务器安全 网络安全 server configuration server security network security
  • 相关文献

参考文献4

二级参考文献10

  • 1[1]Apache Software Foundation.Apache 1.3 User's Guide[DB/OL].http://www-3.ibm.com/software/webservers/httpserve-rs/doc/v10/,1999-01-01.
  • 2[2]Apache Software Foundation.Apache Virtual Host Documentation[DB/OL].http://www.apache.org/docs/vhosts/index.html,2000-12-01.
  • 3[3]Apache Software Foundation.Apache Module Documents[DB/OL].http://httpd.apache.org/docs-2.0/mod/modvhostalias.html and http://httpd.apache.org/docs-2.0/mod/modrewrite.html,2003-02-01.
  • 4[4]RFC 1945,Hypertext Transfer Protocol -- HTTP/1.0[S].
  • 5[5]RFC 2068,Hypertext Transfer Protocol -- HTTP/1.1[S].
  • 6.xwg999 Web.服务器王中王[DB/OL].http://www.netadmin.com.cn/,2004-10-21.
  • 7.Michael Howard.修复缓冲区溢出问题[DB/OL].http://www.hktk.nease.net/hacker/biancheng/405.html,2002-06-27.
  • 8Julie Meloni. Sams Teach Yourself PHP,My SQL and Apache Allin One[M].Indianapolis:Sams Publishing,2012.
  • 9Alan C. Wilson,Rita Vigil Martine:Apache(Jicarilla)[M].San Francisco:Mps Multimedia Inc,1996.
  • 10肖自红,张祖平.基于.NET的试题库与在线考试系统研究[J].计算机与数字工程,2008,36(3):136-139. 被引量:18

共引文献11

同被引文献53

  • 1王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 2马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 3吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 4Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 5Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 6Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 7Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 8Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.
  • 9Schulze C, Schreyer M,Stahl A, et al. Using DCT Features forPrinting Technique and Copy Detection[J]. Advances in Digital Forensics,2009, (306): 95-106.
  • 10Shang S,Memon N, Kong X. Detecting documents forged byprinting and copying[J]. EUR.ASIP Journal on Advances in SignalProcessing, 2014, 140.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部