Security

A Protective Model for Back-End Server Security Using to IP

Free registration required

Executive Summary

Today in this technological world web based applications are on a roll for the modern business. This application though is useful and has made business global posses certain threats. These web based applications are divided into two parts one the Front end and the other Back end. The most significant threats remaining to web-based applications are back-end server attacks. In this paper, a protective model for backend servers will be outlined that can provide network isolation from unauthorized traffic, blacklisting of misbehaving client traffic, a limitation of the effectiveness of back-end DoS attacks and RANA Algorithm. This is accomplished by the novel combination of virtual server deployment, virtual server masquerading, and strict authentication for back-end server access.

  • Format: PDF
  • Size: 183 KB