{"id":185,"date":"2020-03-16T05:55:07","date_gmt":"2020-03-16T05:55:07","guid":{"rendered":"https:\/\/arms10.org\/publication\/?p=185"},"modified":"2020-03-16T05:55:09","modified_gmt":"2020-03-16T05:55:09","slug":"web-sites-on-hosting","status":"publish","type":"post","link":"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/","title":{"rendered":"Web Sites on Hosting"},"content":{"rendered":"\n<h2><a href=\"https:\/\/arudhrainnovations.com\/\">  Web Sites on Hosting <\/a><\/h2>\n\n\n\n<p> Web sites have been great diversity because of theirpurposes  and  structures  today  and  many  web  sites  are  workingon  hosting  services.  A  hosting  service  is  one  of  the  networkservices  for  outsourcing  construction  and  maintenance  of  theservers.  Thus,  the  web  site  operators  are  free  from  hardwaresetting  and  server  maintenance.  On  the  other  hand,  web  siteshave  been  exposed  to  cyber  attacks.  To  counter  those  web  siteattacks, hosting service providers should monitor their web sites.However, in many cases, it is difficult for the service providers toanalyze  such  attacks  with  full  information  because  of  contractsabout a protection of personal information. As another approach,it  is  effective  to  construct  server  side  honeypots  and  observemalicious  access  to  them.  Unfortunately,  honeypots  could  notalways observe all type of attacks because of the diversity of websites. In this paper, we propose a novel approach for keeping upsecurity  intelligence  and  strengthening  countermeasures  againstweb attacks on a hosting service. Our approach helps the serviceproviders  to  protect  their  customers  web  sites  by  combiningthe  analysis  of  IDS  logs  and  web  access  logs  provided  fromthese  sites  and  dedicated  honeypots  for  observing  web  attacks.The honeypots keep learning interactions from the actual hostedsites,  and  attract  attackers  by  mimicking  the  sites  to  gain  theintelligence  on  malicious  web  attacks.  We  also  describe  the  casestudy in a hosting service on our university.<\/p>\n\n\n\n<p> Web sites have been great diversity because of their pur-poses and structures today. There are a great deal kinds of websites from a private blog to a huge banking site. According tothem, many kinds of web applications are working on eachweb site. Some web applications are developed and integratedoriginally. Some other web applications are working on thedistributed application packages. For example, WordPress isone of the most common web application packages for contentsmanagement systems (CMS) [1].When web site operators construct and maintain their websites, it is much easier by using hosting services than arrangingtheir own machines. A hosting service is one of the networkservices for outsourcing construction and maintenance servers.By contracting to the hosting services, the hosting serviceallocates the servers to the operators. They can deploy andupdate their web applications on the allocated servers throughnetwork. Thus, the web site operators are free from hardwaresetting and server maintenance. Today, many web sites areworking on those hosting services.On the other hand, attacks against web sites have also beenone of the most serious threats. Attackers always search websites and try to intrude them with vulnerabilities and miscon-figuration. In many cases, those victim web sites are com-promised by the attackers and become their fingers for theirnext attacking. Especially for the hosting services providers,the existence of attackers\u2019 finger sites causes the deterioratingof their service levels and falling into disrepute.To counter those web site attacks, there are also many kindsof security systems like intrusion detection systems (IDS)andetc. Those systems are good at detecting known attacksbecause their detections are based on the recognized vulner-abilities and patterns reported somewhere already. In recentyears, however, some attacks avoids such security systemswhen their attacks are with complicated patterns. And whatwas worse, updating application packages and developing newweb applications has the risk of generating such novel attackswith such patterns. Thus, in order to detect those novel type ofattacks, it is necessary for the web site operators and hostingservice providers to keep up with such daily-updated attacksand strengthen their countermeasures.                                                                  <a href=\"https:\/\/arudhrainnovations.com\/\">Arudhra Innovations SEO Digital Marketing Web Design<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/arudhrainnovations.com\/\"><img loading=\"lazy\" width=\"540\" height=\"960\" src=\"https:\/\/arms10.org\/publication\/wp-content\/uploads\/2020\/03\/75285836_1361624364010438_6731432376787795968_o-1.png\" alt=\"  Web Sites on Hosting \" class=\"wp-image-186\" srcset=\"https:\/\/arms10.org\/publication\/wp-content\/uploads\/2020\/03\/75285836_1361624364010438_6731432376787795968_o-1.png 540w, https:\/\/arms10.org\/publication\/wp-content\/uploads\/2020\/03\/75285836_1361624364010438_6731432376787795968_o-1-169x300.png 169w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/a><\/figure>\n\n\n\n<p> We suppose hosting service providers would like to monitorthe web sites under his service. For monitoring the access andthe behaviors for their web servers, the providers collect andanalyze security logs in general. By analyzing those logs andextract anomalous parts, they can grasp the occurrence of webattacks against their web sites. However, in many cases, it isdifficult to analyze such attacks with full information. First,the hosting service does not have a huge database to storefull log or information. Second, there is a contract about aprotection of personal information such that a hosting serviceprovider never collect detail informations around its customers(web site operators).As another approach, it is effective for hosting serviceproviders to construct server side honeypots and observemalicious access to them. A honeypot is a decoy system formonitoring and logging the activities of entities that probe,attack or compromise them. The providers can find maliciousaccess with sufficient logs and can grasp what kind of attacksoccur on the Internet. However, honeypots cannot alwaysobserve all type of attacks. Because of the diversity of websites, honeypots cannot simulate all kinds of interactions ofweb sites. As mentioned in [2], it is hard to construct honeypotswith intelligent interactions. Thus, existing honeypots canobserve only limited web attacksIn this paper, we propose a novel approach for keeping upwith security intelligence and strengthening countermeasuresagainst web attacks on a hosting service. This approach isa combination with log analysis and honeypot observing.We present our approach as a system on a hosting service,Wamber. We assume that it is possible to extract suspiciousweb requests from the deficient log. From those suspiciousweb requests, we can regenerate web request and responseinteractions through requesting such access to the real websites on the hosting service. Therefore, the honeypot learns thereal interactions based on the suspicious web requests. Whenthe same suspicious request arrives at the honeypot, it canobserve the traffic with learned interactions to make sure theyare indeed malicious. Thus, the hosting service providers gainmore information about attacks against their hosting services.Such information can be used to write signatures for IDS andIPS to further protect the websites. <a href=\"https:\/\/arudhrainnovations.com\/\">https:\/\/arudhrainnovations.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web Sites on Hosting Web sites have been great diversity because of theirpurposes and structures today and many web sites are workingon hosting services. A hosting service is one of the networkservices for outsourcing construction and maintenance of theservers. Thus,&#8230; <a class=\"direadmore\" href=\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/\"> Continue Reading&#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[101,121],"tags":[33],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Sites on Hosting - International Conference Publications<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Sites on Hosting - International Conference Publications\" \/>\n<meta property=\"og:description\" content=\"Web Sites on Hosting Web sites have been great diversity because of theirpurposes and structures today and many web sites are workingon hosting services. A hosting service is one of the networkservices for outsourcing construction and maintenance of theservers. Thus,... Continue Reading&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/\" \/>\n<meta property=\"og:site_name\" content=\"International Conference Publications\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-16T05:55:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-16T05:55:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arms10.org\/publication\/wp-content\/uploads\/2020\/03\/75285836_1361624364010438_6731432376787795968_o-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arms10.org\/publication\/#website\",\"url\":\"https:\/\/arms10.org\/publication\/\",\"name\":\"International Conference Publications\",\"description\":\"Web Design and Hosting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/arms10.org\/publication\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/arms10.org\/publication\/wp-content\/uploads\/2020\/03\/75285836_1361624364010438_6731432376787795968_o-1.png\",\"width\":540,\"height\":960},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/#webpage\",\"url\":\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/\",\"name\":\"Web Sites on Hosting - International Conference Publications\",\"isPartOf\":{\"@id\":\"https:\/\/arms10.org\/publication\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/#primaryimage\"},\"datePublished\":\"2020-03-16T05:55:07+00:00\",\"dateModified\":\"2020-03-16T05:55:09+00:00\",\"author\":{\"@id\":\"https:\/\/arms10.org\/publication\/#\/schema\/person\/09cefbaab3c57b044c39ce0c7bfcc315\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arms10.org\/publication\/web-sites-on-hosting\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/arms10.org\/publication\/#\/schema\/person\/09cefbaab3c57b044c39ce0c7bfcc315\",\"name\":\"Writer\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/arms10.org\/publication\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d842b0618de314aaca09da5e8507652?s=96&d=mm&r=g\",\"caption\":\"Writer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/posts\/185"}],"collection":[{"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":1,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/posts\/185\/revisions\/187"}],"wp:attachment":[{"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arms10.org\/publication\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}