Publication: A Survey on Deception Techniques for Securing Web Application
dc.citedby | 3 | |
dc.contributor.author | Mohd Efendi M.A.E. | en_US |
dc.contributor.author | Ibrahim Z.-A. | en_US |
dc.contributor.author | Ahmad Zawawi M.N. | en_US |
dc.contributor.author | Abdul Rahim F. | en_US |
dc.contributor.author | Muhamad Pahri N. | en_US |
dc.contributor.author | Ismail A. | en_US |
dc.contributor.authorid | 57215353650 | en_US |
dc.contributor.authorid | 57203863738 | en_US |
dc.contributor.authorid | 56997510600 | en_US |
dc.contributor.authorid | 57350579500 | en_US |
dc.contributor.authorid | 57215354686 | en_US |
dc.contributor.authorid | 57199833882 | en_US |
dc.date.accessioned | 2023-05-29T07:25:37Z | |
dc.date.available | 2023-05-29T07:25:37Z | |
dc.date.issued | 2019 | |
dc.description | Big data; Anomaly based detection; Application layer protocols; Application layers; deception; Prevention techniques; security; WEB application; Web application attacks; Network security | en_US |
dc.description.abstract | Many web applications are developed to handle important and critical tasks, which may attract a large number of attackers. With various types of attacks, there is no finite solution to mitigate it's all. Deception technique is one of the area that can be explore to defend against web attack. Deception can detect, analyzed and defend against advanced web attack that cannot be done using existing anomaly-based detection and prevention techniques. Current deceptive solutions tend to be doubtful to application-layer protocols and lack of study on how deception can be applied at this level. Thus, those solutions can't properly be used to protect against application-layer attacks that are integrally based on elements from the application-layer itself. This research aims to study possible usages of deception techniques that could be incorporated in the context of application-layer traffic of web applications with the purpose of detecting web application attacks. The comparative results from this study will be used to identify which deception techniques are suitable to provide a useful layer of protection for a web application. � 2019 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 8819492 | |
dc.identifier.doi | 10.1109/BigDataSecurity-HPSC-IDS.2019.00066 | |
dc.identifier.epage | 331 | |
dc.identifier.scopus | 2-s2.0-85072781722 | |
dc.identifier.spage | 328 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85072781722&doi=10.1109%2fBigDataSecurity-HPSC-IDS.2019.00066&partnerID=40&md5=6ccdfdcb5d2e311d8805f327f649def4 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/24661 | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Scopus | |
dc.sourcetitle | Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019 | |
dc.title | A Survey on Deception Techniques for Securing Web Application | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |