Publication:
A Survey on Deception Techniques for Securing Web Application

dc.citedby3
dc.contributor.authorMohd Efendi M.A.E.en_US
dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorAhmad Zawawi M.N.en_US
dc.contributor.authorAbdul Rahim F.en_US
dc.contributor.authorMuhamad Pahri N.en_US
dc.contributor.authorIsmail A.en_US
dc.contributor.authorid57215353650en_US
dc.contributor.authorid57203863738en_US
dc.contributor.authorid56997510600en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid57215354686en_US
dc.contributor.authorid57199833882en_US
dc.date.accessioned2023-05-29T07:25:37Z
dc.date.available2023-05-29T07:25:37Z
dc.date.issued2019
dc.descriptionBig data; Anomaly based detection; Application layer protocols; Application layers; deception; Prevention techniques; security; WEB application; Web application attacks; Network securityen_US
dc.description.abstractMany web applications are developed to handle important and critical tasks, which may attract a large number of attackers. With various types of attacks, there is no finite solution to mitigate it's all. Deception technique is one of the area that can be explore to defend against web attack. Deception can detect, analyzed and defend against advanced web attack that cannot be done using existing anomaly-based detection and prevention techniques. Current deceptive solutions tend to be doubtful to application-layer protocols and lack of study on how deception can be applied at this level. Thus, those solutions can't properly be used to protect against application-layer attacks that are integrally based on elements from the application-layer itself. This research aims to study possible usages of deception techniques that could be incorporated in the context of application-layer traffic of web applications with the purpose of detecting web application attacks. The comparative results from this study will be used to identify which deception techniques are suitable to provide a useful layer of protection for a web application. � 2019 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo8819492
dc.identifier.doi10.1109/BigDataSecurity-HPSC-IDS.2019.00066
dc.identifier.epage331
dc.identifier.scopus2-s2.0-85072781722
dc.identifier.spage328
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85072781722&doi=10.1109%2fBigDataSecurity-HPSC-IDS.2019.00066&partnerID=40&md5=6ccdfdcb5d2e311d8805f327f649def4
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24661
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitleProceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019
dc.titleA Survey on Deception Techniques for Securing Web Applicationen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections