@inproceedings{4ca542a1a1e64a6da6d0e2bd1ed82945,
title = "Aggressive web application honeypot for exposing attacker's identity",
abstract = "Attackers are most likely to exploit invalidated and unsanitized user input with several attacks such as cross-site scripting (XSS) or SQL injection. Many methods were proposed to prevent those attacks. Some of them were created to learn about pattern and behavior of the attacker. That is honeypot. Honeypot is classified into two types based on the simulation that honeypot can do: low interaction and high interaction.",
keywords = "LikeJacking, SQL injection, cross-site scripting, web application honeypot",
author = "Supeno Djanali and Fx Arunanto and Pratomo, {Baskoro Adi} and Abdurrazak Baihaqi and Hudan Studiawan and Shiddiqi, {Ary Mazharuddin}",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 2014 1st International Conference on Information Technology, Computer, and Electrical Engineering, ICITACEE 2014 ; Conference date: 08-11-2014 Through 09-11-2014",
year = "2015",
month = mar,
day = "23",
doi = "10.1109/ICITACEE.2014.7065744",
language = "English",
series = "2014 1st International Conference on Information Technology, Computer, and Electrical Engineering: Green Technology and Its Applications for a Better Future, ICITACEE 2014 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "212--216",
editor = "Mochammad Facta and Isnanto, {R. Rizal} and Riyadi, {Munawar Agus} and Dania Eridani",
booktitle = "2014 1st International Conference on Information Technology, Computer, and Electrical Engineering",
address = "United States",
}