Abstract

Attackers are most likely to exploit invalidated and unsanitized user input with several attacks such as cross-site scripting (XSS) or SQL injection. Many methods were proposed to prevent those attacks. Some of them were created to learn about pattern and behavior of the attacker. That is honeypot. Honeypot is classified into two types based on the simulation that honeypot can do: low interaction and high interaction.

Original languageEnglish
Title of host publication2014 1st International Conference on Information Technology, Computer, and Electrical Engineering
Subtitle of host publicationGreen Technology and Its Applications for a Better Future, ICITACEE 2014 - Proceedings
EditorsMochammad Facta, R. Rizal Isnanto, Munawar Agus Riyadi, Dania Eridani
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages212-216
Number of pages5
ISBN (Electronic)9781479964314
DOIs
Publication statusPublished - 23 Mar 2015
Event2014 1st International Conference on Information Technology, Computer, and Electrical Engineering, ICITACEE 2014 - Semarang, Indonesia
Duration: 8 Nov 20149 Nov 2014

Publication series

Name2014 1st International Conference on Information Technology, Computer, and Electrical Engineering: Green Technology and Its Applications for a Better Future, ICITACEE 2014 - Proceedings

Conference

Conference2014 1st International Conference on Information Technology, Computer, and Electrical Engineering, ICITACEE 2014
Country/TerritoryIndonesia
CitySemarang
Period8/11/149/11/14

Keywords

  • LikeJacking
  • SQL injection
  • cross-site scripting
  • web application honeypot

Fingerprint

Dive into the research topics of 'Aggressive web application honeypot for exposing attacker's identity'. Together they form a unique fingerprint.

Cite this