AUTOMATION SNORT RULE FOR XSS DETECTION WITH HONEYPOT

被引:0
作者
Syaifuddin [1 ]
Risqiwati, Diah [1 ]
Sidharta, Hanugra Aulia [2 ]
机构
[1] Univ Muhammadiyah Malang, Sch Informat Technol, Fac Engn, Malang, Indonesia
[2] Bina Nusantara Inst Creat Technol Malang, Fac Technol & Design, Comp Sci Program Study, Malang, Indonesia
来源
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018) | 2018年
关键词
Network attack; IDS; XSS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015
引用
收藏
页码:584 / 588
页数:5
相关论文
共 15 条
  • [1] Al-Nashif Youssif, 2008, 2008 International Conference on Autonomic Computing (ICAC '08), P131, DOI 10.1109/ICAC.2008.25
  • [2] Alam M. S., ADAPTIVE LOAD BALANC, P48
  • [3] Bajpai S, 2017, 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), P42, DOI 10.1109/ICCONS.2017.8250754
  • [4] Bao J., 2010, ICCASM 2010 2010 INT, V10
  • [5] Baykara Muhammet, 2015, Int. J. Comput. Netw. Appl. (IJCNA), V2, P203
  • [6] Campbell RM, 2015, INT CONF INTERNET, P208, DOI 10.1109/ICITST.2015.7412090
  • [7] Chawda K., 2015, 2014 INT C INF COMM
  • [8] Garg A., 2016, ICACCS 2016 3 INT C
  • [9] Jacob B., 2011, AUTOMATIC XSS DETECT
  • [10] Jianrong Xi, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P771, DOI 10.1109/CIS.2011.175