AUTOMATION SNORT RULE FOR XSS DETECTION WITH HONEYPOT

被引:0
作者
Syaifuddin [1 ]
Risqiwati, Diah [1 ]
Sidharta, Hanugra Aulia [2 ]
机构
[1] Univ Muhammadiyah Malang, Sch Informat Technol, Fac Engn, Malang, Indonesia
[2] Bina Nusantara Inst Creat Technol Malang, Fac Technol & Design, Comp Sci Program Study, Malang, Indonesia
来源
2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018) | 2018年
关键词
Network attack; IDS; XSS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015
引用
收藏
页码:584 / 588
页数:5
相关论文
共 15 条
  • [11] Khamphakdee Nattawat, 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT), P69, DOI 10.1109/ICoICT.2014.6914042
  • [12] Podjarny Guy, XSS ATTACKS NEXT WAV
  • [13] Roschke S., 2010, 2010 2nd International Conference on Education Technology and Computer (ICETC 2010), P433, DOI 10.1109/ICETC.2010.5529213
  • [14] Yusof I., 2014, 2014 5 INT C INF COM
  • [15] Zhai J., 2012, P 2012 INT C MEAS IN, V1, P309