Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/20921
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMohd Efendi M.A.E.en_US
dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorAhmad Zawawi M.N.en_US
dc.contributor.authorAbdul Rahim F.en_US
dc.contributor.authorMuhamad Pahri N.en_US
dc.contributor.authorIsmail Aen_US
dc.date.accessioned2021-08-23T07:42:53Z-
dc.date.available2021-08-23T07:42:53Z-
dc.date.issued2019-
dc.identifier.urihttp://dspace2020.uniten.edu.my:8080/handle/123456789/20921-
dc.description.abstractMany web applications are developed to handle important and critical tasks, which may attract a large number of attackers. With various types of attacks, there is no finite solution to mitigate it's all. Deception technique is one of the area that can be explore to defend against web attack. Deception can detect, analyzed and defend against advanced web attack that cannot be done using existing anomaly-based detection and prevention techniques. Current deceptive solutions tend to be doubtful to application-layer protocols and lack of study on how deception can be applied at this level. Thus, those solutions can't properly be used to protect against application-layer attacks that are integrally based on elements from the application-layer itself. This research aims to study possible usages of deception techniques that could be incorporated in the context of application-layer traffic of web applications with the purpose of detecting web application attacks. The comparative results from this study will be used to identify which deception techniques are suitable to provide a useful layer of protection for a web application. © 2019 IEEE.en_US
dc.language.isoenen_US
dc.titleA Survey on Deception Techniques for Securing Web Applicationen_US
dc.typeconference paperen_US
item.cerifentitytypePublications-
item.languageiso639-1en-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.grantfulltextreserved-
item.openairetypeconference paper-
Appears in Collections:UNITEN Ebook and Article
Files in This Item:
File Description SizeFormat 
This document is not yet available.pdf
  Restricted Access
396.12 kBAdobe PDFView/Open    Request a copy
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.