Design and implementation of Web service honeypot

作者: Abdallah Ghourabi , Tarek Abbes , Adel Bouhoula

DOI:

关键词:

摘要: … honeypots in order to detect and study attacks against Web services. Our solution (WS Honeypot) is to deploy a honeypot … During the classification process, features extracted from each …

参考文章(9)
Ramakrishnan Srikant, Rakesh Agrawal, Fast Algorithms for Mining Association Rules in Large Databases very large data bases. pp. 487- 499 ,(1994)
JingTao Yao, Songlun Zhao, Lisa Fan, An enhanced support vector machine model for intrusion detection rough sets and knowledge technology. pp. 538- 543 ,(2006) , 10.1007/11795131_78
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula, Experimental analysis of attacks against web services and countermeasures Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services - iiWAS '10. pp. 195- 201 ,(2010) , 10.1145/1967486.1967519
Urjita Thakar, Nirmal Dagdee, Sudarshan Varma, Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services International Journal of Network Security & Its Applications. ,vol. 2, pp. 190- 205 ,(2010) , 10.5121/IJNSA.2010.2313
Wun-Hwa Chen, Sheng-Hsun Hsu, Hwang-Pin Shen, Application of SVM and ANN for intrusion detection Computers & Operations Research. ,vol. 32, pp. 2617- 2634 ,(2005) , 10.1016/J.COR.2004.03.019
Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu, ADAM: a testbed for exploring the use of data mining in intrusion detection international conference on management of data. ,vol. 30, pp. 15- 24 ,(2001) , 10.1145/604264.604268