{"title":"蜜罐XSS检测的自动化Snort规则","authors":"S. Syaifuddin, Diah Risqiwati, H. A. Sidharta","doi":"10.1109/EECSI.2018.8752961","DOIUrl":null,"url":null,"abstract":"In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015","PeriodicalId":6543,"journal":{"name":"2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","volume":"28 1","pages":"584-588"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automation Snort Rule for XSS Detection with Honeypot\",\"authors\":\"S. Syaifuddin, Diah Risqiwati, H. A. Sidharta\",\"doi\":\"10.1109/EECSI.2018.8752961\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015\",\"PeriodicalId\":6543,\"journal\":{\"name\":\"2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)\",\"volume\":\"28 1\",\"pages\":\"584-588\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EECSI.2018.8752961\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EECSI.2018.8752961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automation Snort Rule for XSS Detection with Honeypot
In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015