DocumentCode
2315757
Title
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots
Author
Dagdee, Nirmal ; Thakar, Urjita
Author_Institution
Dept. of Comput. Eng., S.D. Bansal Coll. of Technol., Indore
fYear
2008
fDate
16-18 July 2008
Firstpage
1232
Lastpage
1237
Abstract
With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.
Keywords
Web services; security of data; Web services; honeypots; information gathering; intrusion attack pattern analysis; security tool; signature based intrusion detection systems; signature extraction; Access protocols; Data mining; Data security; Information security; Intrusion detection; Pattern analysis; Protection; Simple object access protocol; Web server; Web services; Honeypots; Intruders; Signatures; Web services;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Trends in Engineering and Technology, 2008. ICETET '08. First International Conference on
Conference_Location
Nagpur, Maharashtra
Print_ISBN
978-0-7695-3267-7
Electronic_ISBN
978-0-7695-3267-7
Type
conf
DOI
10.1109/ICETET.2008.192
Filename
4580093
Link To Document