• DocumentCode
    593755
  • Title

    Method for two dimensional honeypot in a web application

  • Author

    Nassar, Nader ; Miller, G.

  • Author_Institution
    IBM, Somers, NY, USA
  • fYear
    2012
  • fDate
    14-17 Oct. 2012
  • Firstpage
    681
  • Lastpage
    686
  • Abstract
    Web applications Security is an ongoing dilemma as hackers and bots are getting more and more innovative bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the check-out process, could be in a position of not providing a fair chance to all consumers. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. What happens is the e-Commerce sites security is compromised when some of the traders utilize preformatted scripts/ spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is non-practical to crack with no additional actions taken by the end user. Our paper introduces an innovative multilayer approach to honeypots cashing or bypassing it is technically impractical, resulting in well secured web forms.
  • Keywords
    Internet; computer crime; electronic commerce; Web applications security; Web form security; bots; check-out process; defensive tool; e-commerce sites security; hacker; honeypots cashing; scripts elimination; spiders elimination; two dimensional honeypot; Cascading style sheets; Engines; Syntactics; Honeypot; Security; Vulnerability; e-Commerce; web Applications;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th International Conference on
  • Conference_Location
    Pittsburgh, PA
  • Print_ISBN
    978-1-4673-2740-4
  • Type

    conf

  • Filename
    6450968