TITLE

Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems

AUTHOR(S)
Nassar, Nader; Miller, Grant
PUB. DATE
July 2013
SOURCE
Folklore Forum;Jul2013, p260
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Security for web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce applications, such as those used for transaction processing, could be placed in a position of not providing a fair chance to all consumers because bots can interact more quickly. This is especially true when a commerce site offers popular inventory items where many traders are competing to get an item that has a limited supply. The e-Commerce site's security is compromised when some traders utilize pre-formatted scripts or spiders to place orders, thus giving them an unfair advantage. The problem is: how to eliminate the interaction of scripts and spiders in a given web application flow while requiring no additional actions taken by a human user. Our paper introduces an innovative multi-layer approach to honeypots where cashing or bypassing the honeypot is technically impractical.
ACCESSION #
98783465

 

Related Articles

  • Defending Polymorphic Worms in Computer Network using Honeypot. Goswami, R. T.; Mondal, Avijit; mishra, Bimal Kumar; Mahanti, N. C. // International Journal of Advanced Computer Science & Application;Oct2012, Vol. 3 Issue 10, p63 

    Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gate- translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove...

  • A survey on the approaches in honeypot for implementing network security. Srivastava, Niharika; Prakash, Ved // International Journal on Computer Science & Engineering;Oct2012, Vol. 4 Issue 10, p1691 

    Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many...

  • Markov Chain Based Roaming Schemes for Honeypots. Tapaswi, Shashikala; Mahboob, Adnan; Shukla, Ajay; Gupta, Ishan; Verma, Pranshu; Dhar, Joydip // Wireless Personal Communications;Sep2014, Vol. 78 Issue 2, p995 

    The paper proposes a reactive roaming scheme for honeypots. The main aim of a honeypot is to capture the activities of the attacker. If the attacker detects honeypot on a system, its value drops. So, the concept of roaming honeypots is being proposed, to prevent the attacker from detecting the...

  • EMPIRICAL TEST OF A HACKING MODEL: AN EXPLORATORY STUDY. Bento, Al; Bento, Regina // Communications of the Association for Information Systems;2004, Vol. 14, p678 

    This exploratory study is an empirical test of a model of the activities involved in hacking attacks, and the conditions associated with the increase in these activities. In a methodological innovation, the variables in the model were measured using non-reactive, secondary data obtained from...

  • Honeypots Aiding Network Forensics: Challenges and Notions. Nasir, Qassim; Al-Mousa, Zahraa A. // Journal of Communications;Nov2013, Vol. 8 Issue 11, p700 

    risks as attacks are increasing day after day. Network forensics is the process of investigation such attacks through analyzing network data and events. Many challenges are facing investigators due to the rapid growing of network scale and intruders' skills. Honeypots are computer traps that are...

  • Active breach detection. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Feb2016, Vol. 27 Issue 2, p35 

    The article offers information on emerging products group known as active breach detection and cyber deception. It states that this products group protect the enterprise from cyber risk using next-generational computational and analytical techniques. It also uses honeypots and honeynets to...

  • INTRODUCTION: PROLEGOMENA - HACKING CYBERSPACE.  // Hacking Cyberspace;Feb2001, p1 

    An introduction to the book "Hacking Cyberspace," by David J. Gunkel is presented.

  • What is Hacking? Grattafiori, Aaron "dyn" // Military Technology;2015, Vol. 39 Issue 11, p67 

    The article focuses on the concerns of hacking and cybersecurity, and mentions the impact of hackers on wireless communication and online banking.

  • The secret hacker wars. Vistica, Gregory L.; Thomas, Evan // Newsweek;6/1/1998, Vol. 131 Issue 22, p60 

    Reports on the vulnerability of the United States Pentagon, government agencies and private businesses to information warfare (IW). The threat of computer hackers working for foreign governments or terrorists; Cyber raids, such as one reported by the Federal Bureau of Investigation into the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics