作者
Allen Pomeroy, Qing Tan
发表日期
2011/8/31
研讨会论文
2011 IEEE 11th International Conference on Computer and Information Technology
页码范围
552-556
出版商
IEEE
简介
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of these applications is dependent on end user trust, although these services have serious weaknesses that can be exploited by attackers. Application owners must take additional steps to ensure the security of customer data and integrity of the applications, since web applications are under siege from cyber criminals seeking to steal confidential information and disable or damage the services offered by these applications. Successful attacks have lead to some organizations experiencing financial difficulties or even being forced out of business. Organizations have insufficient tools to detect and respond to attacks on web applications, since traditional security logs have gaps that make attack reconstruction nearly impossible. This paper explores network recording challenges, benefits …
引用总数
2010201120122013201420152016201720182019202020212022202320241113341331332
学术搜索中的文章
A Pomeroy, Q Tan - 2011 IEEE 11th International Conference on Computer …, 2011