Characterization of attacks collected from the deployment of Web service honeypot.
Abdallah GhourabiTarek AbbesAdel BouhoulaPublished in: Secur. Commun. Networks (2014)
Keyphrases
- reference architecture
- web services
- digital watermark
- malicious attacks
- countermeasures
- watermarking scheme
- collected data
- real world
- computer security
- service discovery
- business applications
- signal processing
- web service composition
- intrusion detection system
- survey data
- cryptographic protocols
- security threats
- web applications
- quality of service
- service providers