Abstract | ||
---|---|---|
The stealthy reconnaissance phase is crucial in a cyber-attack. The reconnaissance tools usually limit themselves from balancing between collecting most targetsu0027 information possible while hiding itself from being detected by targetu0027s defence systems. We assert the role of reconnaissance in web application security attack and evaluate the selected reconnaissance tools in both effectiveness (information gained) and stealth level. We experimentally realised that the reconnaissance tools employing a botnet (or bot, or zombie)-based model has high performance (high level of stealth and little information loss). |
Year | Venue | Field |
---|---|---|
2016 | IJIPSI | Information loss,Botnet,Computer security,Computer science,Zombie,Web application security,Web application |
DocType | Volume | Issue |
Journal | 2 | 3 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ha-Thanh Le | 1 | 7 | 3.07 |
Peter K. K. Loh | 2 | 63 | 9.70 |
Chiew Tong Lau | 3 | 406 | 35.82 |