**Author details**

M. Veena1 , S. Upasana1 , S. Prathima1 and Sudha Senthilkumar2 \*

1 VIT University, Vellore, India

2 School of Information Technology and Engineering, VIT University, Vellore, India

\*Address all correspondence to: sudha.s@vit.ac.in

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**21**

org/

*A Detection of Malware Embedded into Web Pages Using Client Honeypot*

[14] Available from: http://www.

[15] Ramaswamy C, Sandhu R. Rolebased access control features in commercial database management

[16] Skoudis E, Zeltser L. Malware: Fighting Malicious Code. Prentice Hall;

[18] Available from: http://www.cs.vu.

Mavrommatis P, Wang K, Modadugu N. The ghost in the browser analysis of web-based malware [Online]. 2007. Available from: http://www.usenix.org/ events/hotbots07/tech/full\_papers/ provos/provos.pdf [Accessed: 11

honeynet.org/node/158

systems. Citeseer 1998

[17] Available from: http:// monkeyspider.sourceforge.net/

nl/~herbertb/misc/shelia/

[19] Provos N, McNamee D,

[20] Secure Browsing. Malware Protection. Trustwave. Available from: https://www.trustwave.com/

February 2009]

securebrowsing/

2003. p. 3

*DOI: http://dx.doi.org/10.5772/intechopen.89646*

[1] Sun X, Wang Y, Ren J, Zhu Y, Liu S. Collecting Internet malware based on client-side honeypot. In: 9th IEEE International Conference for Young Computer Scientists (ICVCS 2008);

[2] Spitzner L. Honeypots: Tracking Hackers. Addison Wesley; 2002

[3] Honeynet Project. Know Your Enemy: Defining Virtual Honey/ nets. 2003. Available from: http://old.

[4] Danford R. —2nd Generation Honeyclients. SANS Internet Storm Center; 2006. Available from: http:// handlers.dshield.org/rdanford/pub/ Honeyclients\_Danford\_SANS 06.pdf

[5] Available from: http://www.

honeynet.org/capture-hpc

org/wiki/HoneyMonkey

honeynet.org/honeyc

org/security/overview

org/wiki/Client\_honeypot

com/p/phoneyc/

(ICSTW); 2010

[6] Available from: https://projects.

[8] Available from: https://projects.

[9] Available from: http://www.xnos.

[10] Available from: http://code.google.

[11] Available from: https://en.wikipedia.

[12] Available from: http://www.spybye.

[13] Alosefer Y, Rana O. Honeyware: A web-based low interaction client honeypot. In: Third International Conference on Software Testing, Verification, and Validation Workshops

[7] Available from: http://en.wikipedia.

honeyclient.org/trac

honeynet.org/papers/virtual/

2008. pp. 1493-1498

**References**

*A Detection of Malware Embedded into Web Pages Using Client Honeypot DOI: http://dx.doi.org/10.5772/intechopen.89646*
