A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Today the usage of computer for web applications is increasing day by day. Most of the transactions such as banking, travel etc are done through web. So the targets of attacks towards web applications are also increasing. The paper here discusses about various intrusions detection mechanisms. This strategy mainly focus on the detection of intrusion in multitier web applications. Multitier web application include two servers that is front end as well as back end. The front end include web server is responsible to run the application and gives that output to back end. IDS are used to detect intrusions and monitoring the activities in the system as well as the whole network. The intrusion can also prevent many types of attacks such as sql injection, session future hijack etc. here the paper discuss about various intrusion detection mechanism.
Authors and Affiliations
Chinchu M. M, Deepthy Mathews
E-Commerce through Smart Devices in Emerging India
Recent developments in the area of Mobile Technology and Information Technology have led to rehabilitated interest in Electronic Commerce in organizations and societies. Electronic Commerce is supporting of customers,...
Enhance The Performance Of Mobile Presence Services By Scalable Server Architecture (Presence Cloud)
A mobile existence overhaul is a necessary constituent of a social network application as it uphold each mobile user’s presence information such as the current status, GPS location and network address. Also updates t...
Z-source Inverter based DVR for Power Quality Improvement
Interest in Power Quality has been explicitly seen in Electrical Power Engineering since past decade, even though utilities all over the world have for decades worked on the improvement of voltage quality, what is no...
Security and Privacy in the Context of the Public Clouds
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...
Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID
Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences...