Dg: Modeling Network Behavior for Static and Dynamic Websites
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multi-tiered design wherein the webserver runs the application front-end logic and data are outsourced to a database or file server. This project presents DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, we are able to ferret out attacks that independent IDS would not be able to identify. The limitations of any multitier IDS in terms of training sessions and functionality coverage will be quantified. We impl emented DoubleGuard using an Apache webserver with MySQL and lightweight virtualization. We then collected and processed realworld traffic over a 15-day period of system deployment in both dynamic and static web applications.
Authors and Affiliations
A Krishna Mohan, Rayhana Ibrahim, Abdul Khalil Azizi
Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although usi...
Data Security in Cloud Computing using RSA Algorithm
Cloud Computing is an emerging paradigm which has become today’s hottest research area due to its ability to reduce the costs associated with computing. In today’s era, it is most interesting and enticing technology whi...
Power Dissipation Reduction In CMOS Circuits Using Power Gating Scheme
In this paper by victimization power gating technique we tend to reduced the discharge power of the Conditional information Mapping Flip-flop .In, this gift days low power technology is increasing chop-chop, majorly...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
A Technique To Solve Real-World Problems In Text Classification, Computer Vision, And Bioinformatics
The key confront of online feature selection is how to create precise prediction for an example by means of a small number of active features. This is in difference to the traditional setup of online knowledge where a...