Dg: Modeling Network Behavior for Static and Dynamic Websites
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multi-tiered design wherein the webserver runs the application front-end logic and data are outsourced to a database or file server. This project presents DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, we are able to ferret out attacks that independent IDS would not be able to identify. The limitations of any multitier IDS in terms of training sessions and functionality coverage will be quantified. We impl emented DoubleGuard using an Apache webserver with MySQL and lightweight virtualization. We then collected and processed realworld traffic over a 15-day period of system deployment in both dynamic and static web applications.
Authors and Affiliations
A Krishna Mohan, Rayhana Ibrahim, Abdul Khalil Azizi
Edge Detection to Enhance Definite Range Image Segmentation by Clustering Algorithms
Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodologies. However, edge detection provides rich information about the scene being observed...
EFFICIENT COLLABORATIVE SCIENTIFIC WORKFLOW COMPOSITION USING SERVICE ORIENTED COLLABORATION MODEL
Collaboration has become a dominant feature of modern science. Many scientific problems are beyond the realm of individual discipline or scientist to solve and hence require collaborative efforts. Modern scientific d...
A Comparative Study of Text Detection Algorithms for Natural Scenes
Text detection from image is highly needed application in current techno world. However, text detection is no longer an unsolved problem as many approaches/algorithms for it are encouraged by researchers. Algorithms...
(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...
A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...