Double guard: Detecting Interruptions in N- Tier Web Applications
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4
Abstract
Internet services and applications contain develop into an inextricable part of daily life and make possible communication between the management of personal information from anywhere. To put up this increase in application and data complexity, web services have moved to a multi-tiered design wherein the web server runs the application front-end logic and data is outsourced to a database or file server. Double Guard is an IDS system that models the network behavior of user sessions across both the front-end web server and the back-end database. By monitoring both web and succeeding database requests, we are able to search out attacks that an independent IDS would not be able to identify. In addition, we compute the limitations of any multitier IDS in terms of training sessions and functionality coverage. Then we collected and processed real-world traffic over a system deployment in both dynamic and static web applications.
Authors and Affiliations
P. Krishna Reddy
Face Detection System on Ada boost Algorithm Using Haar Classifiers
This paper presents an architecture for face detection based system on AdaBoost algorithm using Haar features. We describe here design techniques including image scaling, integral image generation, pipelined proc...
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Managing water resources is mostly required at watershed scale where the complex hydrology processes and interactions linking land surface, climatic factors and human activities can be studied. Geographical Informat...
Improving E-learning System using Ontology Web Language
In recent years, most of the conventional education are suitable for requirements of progress in educational development but they don’t able to cope up with the changes of learning demand in time, thus computer n...
A Finite Population Discrete Time Inventory System with Retrial Demands
In this paper, a discrete time inventory system with demands is generated by a finite number of homogeneous sources. The inter demand times of the primary arrival follows geometric distribution. The inven...
A Novel Acknowledgement based Intrusion Detection System for MANETs
In Mobile Ad Hoc Networks(MANETs), a set of interacting nodes should cooperatively implement the routing functions to enable end-to-end communication along dynamic paths composed by multi-hop wireless links. Severa...