Multi-Tier Web Security on Web Applications from Sql Attacks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: This paper deals with the techniques that are used to prevent the web applications from web security vulnerabilities caused by hackers which leads to the misusage of data. Web services and applications have increased in both popularity and complexity over the past few years. Daily tasks, such as purchasing, banking, travel, and social networking, are all done via the web. Web services have always been the target of attacks. These attacks have recently become more diverse, as attention has shifted from attacking the front end to exploiting vulnerabilities of the web applications in order to corrupt the back-end database system. We present Double Guard, a system used to detect attacks in multitier web services. Our approach can create normality models of isolated user sessions that include both the web front-end and back-end network transactions. We analyze principles of SQL attacks, study a database protection system which is used between the Web application and the database. The role of a Web application and database in the database between the protection system for ordinary users and administrators were made by different users of protective measures to effectively guarantee the security of the database.
Authors and Affiliations
S. Suganya , D. Rajthilak , G. Gomathi
Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment
Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will b...
3d Object Recognition Using Centroidal Representation
Abstract: Three dimensional object recognition from two-dimensional image is implemented in this work with the use of 512 different poses of the object (which is represented by an airplane or a cube or a satellite). The...
An Analytical Review of the Algorithms Controlling Congestionin Vehicular Networks
Abstract: Vehicular AdhocNETworks (VANETs) relies on repetitive data exchange among vehicles andvehicles to RoadSide Units (RSU) to facilitate road safety, route planning, etc. This may often lead to congestionin the net...
Neural Networks Optimization, Using the Genetic Algorithm
Abstract: There are many ways in neural networks optimization by genetic algorithm. One of the optimization methods is the neural networks repetition. The main idea of this method is that the model is developed at first...
Car Dynamics using Quarter Model and Passive Suspension,Part VI: Sprung-mass Step Response
Abstract: The objective of the paper is to investigate the step response of a 2 DOF quarter-car model withpassive suspension. The mathematical models of the sprung-mass displacement and acceleration as response tothe ste...