Security in Web Application
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered design wherein the webserver runs the application as the front end logic and data are outsourced to a database. Existing, request from user directly access to main server which connected to database. So there is a possibility of hacking the request also attacks plays a key role in this situation. In order to overcome this drawback, double guard is proposed for the user session across both the front-end logic and back-end database. By monitoring both web and subsequent database request, paved for detecting the attacks that an intrusion detection system would not able to identify. Double guard achieved by using a technique named Light Weight Virtualization, in which a container is maintained for detecting attacks. Here the web container acts as intermediate server between user and main server. Furthermore, technique has been enhanced by not only detecting the attacks also for security purpose.
Authors and Affiliations
P Shopa, N Sumitha, P. S. K Patra
M Commerce in India: Promise and Problems
The purpose of this research paper is to make the readers aware of current scenario and status of commerce in India especially M- commerce or mobile commerce. Now a days mobile phone rather smart phones, tablets, I-pa...
A Novel Method for Crawl Forum Threads
In internet crawler it is program that visits websites and reads their pages and other information in order to create entries for a search engine index. Now we introducing forum crawler which traverses the web forum...
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
http://www.ijrcct.org/index.php/ojs/article/view/555/pdf
Cloud computing provides a huge data services to the user in an easy and comfortable way over the internet. We presenting a new platform for cloud computing called Data Protection as a Service which is significantly...
Scent Rupture Nodes Using DCD In Wireless Sensor Networks
A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...