Security in Web Application

Abstract

Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered design wherein the webserver runs the application as the front end logic and data are outsourced to a database. Existing, request from user directly access to main server which connected to database. So there is a possibility of hacking the request also attacks plays a key role in this situation. In order to overcome this drawback, double guard is proposed for the user session across both the front-end logic and back-end database. By monitoring both web and subsequent database request, paved for detecting the attacks that an intrusion detection system would not able to identify. Double guard achieved by using a technique named Light Weight Virtualization, in which a container is maintained for detecting attacks. Here the web container acts as intermediate server between user and main server. Furthermore, technique has been enhanced by not only detecting the attacks also for security purpose.

Authors and Affiliations

P Shopa, N Sumitha, P. S. K Patra

Keywords

Related Articles

M Commerce in India: Promise and Problems

The purpose of this research paper is to make the readers aware of current scenario and status of commerce in India especially M- commerce or mobile commerce. Now a days mobile phone rather smart phones, tablets, I-pa...

A Novel Method for Crawl Forum Threads

In internet crawler it is program that visits websites and reads their pages and other information in order to create entries for a search engine index. Now we introducing forum crawler which traverses the web forum...

A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography

My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...

http://www.ijrcct.org/index.php/ojs/article/view/555/pdf

Cloud computing provides a huge data services to the user in an easy and comfortable way over the internet. We presenting a new platform for cloud computing called Data Protection as a Service which is significantly...

Scent Rupture Nodes Using DCD In Wireless Sensor Networks

A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...

Download PDF file
  • EP ID EP27905
  • DOI -
  • Views 246
  • Downloads 0

How To Cite

P Shopa, N Sumitha, P. S. K Patra (2014). Security in Web Application. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27905