Security in Web Application
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered design wherein the webserver runs the application as the front end logic and data are outsourced to a database. Existing, request from user directly access to main server which connected to database. So there is a possibility of hacking the request also attacks plays a key role in this situation. In order to overcome this drawback, double guard is proposed for the user session across both the front-end logic and back-end database. By monitoring both web and subsequent database request, paved for detecting the attacks that an intrusion detection system would not able to identify. Double guard achieved by using a technique named Light Weight Virtualization, in which a container is maintained for detecting attacks. Here the web container acts as intermediate server between user and main server. Furthermore, technique has been enhanced by not only detecting the attacks also for security purpose.
Authors and Affiliations
P Shopa, N Sumitha, P. S. K Patra
A Review On Blood Pressure Measuring Devices For Humans
There has been a rising trend in blood pressure patients in the world, due to variety of diseases and stress related issues. Apart, from that the technologies used today are very outdated and cumbersome, while the new...
Multichannel Contact Center
A Contact Center is a central point in an organization from which a customer contact is being managed. Contact Center plays an important role in one-to-one customer interactions. Multichannel provides various channel...
Procedure Dynamic Network and Prevent Mobile Typically Extension
Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and...
FPGA Based Signal Security Using FHSS
Security of the data, information is the major topic of concern in the today’s world of technology. Only password protection security is not sufficient from the intentional interference of data. This work is based on...
Sprinkling Data Prevents From Intruders
The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...