Security in Web Application

Abstract

Internet services and applications have become a part of daily life, enabling communications from anywhere. To accommodate this increase in applications and data complexity, web services has moved to multi-tiered design wherein the webserver runs the application as the front end logic and data are outsourced to a database. Existing, request from user directly access to main server which connected to database. So there is a possibility of hacking the request also attacks plays a key role in this situation. In order to overcome this drawback, double guard is proposed for the user session across both the front-end logic and back-end database. By monitoring both web and subsequent database request, paved for detecting the attacks that an intrusion detection system would not able to identify. Double guard achieved by using a technique named Light Weight Virtualization, in which a container is maintained for detecting attacks. Here the web container acts as intermediate server between user and main server. Furthermore, technique has been enhanced by not only detecting the attacks also for security purpose.

Authors and Affiliations

P Shopa, N Sumitha, P. S. K Patra

Keywords

Related Articles

A Review On Blood Pressure Measuring Devices For Humans

There has been a rising trend in blood pressure patients in the world, due to variety of diseases and stress related issues. Apart, from that the technologies used today are very outdated and cumbersome, while the new...

Multichannel Contact Center

A Contact Center is a central point in an organization from which a customer contact is being managed. Contact Center plays an important role in one-to-one customer interactions. Multichannel provides various channel...

Procedure Dynamic Network and Prevent Mobile Typically Extension

Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and...

FPGA Based Signal Security Using FHSS

Security of the data, information is the major topic of concern in the today’s world of technology. Only password protection security is not sufficient from the intentional interference of data. This work is based on...

Sprinkling Data Prevents From Intruders

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...

Download PDF file
  • EP ID EP27905
  • DOI -
  • Views 250
  • Downloads 0

How To Cite

P Shopa, N Sumitha, P. S. K Patra (2014). Security in Web Application. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27905