VirtuaGuard: Intrusion Detection System on Static and Dynamic Web Applications
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
In this project, we propose an efficient IDS system called as VirtuaGuard system that models the network behavior for multilayered web applications of user sessions across both front-end web (HTTP) requests and back-end database (SQL) queries. In this system, VirtuaGuard forms container-based IDS with multiple input streams to produce alerts. In typical three-tiered web server architecture, the web server receives HTTP requests from user clients and then issues SQL queries to the database server to retrieve and update data. This proposed container-based and sessionseparated web server architecture enhances the security performances and also provides the isolation between the information flows that are separated in each container session. In order to detect the abnormal behaviors on a session/client level, Casual Mapping profile model is newly developed to map between the web server requests and the subsequent DB queries.
Authors and Affiliations
AJINKYA NIKAM , BHIM BIRADAR , SAGAR DHERE , PRAHSANT SONAWANE , Prof . Ruta Kulkarni
Reduction of Data at Namenode in HDFS using harballing Technique
HDFS stands for the Hadoop Distributed File System. It has the property of handling large size files (in MB’s, GB’s or TB’s). Scientific applications adapted this HDFS/Mapreduce for large scale data analytics [1]....
Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtai...
Frequent Itemset Mining Technique in Data Mining
In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by c...
Criminals and crime hotspot detection using data mining algorithms: clustering and classification
Criminal activities have been increased tremendously. So security has become a major issue to the people. The control actions should be taken by the police department. The police department has to take corrective...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...