Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
The Internet services and different applications become vital part of every person’s life. Web services and applications have smoothened the way of users for the faster data access. To meet the user’s requirements for faster data retrieval, the web applications have moved towards multi-tier design where in the back-end server contains the data base and application interface or web server acts as the front end. The wide-spread use of web services has made them a target of attackers. Web Gate Keeper provides Intrusion Prevention Systems at both the ends (web server and database server). The prevention logic of our system works on session tracking and control. Through these Web Gate Keeper provides a secure environment for the application. Web Gate Keeper provides security for multi-tier web applications. Previously, IPSs were developed for Web servers and database servers separately. This scenario leads to the need of a system that prevents both of these simultaneously. The project aims at developing a system to provide complete security from external intruder.
Authors and Affiliations
Miss. Sanaz Jafari , Prof. Dr. Suhas H. Patil
Chunk Scheduling Strategies In Peer to Peer System-A Review
Peer-to-peer (P2P) streaming systems have become popular in recent years. Several peer- to-peer systems for streaming have been deployed recently. The challenges for P2P streaming have been on its scalability and video v...
Realizing Peer-to-Peer and Distributed Web Crawler
The tremendous growth of the World Wide Web has made tools such as search engines and information retrieval systems have become essential. In this dissertation, we propose a fully distributed, peer-to-peer architec...
Data mining approach to evaluate the data lossless Data Compression algorithms
: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression r...
Text Extraction From Images
Images and videos on webs and in databases are increasing. It is a pressing task to develop effective methods to manage and retrieve these multimedia resources by their content. Text, which carries high-level seman...
GA optimized SVD based signal detector for Cognitive radio Networks
This paper examines the implementation of the Genetic Algorithm (GA) optimized Singular Value Decomposition (SVD) method to detect the presence of wireless signal. We simulated the algorithm using common digital...