Intrusion Detection System in Web Services
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Comparative Studies | Computer Science & Engineering | India | Volume 2 Issue 2, February 2013

Intrusion Detection System in Web Services

Muthu Kumara Raja, Bala Sujitha.T.V

Today, web applications have become a ubiquitous use of daily tasks, such as banking, travel, and social networking, etc., Due to their ubiquitous use for daily tasks, web applications have always been the target of attacks. In the existing system, communication between the web server and the database server is not separated, and can hardly understand the relationships among them. We propose an efficient IDS system as Double Guard with lightweight virtualization that models the network behavior for multi-tiered web applications of user sessions and able to identify ferret out attacks. Casual Mapping profile model is newly developed to map between the web server requests and the subsequent DB queries, identifies the various types of attacks and minimize the false positives for both static and dynamic web application.

Keywords: Attacks, Lightweight Virtualization, Multitier Web Application, SQL Injection, Vulnerable

Edition: Volume 2 Issue 2, February 2013

Pages: 224 - 228

Share this Article

How to Cite this Article?

Muthu Kumara Raja, Bala Sujitha.T.V, "Intrusion Detection System in Web Services", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013440, Volume 2 Issue 2, February 2013, 224 - 228

61 PDF Views | 53 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attacks'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 600 - 606

Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article

Similar Articles with Keyword 'Lightweight Virtualization'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 440 - 445

Container Based Intrusion Detection System in Multitier Web Applications

Nishigandha Shendkar

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 224 - 228

Intrusion Detection System in Web Services

Muthu Kumara Raja, Bala Sujitha.T.V

Share this Article

Similar Articles with Keyword 'Multitier Web Application'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 440 - 445

Container Based Intrusion Detection System in Multitier Web Applications

Nishigandha Shendkar

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 224 - 228

Intrusion Detection System in Web Services

Muthu Kumara Raja, Bala Sujitha.T.V

Share this Article

Similar Articles with Keyword 'SQL Injection'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1556 - 1561

A Survey on SQL Injection Attack Countermeasures Techniques

Aniruddh R. Ladole, D. A. Phalke

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 224 - 228

Intrusion Detection System in Web Services

Muthu Kumara Raja, Bala Sujitha.T.V

Share this Article

Similar Articles with Keyword 'Vulnerable'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2500 - 2506

Detection and Mitigation of Greyhole Attack in Wireless Sensors Network Using Trust Mechanism

Bansi S. Kantariya, Dr. Narendra M. Shekokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2021 - 2024

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

Share this Article
Top