Call for Paper - October 2014 Edition
IJCA solicits original research papers for the October 2014 Edition. Last date of manuscript submission is September 20, 2014. Read More

Dual Safeguard: Intrusion Detection and Prevention System in Web Applications

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 9
Year of Publication: 2013
M. Sujitha
P. Suganya
T. Shampavi
S. Anjanaa

M Sujitha, P Suganya, T Shampavi and S Anjanaa. Article: Dual Safeguard: Intrusion Detection and Prevention System in Web Applications. International Journal of Computer Applications 67(9):13-18, April 2013. Full text available. BibTeX

	author = {M. Sujitha and P. Suganya and T. Shampavi and S. Anjanaa},
	title = {Article: Dual Safeguard: Intrusion Detection and Prevention System in Web Applications},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {9},
	pages = {13-18},
	month = {April},
	note = {Full text available}


Web applications are the most universal way to make services and data accessible on the Internet. With the increase in the use of these applications, there has also been an increase in the amount and complexity of vulnerabilities and attacks. These attacks target directly the back-end database systems of the web application to achieve information. In this paper, a Dual Safeguard Intrusion Detection and Prevention System was proposed to models the user network behaviors and create normality models of isolated user sessions across both front-end and back-end of the application. To accomplish this, a Lightweight virtualization technique is used to allocate each user's web session to a dedicated container, providing an isolated virtual computing environment. An Intrusion Detection Model for web applications based on Hidden Markov Model was also proposed.


  • M. Le, A. Stavrou and B. B. Kang, "DoubleGuard: Detecting Intrusions in Multitier Web Applications", IEEE Transactions On Dependable And Secure Computing, vol. 9, no. 4, July/August 2012
  • K. Bai, H. Wang, and P. Liu, "Towards Database Firewalls," Proc. Ann. IFIP WG 11. 3 Working Conf. Data and Applications Security (DBSec '05), 2005.
  • Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia, "Efficiently Tracking Application Interactions Using Lightweight Virtualization," Proc. First ACM Workshop Virtual Machine Security, 2008.
  • R. Sekar, "An Efficient Black-Box Technique for Defeating Web Application Attacks," Proc. Network and Distributed System Security Symp. (NDSS), 2009.
  • G. Vigna, F. Valeur, D. Balzarotti, W. K. Robertson, C. Kruegel, and E. Kirda, "Reducing Errors in the Anomaly-Based Detection of Web-Based Attacks through the Combined Analysis of Web Requests and SQL Queries," J. Computer Security, vol. 17, no. 3, pp. 305-329, 2009.
  • SANS,"The Top Cyber Security Risks," http://www. sans. org/top-cyber-security-risks/, 2011.
  • "Common Vulnerabilities and Exposures," http://www. cve. mitre. org/, 2011.
  • "Five Common Web Application Vulnerabilities," http://www. symantec. com /connect/articles/five-common-web application vulnerabilities, 2011.
  • Greensql, http://www. greensql. net/, 2011.
  • Openvz, http://wiki. openvz. org, 2011.
  • A. Schulman, "Top 10 Database Attacks," http://www. bcs. org/server. php, 2011.
  • W. Robertson, F. Maggi, C. Kruegel, and G. Vigna, "Effective Anomaly Detection with Scarce Training Data," Proc. Network and Distributed System Security Symp. (NDSS), 2010.
  • M. Roesch, "Snort, Intrusion Detection System," http://www. snort. org, 2011.
  • B. Parno, J. M. McCune, D. Wendlandt, and A. Perrig, "CLAMP: Practical Prevention of Large-Scale Data Leaks," Proc. IEEE Symp. Security and Privacy, 2009.