CFP last date
20 May 2024
Reseach Article

Using Container Architecture to Detect Intrusion for Multitier Web Application

by Manoj E. Patil, Rakesh D. More
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 9
Year of Publication: 2013
Authors: Manoj E. Patil, Rakesh D. More
10.5120/10111-4769

Manoj E. Patil, Rakesh D. More . Using Container Architecture to Detect Intrusion for Multitier Web Application. International Journal of Computer Applications. 62, 9 ( January 2013), 37-40. DOI=10.5120/10111-4769

@article{ 10.5120/10111-4769,
author = { Manoj E. Patil, Rakesh D. More },
title = { Using Container Architecture to Detect Intrusion for Multitier Web Application },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number9/10111-4769/ },
doi = { 10.5120/10111-4769 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:22.679300+05:30
%A Manoj E. Patil
%A Rakesh D. More
%T Using Container Architecture to Detect Intrusion for Multitier Web Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 9
%P 37-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An intrusion detection system is a computer-based information system designed to collect information about malicious activities in a set of targeted IT resources, analyze the information, and respond according to a predefined security policy. The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Intrusion-detection systems aim at detecting attacks against computer systems and networks or in general, against information systems. This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. The front end include web server which can responsible to run the application and gives that output to back end i. e. file server. This strategy is useful to identify the intrusion at both front end and back end of web application.

References
  1. "Five Common Web Application Vulnerabilities," http://www. symantec. com/connect/articles/five-common-web-applicationvulnerabilities, 2011.
  2. "Common Vulnerabilities and Exposures," http://www. cve. mitre. org/, 2011.
  3. SANS, "The Top Cyber Security Risks," http://www. sans. org/ top-cyber-security-risks/, 2011.
  4. A. Schulman,"Top10DatabaseAttacks,"http://www. bcs. org/server. php?show=ConWebDoc. 8852, 2011.
  5. C. Anley, "Advanced Sql Injection in Sql Server Applications," technical report, Next Generation Security Software, Ltd. , 2002.
  6. Y. Shin, L. Williams, and T. Xie, "SQLUnitgen: Test Case Generation for SQL Injection Detection," technical report, Dept. of Computer Science, North Carolina State Univ. , 2006.
  7. J. Newsome, B. Karp, and D. X. Song, "Polygraph: Automatically Generating Signatures for Polymorphic Worms," Proc. IEEE Symp. Security and Privacy, 2005.
  8. H. -A. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Signature Detection," Proc. USENIX Security Symp. , 2004.
  9. Liang and Sekar, "Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers," SIGSAC: Proc. 12th ACM Conf. Computer and Comm. Security, 2005.
  10. B. I. A. Barry and H. A. Chan, "Syntax, and Semantics-Based Signature Database for Hybrid Intrusion Detection Systems", Security and Comm. Networks, vol. 2, no. 6, pp. 457-475, 2009.
  11. Meixing Le, Angelos Stavrou, Brent ByungHoon Kang, "DoubleGuard: Detecting Intrusions in Multitier Web Applications", IEEE transactions on dependable and secure computing, vol. 9, no. 4, july/august 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Multitier Architecture Pattern Mapping