alexa Abstract | Complete Monitoring Of Web by Session Control Using Multi-Tier Container Concept
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on:
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


Today web applications have become a ubiquitous use of daily tasks such as banking, travel and social networking; etc. Web services provide communication and management of personal information from anywhere. With the increase in the use of these applications, there is an increase in the number and complexity of vulnerabilities and attacks. Due to their ubiquitous use for everyday tasks, web applications have always been the target of attacks. Intrusion Detection System (IDS) is proposed with lightweight virtualization that models the network behaviour for web applications. By monitoring the web and subsequent database requests, it can identify the attacks and provide early warning about suspicious activities. Casual mapping model is developed between web server requests and subsequent database queries which identifies various kinds of attacks. Each session is assigned with each container for single user. The container ID accurately associates the web request with the subsequent DB queries. Session control is used to control each session for each user request. Honey pot method is implemented to collect the intruder’s behaviors and stores that details in session block list table. Whenever a new session is tracked for Intrusion Detection, it is first referred with the session block list. If the tracked session is matched with the session block list table then it is avoided to enter into the session. Hence, the Intrusion avoidance can be achieved in an efficient manner.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): Vincila.A, Gopalakrishna Moorthy.K, Saranya.R

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version