2012
DOI: 10.1109/tdsc.2011.59
|View full text |Cite
|
Sign up to set email alerts
|

DoubleGuard: Detecting Intrusions in Multitier Web Applications

Abstract: Abstract-Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multi-tiered design wherein the web server runs the application front-end logic and data is outsourced to a database or file server.In this paper, we present DoubleGuard, an IDS system that models the network behavior of user sessions across both t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(27 citation statements)
references
References 22 publications
(19 reference statements)
0
27
0
Order By: Relevance
“…IDS keep track of the different possible request from the user and make query to monitor these attacks [9]. It can be treated as an immune system for the system.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…IDS keep track of the different possible request from the user and make query to monitor these attacks [9]. It can be treated as an immune system for the system.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…The Communication between User Interface (UI) Server and Database (DB) Server becomes the common architecture in the wholesome internet applications. Mixing Le, AngelosStavrou [4] analyzed the omnipresent nature of internet based client server application and a Double Guard Intrusion Detection System with light weight virtualization is adapted to prevent the attacks over multi tiered web services [1], [2]. Using this technique, an effective two level scrutinization which includes a front end validation and backend validation and an intermediate ID between the two tiers will take care of communicating in the proper direction to safeguard the system.…”
Section: Literature Surveymentioning
confidence: 99%
“…monitoring webserver at front-end and databases at backend but this approach has hindered due to dependency on static websites [20]. For enhanced detection rates, Discontiguous system calls are used but the overhead of building datasets offline with confined trained data is there [21].…”
Section: Related Workmentioning
confidence: 99%