Open Access   Article Go Back

Enhancing Web Security Based on Network Algorithm

N. Jebaseeli1 , L. Jayasimman2 , B.S. Kumar3

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-9 , Page no. 138-140, Sep-2016

Online published on Sep 30, 2016

Copyright © N. Jebaseeli, L. Jayasimman, B.S. Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Jebaseeli, L. Jayasimman, B.S. Kumar, “Enhancing Web Security Based on Network Algorithm,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.138-140, 2016.

MLA Style Citation: N. Jebaseeli, L. Jayasimman, B.S. Kumar "Enhancing Web Security Based on Network Algorithm." International Journal of Computer Sciences and Engineering 4.9 (2016): 138-140.

APA Style Citation: N. Jebaseeli, L. Jayasimman, B.S. Kumar, (2016). Enhancing Web Security Based on Network Algorithm. International Journal of Computer Sciences and Engineering, 4(9), 138-140.

BibTex Style Citation:
@article{Jebaseeli_2016,
author = { N. Jebaseeli, L. Jayasimman, B.S. Kumar},
title = {Enhancing Web Security Based on Network Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2016},
volume = {4},
Issue = {9},
month = {9},
year = {2016},
issn = {2347-2693},
pages = {138-140},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1067},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1067
TI - Enhancing Web Security Based on Network Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - N. Jebaseeli, L. Jayasimman, B.S. Kumar
PY - 2016
DA - 2016/09/30
PB - IJCSE, Indore, INDIA
SP - 138-140
IS - 9
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1453 1368 downloads 1452 downloads
  
  
           

Abstract

The aim of this research work is to study the security issues in the Web learning environment. Problems in Web learning system are related to networking issues, database management issues, operating system related issues, memory and sharing issues, resource channeling issues, learners� authenticity related issues, load related issues, virtualization-related issues, management information system, etc., These above said issues are very common and hurdle in Web learning environment. From Web service providers to learners there are many possibilities in security lapse. The service providers have possibilities to control the system, but controlling the flow of information and controlling the technology such as networking and database usage, virus and information related laws are difficult to manage. There are possibilities to control the flow of information from every stage from the main service provider to users. Data losses can be minimized by maintaining the local backups separately. By developing the infrastructure, a service provider can facilitate the communication between the learner and the educator. Storing the sensitive data in a secured place is the best method to save. Storing the important data in the Web has a potential risk. This review paper critically analyzes the various issues related to Web security

Key-Words / Index Term

Web learning, Web computing, Security, Network, Web security issues, Data loss, Information laws, Backups

References

[1]. Thiruselvan, ArunShanmugam, kesavamoorthy, (Jan 2012), �An intelligent fast-flux swarm network for minimizing DDoS attacks in Web computing�, International conference on recent trends in information processing�, pp. 297-303, ISSN 978-81-8371-412-9
[2] J. Mirdovic and P, Rieher, (2005), �D-WARD: A source-end defense against denial of service attacks�, IEEE Trans, Dependable and secure computing, Vol,2, 2005, 216-232.
[3] J. Stoica et al, (2002), �Internet Indirection infrastructure�, proceedings of conference applications, techniques, architecture, and protocols for computers common, Pittsburgh, PA
[4] Gangadevi, (Jan 2012), �A new web-based architecture, based on iris biometrics technique to decrease credit cards frauds over the internet�, International conference on recent trends in information processing�, pp. 280-283, ISSN 978-81-8371-412-9
[5] Shin, S., &Gu, G. (2012, October). WebWatcher: Network security monitoring using OpenFlow in dynamic Web networks (or: How to provide security monitoring as a service in Webs?). In Network Protocols (ICNP), 2012 20th IEEE International Conference on (pp. 1-6). IEEE.
[6] Alan Jolliffe, Jonathan Ritter, David Stevens (2001), �The online learning� Higher Education Supplement, Kogan Page Ltd, 2001.
[7] L. Jayasimman, E. George Dharma Prakash Raj (2012), �Web Learning Systems and Cognitive Learning: A Survey�,International Journal of Computer Science andTelecommunications, UK, Volume 3, Issue 7, pp. 91-94, July2012, ISSN 2047- 3338
[8] Cook DA, Dupras DM. (20104), �A practical guide to developing effective web Based learning�, Journal of General Internal Medicine, Vol. 19, No. 6, PP. 698-707, 2004.
[9] Joi L. Moore, Camille Dickson-Deane, Krista Galyen, (2011), �E-Learning, online learning, and distance learning environments: Are they the same?� The Internet and Higher Education, 2010 Elsevier Inc.14 (2011) 129�135.
[10]Nikos Tsianos*, Zacharias Lekkas*, PanagiotisGermanakos*t, Costas Mourlas*, George Samarast (2008), �Personalizing web environments on user intrinsic characteristics�, IEEE- IET 4th International Conference on Intelligent Environments, 2008. DOI: 10.1049/cp:20081173