Double Guard: Detecting Intrusions in Multitier Internet Applications
Tilottama Bachhav1 , Komal Dhamane2 , TrutiyaKapadnis 3 , Vaishali Wagh4
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-9 , Page no. 198-200, Sep-2015
Online published on Oct 01, 2015
Copyright © Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh, “Double Guard: Detecting Intrusions in Multitier Internet Applications,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.198-200, 2015.
MLA Citation
MLA Style Citation: Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh "Double Guard: Detecting Intrusions in Multitier Internet Applications." International Journal of Computer Sciences and Engineering 3.9 (2015): 198-200.
APA Citation
APA Style Citation: Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh, (2015). Double Guard: Detecting Intrusions in Multitier Internet Applications. International Journal of Computer Sciences and Engineering, 3(9), 198-200.
BibTex Citation
BibTex Style Citation:
@article{Bachhav_2015,
author = {Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh},
title = {Double Guard: Detecting Intrusions in Multitier Internet Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {198-200},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=668},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=668
TI - Double Guard: Detecting Intrusions in Multitier Internet Applications
T2 - International Journal of Computer Sciences and Engineering
AU - Tilottama Bachhav, Komal Dhamane, TrutiyaKapadnis, Vaishali Wagh
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 198-200
IS - 9
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2420 | 2272 downloads | 2547 downloads |




Abstract
Today, net services and applications have become an indivisible part of our daily life. So as to suit during this increase in application and data quality, web services have rapt to a multi-tier design in which, web server runs the application front-end logic and knowledge area unit which are out sourced to information or digital computer. Double-Guard is associate IDS that model the network behavior of user sessions across every front-end net server and additionally the back-end information. By watching both web and consequent database requests, system is able to find out attacks that free-lance IDS wouldn’t be able to determine. This system have tendency to quantify the short comings of any multi-tier IDS in terms of coaching sessions and practically coverage. Double Guard is implemented using an Apache web server with MySQL and light-weight virtualization. Finally, using Double-Guard, system has a tendency to expose a large range of attacks.
Key-Words / Index Term
Anomaly detection, virtualization, multitier internet application, Attacks, Dedicated Containers
References
[1]. Green SQL, http://www.greensql.net/, 2011.
[2]. Open VZ, http://wiki.openvz.org, 2011.
[3]. B. Parno, J.M. McCune, D. Wendlandt, D.G. Andersen, and A. Perrig, “CLAMP: Sensible hindrance of Large-Scale information Leaks,” Proc. IEEE Symp. Security and Privacy, 2009.
[4]. sqlmap, http://sqlmap.sourceforge.net/, 2011.
[5]. A. Schulman, “Top ten DB Attacks,” http://www.bcs.org/server.php?show=ConWebDoc.8852, 2011.
[6]. T. Hendrik Verwoerd and R. Hunt, “Intrusion Detection Techniques andApproaches,” Computer Comm., vol. 25, no. 15, pp. 1356-1365, 2002.
[7]. “Five Common net Application Vulnerabilities,” http://www.symantec.com/connect/articles/five-common-web-application vulnerabilities, 2011.
[8]. Linux-vserver, http://linux-vserver.org/, 2011.
[9]. Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia. Efficiently tracking
[10]. “Virtuozzo Containers”,www.parallels.com/products/ pvc45/ ,2011. Application interactions using lightweight virtualization. In Proceedingsof the 1st ACM workshop on Virtual machine security, 2008.
[11]. S. Potter and J. Nieh. Apiary: Easy-to-use desktop application faultcontainment on commodity operating systems. In USENIX 2010 Annual Technical Conference on Annual Technical Conference.
[12]. Meixing Le, Angelos Stavrou, Member, IEEE, and Brent ByungHoon Kang, Member, IEEE “DoubleGuard: Detecting Intrusionsin Multitier Web Applications”. IEEE transactions on dependable and secure computing, vol. 9, no. 4, march 2014