Main Reference PaperDoubleGuard: Detecting Intrusions in Multitier Web Applications, Transactions on Dependable and Secure Computing, July 2012
  • This paper presents DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, it enables to ferret out attacks that an independent IDS would not be able to identify. Furthermore, it quantifies the limitations of any multitier IDS in terms of training sessions and functionality coverage.

+ Description
  • This paper presents DoubleGuard, an IDS system that models the network behavior of user sessions across both the front-end webserver and the back-end database. By monitoring both web and subsequent database requests, it enables to ferret out attacks that an independent IDS would not be able to identify. Furthermore, it quantifies the limitations of any multitier IDS in terms of training sessions and functionality coverage.

  • To detect attacks in multitiered web services.

  • To create a normality models of isolated user sessions that include both Front End and Back End,

  • To propose and produce effective light weight virtualizaition technique.

+ Aim & Objectives
  • To detect attacks in multitiered web services.

  • To create a normality models of isolated user sessions that include both Front End and Back End,

  • To propose and produce effective light weight virtualizaition technique.

  • The contribution method provides a means of tracking the information flow from the web server to the database server for each session. The approach also does not require us to analyze the source code or know the application logic. Virtualization, is based on grouping one or more services inside a unique wrapper, which is then published as a standard service.

+ Contribution
  • The contribution method provides a means of tracking the information flow from the web server to the database server for each session. The approach also does not require us to analyze the source code or know the application logic. Virtualization, is based on grouping one or more services inside a unique wrapper, which is then published as a standard service.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2EE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.