Enhancing Web Security Based on Network Algorithm

Authors

  • Jebaseeli N Assistant Professor Department of Computer Science, Bharathidasan University Constituent College, Lalgudi
  • L Jayasimman Assistant Professor Department of Computer Science, Srimad Andavan Arts & Science College, Tiruchy
  • B Senhtil Kumar Former Principal, ES Pan Asian College, India

Keywords:

Web learning, Web computing, Security, Network, Web security issues, Data loss, Information laws, Backups, etc

Abstract

The aim of this research work is to study the security issues in the Web learning environment. Problems in Web learning system are related to networking issues, database management issues, operating system related issues, memory and sharing issues, resource channeling issues, learners’ authenticity related issues, load related issues, virtualization-related issues, management information system, etc., These above said issues are very common and hurdle in Web learning environment. From Web service providers to learners there are many possibilities in security lapse. The service providers have possibilities to control the system, but controlling the flow of information and controlling the technology such as networking and database usage, virus and information related laws are difficult to manage. There are possibilities to control the flow of information from every stage from the main service provider to users. Data losses can be minimized by maintaining the local backups separately. By developing the infrastructure, a service provider can facilitate the communication between the learner and the educator. Storing the sensitive data in a secured place is the best method to save. Storing the important data in the Web has a potential risk. This review paper critically analyzes the various issues related to Web security

References

. Thiruselvan, ArunShanmugam, kesavamoorthy, (Jan 2012), “An intelligent fast-flux swarm network for minimizing DDoS attacks in Web computing”, International conference on recent trends in information processing”, pp. 297-303, ISSN 978-81-8371-412-9

J. Mirdovic and P, Rieher, (2005), “D-WARD: A source-end defense against denial of service attacks”, IEEE Trans, Dependable and secure computing, Vol,2, 2005, 216-232.

J. Stoica et al, (2002), “Internet Indirection infrastructure”, proceedings of conference applications, techniques, architecture, and protocols for computers common, Pittsburgh, PA

Gangadevi, (Jan 2012), “A new web-based architecture, based on iris biometrics technique to decrease credit cards frauds over the internet”, International conference on recent trends in information processing”, pp. 280-283, ISSN 978-81-8371-412-9

Shin, S., &Gu, G. (2012, October). WebWatcher: Network security monitoring using OpenFlow in dynamic Web networks (or: How to provide security monitoring as a service in Webs?). In Network Protocols (ICNP), 2012 20th IEEE International Conference on (pp. 1-6). IEEE.

Alan Jolliffe, Jonathan Ritter, David Stevens (2001), “The online learning” Higher Education Supplement, Kogan Page Ltd, 2001.

L. Jayasimman, E. George Dharma Prakash Raj (2012), “Web Learning Systems and Cognitive Learning: A Survey”,International Journal of Computer Science andTelecommunications, UK, Volume 3, Issue 7, pp. 91-94, July2012, ISSN 2047- 3338

Cook DA, Dupras DM. (20104), “A practical guide to developing effective web Based learning”, Journal of General Internal Medicine, Vol. 19, No. 6, PP. 698-707, 2004.

Joi L. Moore, Camille Dickson-Deane, Krista Galyen, (2011), “E-Learning, online learning, and distance learning environments: Are they the same?” The Internet and Higher Education, 2010 Elsevier Inc.14 (2011) 129–135.

Nikos Tsianos*, Zacharias Lekkas*, PanagiotisGermanakos*t, Costas Mourlas*, George Samarast (2008), “Personalizing web environments on user intrinsic characteristics”, IEEE- IET 4th International Conference on Intelligent Environments, 2008. DOI: 10.1049/cp:20081173

Downloads

Published

2025-11-11

How to Cite

[1]
N. Jebaseeli, L. Jayasimman, and B. Senhtil Kumar, “Enhancing Web Security Based on Network Algorithm”, Int. J. Comp. Sci. Eng., vol. 4, no. 9, pp. 138–140, Nov. 2025.