Double Guard: Detecting Intrusions in Multitier Internet Applications
Keywords:
Anomaly detection, virtualization, multitier internet application, Attacks, Dedicated ContainersAbstract
Today, net services and applications have become an indivisible part of our daily life. So as to suit during this increase in application and data quality, web services have rapt to a multi-tier design in which, web server runs the application front-end logic and knowledge area unit which are out sourced to information or digital computer. Double-Guard is associate IDS that model the network behavior of user sessions across every front-end net server and additionally the back-end information. By watching both web and consequent database requests, system is able to find out attacks that free-lance IDS wouldn’t be able to determine. This system have tendency to quantify the short comings of any multi-tier IDS in terms of coaching sessions and practically coverage. Double Guard is implemented using an Apache web server with MySQL and light-weight virtualization. Finally, using Double-Guard, system has a tendency to expose a large range of attacks.
References
. Green SQL, http://www.greensql.net/, 2011.
. Open VZ, http://wiki.openvz.org, 2011.
. B. Parno, J.M. McCune, D. Wendlandt, D.G. Andersen, and A. Perrig, “CLAMP: Sensible hindrance of Large-Scale information Leaks,” Proc. IEEE Symp. Security and Privacy, 2009.
. sqlmap, http://sqlmap.sourceforge.net/, 2011.
. A. Schulman, “Top ten DB Attacks,” http://www.bcs.org/server.php?show=ConWebDoc.8852, 2011.
. T. Hendrik Verwoerd and R. Hunt, “Intrusion Detection Techniques andApproaches,” Computer Comm., vol. 25, no. 15, pp. 1356-1365, 2002.
. “Five Common net Application Vulnerabilities,” http://www.symantec.com/connect/articles/five-common-web-application vulnerabilities, 2011.
. Linux-vserver, http://linux-vserver.org/, 2011.
. Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia. Efficiently tracking
. “Virtuozzo Containers”,www.parallels.com/products/ pvc45/ ,2011. Application interactions using lightweight virtualization. In Proceedingsof the 1st ACM workshop on Virtual machine security, 2008.
. S. Potter and J. Nieh. Apiary: Easy-to-use desktop application faultcontainment on commodity operating systems. In USENIX 2010 Annual Technical Conference on Annual Technical Conference.
. Meixing Le, Angelos Stavrou, Member, IEEE, and Brent ByungHoon Kang, Member, IEEE “DoubleGuard: Detecting Intrusionsin Multitier Web Applications”. IEEE transactions on dependable and secure computing, vol. 9, no. 4, march 2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
