Double Guard: Detecting Intrusions in Multitier Internet Applications

Authors

  • Bachhav T Department, Of Computer Engineering, Savitribai Phule Pune University, Maharashtra, India
  • Dhamane K Department, Of Computer Engineering, Savitribai Phule Pune University, Maharashtra, India
  • Kapadnis T Department, Of Computer Engineering, Savitribai Phule Pune University, Maharashtra, India
  • Wagh V Department, Of Computer Engineering, Savitribai Phule Pune University, Maharashtra, India

Keywords:

Anomaly detection, virtualization, multitier internet application, Attacks, Dedicated Containers

Abstract

Today, net services and applications have become an indivisible part of our daily life. So as to suit during this increase in application and data quality, web services have rapt to a multi-tier design in which, web server runs the application front-end logic and knowledge area unit which are out sourced to information or digital computer. Double-Guard is associate IDS that model the network behavior of user sessions across every front-end net server and additionally the back-end information. By watching both web and consequent database requests, system is able to find out attacks that free-lance IDS wouldn’t be able to determine. This system have tendency to quantify the short comings of any multi-tier IDS in terms of coaching sessions and practically coverage. Double Guard is implemented using an Apache web server with MySQL and light-weight virtualization. Finally, using Double-Guard, system has a tendency to expose a large range of attacks.

References

. Green SQL, http://www.greensql.net/, 2011.

. Open VZ, http://wiki.openvz.org, 2011.

. B. Parno, J.M. McCune, D. Wendlandt, D.G. Andersen, and A. Perrig, “CLAMP: Sensible hindrance of Large-Scale information Leaks,” Proc. IEEE Symp. Security and Privacy, 2009.

. sqlmap, http://sqlmap.sourceforge.net/, 2011.

. A. Schulman, “Top ten DB Attacks,” http://www.bcs.org/server.php?show=ConWebDoc.8852, 2011.

. T. Hendrik Verwoerd and R. Hunt, “Intrusion Detection Techniques andApproaches,” Computer Comm., vol. 25, no. 15, pp. 1356-1365, 2002.

. “Five Common net Application Vulnerabilities,” http://www.symantec.com/connect/articles/five-common-web-application vulnerabilities, 2011.

. Linux-vserver, http://linux-vserver.org/, 2011.

. Y. Huang, A. Stavrou, A. K. Ghosh, and S. Jajodia. Efficiently tracking

. “Virtuozzo Containers”,www.parallels.com/products/ pvc45/ ,2011. Application interactions using lightweight virtualization. In Proceedingsof the 1st ACM workshop on Virtual machine security, 2008.

. S. Potter and J. Nieh. Apiary: Easy-to-use desktop application faultcontainment on commodity operating systems. In USENIX 2010 Annual Technical Conference on Annual Technical Conference.

. Meixing Le, Angelos Stavrou, Member, IEEE, and Brent ByungHoon Kang, Member, IEEE “DoubleGuard: Detecting Intrusionsin Multitier Web Applications”. IEEE transactions on dependable and secure computing, vol. 9, no. 4, march 2014

Downloads

Published

2025-11-10

How to Cite

[1]
T. Bachhav, K. Dhamane, T. Kapadnis, and V. Wagh, “Double Guard: Detecting Intrusions in Multitier Internet Applications”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 198–200, Nov. 2025.