Author : Anmol Bava 1
Date of Publication :21st March 2018
Abstract: In today’s era, internet has become essential part of our lifestyle . It is used for banking , social media , online shopping etc. but like anything else even internet has its vulnerabilities and soft corners .Online stores majorly depends on data stored in their respective databases . These databases can be tampered with using dedicated tools and techniques. Once attacker has access to data in database ,the attacker can tamper the data and create havoc. There are tools and techniques present which provide Intrusion detection through monitoring sessions by users, and inform about breach in the network and tamper in the database. This paper focuses on encapsulating all the techniques under single platform by using Intrusion detection, Hashing algorithms and finding the data leakage and tampered database preventing various attacks and unauthorized access to the data.
Reference :
-
- X. Chen, J. Li, X. Huang, J. Ma, and W. Lou,New Publicly Verifiable Databases with Efficient Updates, IEEE Transactions on Dependable and Secure Computing, In press, 2015.
- X. Chen, J. Li, and W. Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6), pp.1687-1694, 2012
- V. Vu, S. Setty, A.J. Blumberg, and M. Walfish,A hybrid architecture for interactive verifiable computation, IEEE Symposium on Security and Privacy (SP), pp.223- 237, IEEE, 2013
- K.Kavitha, S.V.Anandhi, Intrusion Detection Using Double Guard In MultiTier Architecture, 2014.
- Ekta Naik , Ramesh Kagalkar , Double Guard: Detecting and Preventing Intrusions In Multi-tier Web Applications ,2014.
- Anand Keshri_, Sukhpal Singh_, Mayank Agarwal_,and Sunit Kumar Nandiv Title:- DoS Attacks Prevention Using IDS and Data Mining_Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, India. Email: a.keshri@iitg.ernet.in,sukhpal@iitg.ernet.in, mayank.agl@iitg.ernet.in
- Saad Alsunbul1,2, Phu Le2, Jefferson Tan3, Bala Srinivasan Computer Research Institute King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia Ssunbul@kacst.edu.sa