This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science and Engineering
Author
S. Chanthini
Co-authors
Dr. K. Latha
Org/Univ
Anna University BIT-Campus, Tiruchirappalli, Tamil Nadu, India
Pub. Date
11 May, 2019
Paper ID
V5I3-1311
Publisher
Keywords
Intrusion detection system, Web applications, Web log, Web security

Citationsacebook

IEEE
S. Chanthini, Dr. K. Latha. Log based internal intrusion detection for web applications, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
S. Chanthini, Dr. K. Latha (2019). Log based internal intrusion detection for web applications. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.

MLA
S. Chanthini, Dr. K. Latha. "Log based internal intrusion detection for web applications." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.

Abstract

The web environment security has become a high priority for e-businesses communities. As the usability and popularity of web applications have increased, various types of attacks in web applications also increase. The Intrusion detection system has been used for the purpose of detecting the attacks by looking at the network traffic or by looking at operating system events. Log-based intrusion detection system makes use of user logs from the web servers, where the access information about each and every request is saved. The drawback of Log-based web intrusion detection is that it can be executed only after transactions take place; hence, the prevention of attack is unattainable. In this paper we are focusing on user’s behavior, to find out the difference between the common user and malicious user and try to prevent the attack before it takes place
Paper PDF