A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining

Full Text (PDF, 591KB), PP.53-62

Views: 0 Downloads: 0

Author(s)

Roop Kamal Kaur 1,* Kamaljit Kaur 1

1. Computer Science and Engineering Department, Sri Guru Granth Sahib World University, Fatehgarh sahib,140406, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2015.06.07

Received: 23 Jul. 2015 / Revised: 2 Sep. 2015 / Accepted: 30 Sep. 2015 / Published: 8 Nov. 2015

Index Terms

Attacks, Genetic algorithm, Encryption techniques

Abstract

Data theft and data attack is very common with internet users and web log files. Web log file is the proof of authentication of any user over any website. Many unauthorized users change them according to their requirement. Attacks like sql injection, brute force attack, IP spoofing might cause severe damage to the database system In this encryption techniques and optimization technique have been applied in order to check the unexpected arrival of messages or queries and the system parameter.

Cite This Paper

Roop Kamal Kaur, Kamaljit Kaur,"A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining", IJWMT, vol.5, no.6, pp.53-62, 2015. DOI: 10.5815/ijwmt.2015.06.07

Reference

[1]Dilpreet kaur, Sukhpreet Kaur, "A Study on User Future Request Prediction Methods Using Web Usage Mining", International Journal of Computational Engineering Research, Vol, 03, Issue, 4.

[2]S.Mirdula, D.Manivannan, "Security Vulnerabilities in Web Application- an Attack Perspective", International Journal of Engineering and Technology (IJET), Vol 5 No 2 Apr-May2013.

[3]Rimmy Chuchra, Bharti Mehta, Sumandeep Kaur, "Use of web Mining in Network Security", International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).

[4]Jianli Duan, Shuxia Liu, "Research on web log mining analysis", Instrumentation & Measurement, Sensor Network and Automation (IMSNA), 2012 International Symposium on (Volume: 2), 25-28 Aug. 2012.

[5]Daxin Jiang Jian Pei Hang Li, "Mining Search and Browse Logs for Web Search: A Survey".

[6]Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attack, and Remedies" 

[7]Sandra Sarasan, "Detection and Prevention of Web Application Security Attacks", International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE) Volume-2, Issue-3, 2013.

[8]Sharmin Rashid, Subhra Prosun Paul, "Proposed Methods of IP Spoofing Detection and Prevention" International Journal of Science and Research (IJSR), Volume 2 Issue 8, August 2013.

[9]Swati Paliwal, Ravindra Gupta, "A Review of Some Popular Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 2, February 2013.

[10]K. F. Man, K. S. Tang, and S. Kwong, "Genetic Algorithms: Concepts and Applications", IEEE Transactions on Industrial Electronics, vol. 43, no. 5, october 1996.

[11]Inadyuti Dutt, Soumya Paul, Dr. S.N. Chaudhuri, "Implementation of Network Security using Genetic Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 2, February 2013.

[12]Ann Mary Jacob, Saritha S, "Survey on Various IP Spoofing Detection Techniques", International Journal of Science and Research (IJSR) ISSN: 2319-7064.

[13]Rajan.S.Jamgekar, Geeta Shantanu Joshi, "File Encryption and Decryption Using Secure RSA", International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013

[14]Mandeep Singh, Narula Simarpreet Singh, "Implementation of Triple Data Encryption Standard using Verilog", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014.

[15]Shaneel Narayana, Michael Fitzgerald, "Empirical Network Performance Evaluation of Security Protocols on Operating Systems", IJWMT Vol. 2, No. 5, October 2012.