z-logo
open-access-imgOpen Access
A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining
Author(s) -
Roop Kamal Kaur,
Kamaljit Kaur
Publication year - 2015
Publication title -
international journal of wireless and microwave technologies
Language(s) - English
Resource type - Journals
eISSN - 2076-9539
pISSN - 2076-1449
DOI - 10.5815/ijwmt.2015.06.07
Subject(s) - computer science , brute force attack , encryption , spoofing attack , sql injection , computer security , authentication (law) , the internet , ip address spoofing , web application , database , world wide web , search engine , internet protocol , query by example , network address translation , web search query
Data theft and data attack is very common with internet users and web log files. Web log file is the proof of authentication of any user over any website. Many unauthorized users change them according to their requirement. Attacks like sql injection, brute force attack, IP spoofing might cause severe damage to the database system In this encryption techniques and optimization technique have been applied in order to check the unexpected arrival of messages or queries and the system parameter.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom