A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining
Author(s) -
Roop Kamal Kaur,
Kamaljit Kaur
Publication year - 2015
Publication title -
international journal of wireless and microwave technologies
Language(s) - English
Resource type - Journals
eISSN - 2076-9539
pISSN - 2076-1449
DOI - 10.5815/ijwmt.2015.06.07
Subject(s) - computer science , brute force attack , encryption , spoofing attack , sql injection , computer security , authentication (law) , the internet , ip address spoofing , web application , database , world wide web , search engine , internet protocol , query by example , network address translation , web search query
Data theft and data attack is very common with internet users and web log files. Web log file is the proof of authentication of any user over any website. Many unauthorized users change them according to their requirement. Attacks like sql injection, brute force attack, IP spoofing might cause severe damage to the database system In this encryption techniques and optimization technique have been applied in order to check the unexpected arrival of messages or queries and the system parameter.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom