UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 9 | September 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 12
December-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1812513


Registration ID:
193440

Page Number

80-83

Share This Article


Jetir RMS

Title

Detection of Data Modification Attack and Restore Facility

Abstract

In today's world we have many issues in internet security and privacy. We use internet in travelling, E-Commerce site, social media, banking, study etc. But we often face the problems with the privacy of the network system and private data. To accommodate this increase in application and data complexity, web services have moved to a multi-tiered design wherein the web server runs the application front-end logic and data is outsourced to a database or file server. IDS play a key role in computer security technique. But it also has drawbacks of its own. To overcome those drawbacks Duel Security technique is introduced based on ecommerce application. We are implementing duel security using MD5 algorithm and hashing function, an in built web server of windows 7 ultimate, with My SQL Server. This System presents those models the network behaviour of user sessions across both the front-end web server and the back-end database. Implementing system monitoring both web and subsequent database requests. Most of the people do their transaction through web use. So there are chances of personal figures gets hacked then need to be provide more refuge for both web server and database server. For that purpose duel security system is used. The duel security system is used to identify & prevent attacks using Intrusion detection system. Duel security prevents attacks and prevents user account data from unauthorized updating from his/her account.

Key Words

Anomaly detection, Virtualization, Multi-tier web application, Data leakage detection

Cite This Article

"Detection of Data Modification Attack and Restore Facility", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 12, page no.80-83, December-2018, Available :http://www.jetir.org/papers/JETIR1812513.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Detection of Data Modification Attack and Restore Facility", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 12, page no. pp80-83, December-2018, Available at : http://www.jetir.org/papers/JETIR1812513.pdf

Publication Details

Published Paper ID: JETIR1812513
Registration ID: 193440
Published In: Volume 5 | Issue 12 | Year December-2018
DOI (Digital Object Identifier):
Page No: 80-83
Country: Pune, Maharashtra , India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002966

Print This Page

Current Call For Paper

Jetir RMS