UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2006137


Registration ID:
234081

Page Number

983-987

Share This Article


Jetir RMS

Title

Duel Security-Detection of Database Modification Attack and Restore Facility from Unauthorized Access

Abstract

Now today’s entire world have we many issues in internet security and privacy. Research survey discusses regarding privacy and security is based on the use of internet in travelling, E-Commerce site, social media, banking, study etc. Existing system also often faces the problems with the privacy of the entire network system and stored private data. To overcome these issues, increase widely used application and data complexity, so web services have design to a multi-tiered system wherein the web server runs the application front-end logic and data is retrieve to a database or file server. Intrusion detection system plays a key role in computer security technique to analysis the data on the server. This problem overcome in proposed Duel Security technique is introduced based on ecommerce application. For data security we use the message digest algorithm, an in built web server of windows platform, with database My SQL Server. In this paper proposed system monitoring both web request and database requests. Most of the people do their transaction through web based server use. For that purpose duel security system is used. The duel security system is used to identify & prevent attacks using Intrusion detection system. Duel security prevents attacks and prevents user account data from unauthorized updating from his/her account.

Key Words

Keywords; Duel security, MD algorithm, Intrusion detection, multi-tier web application, data leakage detection.

Cite This Article

"Duel Security-Detection of Database Modification Attack and Restore Facility from Unauthorized Access", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.983-987, June-2020, Available :http://www.jetir.org/papers/JETIR2006137.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Duel Security-Detection of Database Modification Attack and Restore Facility from Unauthorized Access", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp983-987, June-2020, Available at : http://www.jetir.org/papers/JETIR2006137.pdf

Publication Details

Published Paper ID: JETIR2006137
Registration ID: 234081
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 983-987
Country: Pune, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003039

Print This Page

Current Call For Paper

Jetir RMS