Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet

R. Kalaimagal*, **
*Assistant Professor, Department of Computer Science, Government Arts College for Men(Autonomous), Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Government Arts College for Men(Autonomous), Nandanam, Chennai, India.
Periodicity:March - May'2014
DOI : https://doi.org/10.26634/jit.3.2.2779

Abstract

Depending upon who you ask, the IDS may be a simple audit trail process, or a filter process using a traffic control system, like screening routers, packet filters, firewalls, etc. Some people use IDS to mean a logging utility. This paper studies improving Internet security with Network Security combined authentication and intrusion detection (NS-IDS) secure data transmission in such MANETs. Security is deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of uni-modal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using for the system decides whether user authentication (or IDS input) is required and which (or IDSs) should be chosen, depending on the security posture. The decisions are made Network in fully secured manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

Keywords

Intrusion detection systems, IDS, NS -IDS engine, logging utility, information processing

How to Cite this Article?

R. Kalai Magal and M. Rames Kumar (2014). Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet. i-manager’s Journal on Information Technology, 3(2), 22-27. https://doi.org/10.26634/jit.3.2.2779

References

[1]. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, (2002). “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,”Proc. ACM WiSe, pp. 21-30, Sept. 2002.
[2]. S. Bansal and M. Baker, (2003). “Observation-Based Cooperation En-forcement in Ad Hoc Networks,” Research Report cs. NI/0307012,Standford Univ.,
[3]. R.V. Boppana and X. Su, (2008). “An Analysis of Monitoring Based Intrusion Detection for Ad Hoc Networks,” Proc. IEEE Globecom: Computer and Comm. Network Security Symp., Dec.
[4]. R.V. Boppana and S. Desilva, “Evaluation of a Statical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks,” Proc.
[5]. J. Challenger, P. Dantzig, and K. Witting, (2005). “A Fragment- Based Approach for Efficiently Creating Dynamic Web Content,” ACM Trans. Internet Technology, Vol. 5, No. 2, pp. 359–389.
[6]. M. Arlitt, D. Krishnamurthy, and J. Rolia, (2001). “Characterizing the Scalability of a Large Web-Based Shopping System,” ACM Trans. Internet Technology, Vol. 1, No. 1, pp. 44–69.
[7]. M. Rabinovich, Z. Xiao, and A. Agarwal, (2003), “Computing on the Edge: A platform for Replicating Internet Applications,” Proc. 8th Int'l Workshop Web Content Caching and Distribution, Springer-Verlag, pp. 57–77.
[8]. K. Amiri et al., (2003). “DBProxy: A Dynamic Data Cache for Web Applications,” Proc. Int'l Conf. Data Eng., IEEE CS Press, pp. 821–831.
[9]. C. Börnhvd et al., (2004). “Adaptive Database Caching with DBCache,” Data Eng., Vol. 27, No. 2, pp. 11–18.
[10]. C. Olston et al., (2005). “A Scalability Service for Dynamic Web Applications,” Proc. Conf. Innovative Data Systems Research (CIDR), ACM Press, pp. 56–69.
[11]. E. Cecchet, (2004). “C-JDBC: A Middleware Framework for Database Clustering,” Data Eng., Vol. 27, No. 2, pp. 19–26.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.