476 research outputs found

    Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

    Full text link
    With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the database security. Attacker uses illegal and unauthorized approaches to hijack the confidential information like username, password and other vital details. Hence the real time transaction requires security against web based attacks. SQL injection and cross site scripting attack are the most common application layer attack. The SQL injection attacker pass SQL statement through a web applications input fields, URL or hidden parameters and get access to the database or update it. The attacker take a benefit from user provided data in such a way that the users input is handled as a SQL code. Using this vulnerability an attacker can execute SQL commands directly on the database. SQL injection attacks are most serious threats which take users input and integrate it into SQL query. Reverse Proxy is a technique which is used to sanitize the users inputs that may transform into a database attack. In this technique a data redirector program redirects the users input to the proxy server before it is sent to the application server. At the proxy server, data cleaning algorithm is triggered using a sanitizing application. In this framework we include detection and sanitization of the tainted information being sent to the database and innovate a new prototype.Comment: 9 pages, 6 figures, 3 tables; CIIT 2013 International Conference, Mumba

    J2EE vs. Microsoft Dot Net: A Qualitative and Quantitative Comparison for Building Enterprises Supporting XML-based Web Services

    Get PDF
    Increasing speed of networks and worldwide availability has made the World Wide Web the most significant medium for information exchange. Web technologies have become more and more important as large and small businesses continue to make their presence on the web. Today\u27s businesses have more than just a face on the worldwide web. The use of a web browser is no longer restricted to viewing static pages. Browsers are becoming more and more a standard interface to a multifaceted reign of programs that live on the worldwide web. Two main technologies stand out for the implementation of web applications, Sun Microsystems\u27 Java 2 Enterprise Edition (J2EE) and Microsoft\u27 Dot Net Framework. The purpose of this study is to provide an unbiased comparison of the two technologies based on performance and other software qualities

    An SDN-based solution for horizontal auto-scaling and load balancing of transparent VNF clusters

    Get PDF
    © 2021 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/)This paper studies the problem of the dynamic scaling and load balancing of transparent virtualized network functions (VNFs). It analyzes different particularities of this problem, such as loop avoidance when performing scaling-out actions, and bidirectional flow affinity. To address this problem, a software-defined networking (SDN)-based solution is implemented consisting of two SDN controllers and two OpenFlow switches (OFSs). In this approach, the SDN controllers run the solution logic (i.e., monitoring, scaling, and load-balancing modules). According to the SDN controllers instructions, the OFSs are responsible for redirecting traffic to and from the VNF clusters (i.e., load-balancing strategy). Several experiments were conducted to validate the feasibility of this proposed solution on a real testbed. Through connectivity tests, not only could end-to-end (E2E) traffic be successfully achieved through the VNF cluster, but the bidirectional flow affinity strategy was also found to perform well because it could simultaneously create flow rules in both switches. Moreover, the selected CPU-based load-balancing method guaranteed an average imbalance below 10% while ensuring that new incoming traffic was redirected to the least loaded instance without requiring packet modification. Additionally, the designed monitoring function was able to detect failures in the set of active members in near real-time and active new instances in less than a minute. Likewise, the proposed auto-scaling module had a quick response to traffic changes. Our solution showed that the use of SDN controllers along with OFS provides great flexibility to implement different load-balancing, scaling, and monitoring strategies.Postprint (published version

    Enabling cost aware routing with auctions in wireless ad-hoc networks

    Get PDF
    Battery power is a precious resource in wireless ad-hoc networks, and most routing protocols that have been proposed so far do not generate cost efficient routes. In this thesis, a novel auction-based cost-aware routing scheme, called CARA, is presented. CARA is designed as an extension of the MAC layer, and is shown to improve the cost efficiency of existing ad-hoc routing protocols through dynamic power control, while introducing only minimal additional overhead. The MAC layer at each node is given the capability to run local sealed-bid second-price auctions for the user data packets that need to be transmitted, and to determine any neighbor nodes that reduce the transmission cost to the next hop identified by the network layer. Existing network layer routing protocols are utilized with no changes or impact on their operation. Selforganized networks, where nodes are greedy and selfish, are being supported through the proposed auction-based framework

    PPA Printer Software Driver Design The software driver for the HP DeskJet 820C printer performs many

    Get PDF
    functions that were formerly performed in the printer, including swath cutting, data formatting, and communications. The driver also includes a PCL emulation module for DOS application support

    A Phenomenological Study Exploring the Lack of Baptist Church Participation in Seminole County, Florida

    Get PDF
    This phenomenological study explores the reasons for a lack of participation in in-person Baptist churches and the rise of participation in online Baptist churches in Seminole County, Florida. The theory guiding this study was Martin Heidegger’s hermeneutical framework which focuses on the commonality of experiences. Heidegger believed that to arrive at the essence of a phenomenon a researcher must go through the revisionary process of what Heidegger termed the Hermeneutic Circle. The principal research question in this study explored existing relationship(s) between in-person and online Baptist church leaders and how such relationship(s) contributed to a lack of church participation. The remaining questions explored what understanding of a lack of church participation existed amongst Baptist church leaders, how online Baptist church participation affected in-person Baptist church participation, and what relationship existed between in-person Baptist church members and online Baptist church members. Study data were derived from a qualitative research design which included interviews, a reflective journal, an audio recorder, and observations. Data were analyzed through the use of the NVivo 12 Pro qualitative data analysis computer software program
    • …
    corecore