We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network

by Jaspreet Kaur, Rupinder Singh, Pawandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 23
Year of Publication: 2015
Authors: Jaspreet Kaur, Rupinder Singh, Pawandeep Kaur
10.5120/21399-4406

Jaspreet Kaur, Rupinder Singh, Pawandeep Kaur . Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network. International Journal of Computer Applications. 120, 23 ( June 2015), 10-13. DOI=10.5120/21399-4406

@article{ 10.5120/21399-4406,
author = { Jaspreet Kaur, Rupinder Singh, Pawandeep Kaur },
title = { Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 23 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number23/21399-4406/ },
doi = { 10.5120/21399-4406 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:57.985171+05:30
%A Jaspreet Kaur
%A Rupinder Singh
%A Pawandeep Kaur
%T Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 23
%P 10-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

World Wide Web has become an ultimate source of information. Traditional services such as banking, education, medicine, defence, and transportation are being presented by web applications. Whenever the users make use of any web application, all the activities of the users get automatically get appended into the web log files. The web log file data helps the website owners in number of ways such as customization of web content, pre-fetching and caching, E-commerce, etc. However, the web log file data is exposed to number of attacks. In this paper, a new technique has been proposed to prevent the log file data from the two most common attacks: Brute force attack and DDoS attack.

References
  1. Brijesh Bakariya, Krishna K. Mohbey, G. S. Thakur, "An Inclusive Survey on Data Preprocessing Methods Used in Web Usage Mining", Proceedings of Seventh International Conference on Bio-Inspired Computing : Theories and Applications, Springer India, 2013.
  2. L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai, "Analysis of Web Logs and Web User in Web Mining", International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 1, January 2011.
  3. Adams, C. , Jourdan, G. V. , Levac, J. P. , & Prevost, F. (2010, August), "Lightweight protection against brute force login attacks on Web applications", In PST (pp. 181-188).
  4. Mr. Vijay, D. Katkar, Ms. Deepti, S. Bhatia, "Experiments on Detection of Denial of Service Attacks using REPTree", IEEE, 2014.
  5. Gopesh Joshi, "Review of Genetic Algorithm: An Optimization Technique", International Journal of Advanced Research in Computer Science and Software Engineering", Volume 4, Issue 4, April 2014.
  6. Sonali B. Maind, Ms. Priyanka Wankar, "Research Paper on Basic of Artificial Neural Network", International Journal on Recent and Innovation Trends in Computing and Communication", Volume 2, January 2014.
  7. Chintan R. Varnagar, Nirali N. Madhak, Trupti M. Kodinariya, Jayesh N. Rathod, "Web Usage Mining: A Review on Process, Methods and Techniques", IEEE, 2013.
  8. Xie, Yi, Shensheng Tang, "Online anomaly detection based on web usage mining", Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, IEEE, 2012.
  9. G. Swapna, R. Pavani Srivatsav, "Securing Web Applications By Analyzing The Logs Of The Database Server Or Web Server", International Journal of Engineering Research and Applications, Vol. 2, Issue 6, November- December 2012.
  10. Roger Meyer, "Detecting Attacks on Web Applications from Log files", SANS Institute, 2008.
  11. Shaimaa Ezzat Salama, Mohamed I. Marie, Laila M. El-Fangary, Yehia K. Helmy, "Web Server Logs Preprocessing for Web Intrusion Detection", Canadian Center of Science and Education, Vol. 4, July, 2011.
  12. Stefan Seufert, Darragh O'Brien, "Machine Learning for Automatic Defence against Distributed Denial of Service Attacks", IEEE, 2007.
  13. Carlisle Adams, Jean-Pierre Levac, François Prevost, "Lightweight protection against brute force login attacks on web applications", Eighth Annual International Conference on privacy, Security and Trust, IEEE, 2010.
  14. Mudassar Raza, Muhammad Iqbal, Muhammad Sharif, Waqas Haider "A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication, World Applied Sciences Journal 19 (4): 439-444, 2012.
  15. Dusan Stevanovic, Natalija Vlajic, Aijun An, "Detection of malicious and non-malicious website visitors using unsupervised neural network learning", Applied Soft Computing, Elsevier, 2012.
  16. Bhagyashree Deokar, Ambarish Hazarnis, "Intrusion Detection System using Log Files and Reinforcement Learning", International Journal of Computer Applications (0975 – 8887) Volume 45– No. 19, May 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Web Log Files web applications Brute Force DDoS