CFP last date
20 January 2025
Reseach Article

Analyzing Security and Performance Issue in Web Data Mining Technology

by Md Nadeem Ahmed, Mohd Hussain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 1
Year of Publication: 2014
Authors: Md Nadeem Ahmed, Mohd Hussain
10.5120/14809-3027

Md Nadeem Ahmed, Mohd Hussain . Analyzing Security and Performance Issue in Web Data Mining Technology. International Journal of Computer Applications. 85, 1 ( January 2014), 45-49. DOI=10.5120/14809-3027

@article{ 10.5120/14809-3027,
author = { Md Nadeem Ahmed, Mohd Hussain },
title = { Analyzing Security and Performance Issue in Web Data Mining Technology },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 1 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number1/14809-3027/ },
doi = { 10.5120/14809-3027 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:01:23.393745+05:30
%A Md Nadeem Ahmed
%A Mohd Hussain
%T Analyzing Security and Performance Issue in Web Data Mining Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 1
%P 45-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since as the internet and web application emerges security is the most challenging issue which we are facing, leads possibility of being easily damaged. Currently we based application structure is designed only by considering little security but avoid Performance issue. After the detailed study of web services architecture it is analyzed that it is not suitable in counter-tracing the WS attack, an adaptive intrusion detection and prevention (ID/IP) framework to protect The WS against attacks related to WSDL/JSON/SQL is thus introduced. Through Explanation by examples, the framework Verified that by making use of agents that act as Sensors, data mining techniques such as clustering, association and sequential rule coupled with fuzzy logic to further analyze and identify anomalies, is able to exhibit the adaptive nature of capturing anomalies and avoiding false alarm. Also the log files which contain User Name, IP Address, Visiting Path, Time Stamp, Page last visited , number of Bytes Transferred, Result Status, URL which can effectively supervise the network attack. In this paper we will discuss elaborately about several security problem and performance issue related to web application and their possible solutions.

References
  1. A. Stamos and S. Stender, "Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps", BlackHat2005, USA, 2005.
  2. A Murali M Rao, "A Survey on Intrusion Detection Approaches", Proceedings of the First International Conference on Information and Communication Technologies, ICICT 2005 IEEE, 27-28 August 2005 Pages(s):233-240.
  3. Prasanna H Bammigatti and Dr. P. R. Rao, "GenericWA-RBAC: Role Based Access Control Model for Web Applications," In Proceedings of 9th International Conference on Information Technology (ICIT'06), No. 6, pp. 237-240, December 2006.
  4. Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and C. E. Youman, "Role-based Access Control Models," IEEE Computer, Vol. 29, No. 2, pp. 38-47, February 1996.
  5. K. Spett, "Blind SQL Injection:Are Your Web Applications Vulnerable?". SPI Dynamics, 2005
  6. A. Vorobier and J. Han, "Security Attack Ontology for Web Services", Proceedings of the Second International Conference on Semantics, Knowledge, and Grid (SKG'06) IEEE.
  7. P. Lindstrom, "Attacking and Defending Web Services", A Spire Research Report, January 2004.
  8. Y. S. Loh, W. C. Yau, C. T. Wong and W. C. Ho, "Design and Implementation of an XML Firewall", Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS2006), Guangzhou, China, Nov. 3-6, 2006, pp. 1147-1150.
  9. Izhar Bar-Gad, Amit Klein and Sanctum Inc. "Developing Secure Web Applications," White Paper, June 2002.
  10. Andre N. Klingsheim , Veborn Moen and Kjell J. Hole, "Challenges in Securing Networked J2ME Applications," IEEE Computer, Vol. 40, No. 2, pp. 24-30, February 2007.
  11. Hiroshi Wada, Junichi Suzuki, "A Domain Specific Modeling Framework for Secure Network Applications," In Proceedings of 30th Annual International Computer Software and Applications Conference (COMPSAC'06), pp. 353-355, September 2006.
  12. Aljifri, M. , (2003), 'IP Traceback: A New Denial-of- Service Deterrent?' Published By The Ieee Computer Society 1540-7993/03 2003
  13. Stone, R, (2000) "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th Usenix Security Symp. ,Usenix Assoc. , 2000
  14. Burch, H. , and Cheswick, B. , "Tracing Anonymous Packets to Their Approximate Source," Proc. 14th Conf. Systems Administration, Usenix Assoc. , 2000, pp. 313– 322.
  15. Bellovin, S. , Leech, M. , and Taylor, T. , (2003), 'ICMP Traceback Messages,' Internet Draft, Internet Eng. Task Force, 2003; work in progress.
  16. Mankin, A. , Massey, D. , Wu, C. L. , Wu S. F and Zhang, L. , (2001), "On Design and Evaluation of 'Intention- Driven' ICMP Traceback," Proc. IEEE Int'l Conf. Computer Comm. and Networks, IEEE CS Press, 2001. pp. 159–165.
  17. Snoeren, A. C. , et al. , (2002), "Single-Packet IP Traceback," IEEE/ACM Trans. Networking, vol. 10, no. 6, 2002, pp. 721–734.
  18. Baba, T. , and Matsuda, S. , (2002). "Tracing Network Attacks to Their Sources," IEEE Internet Computing, vol. 6, no. 3, 2002
  19. Adler, M, (2002),'Tradeoffs in Probabilistic Packet Marking for IP Traceback,' Proc. 34th ACM Symp. Theory of Computing, ACM Press, 2002, pp. 407–418.
  20. Peng,T. , Leckie, C. , and Kotagiri, R. , (2002), "Adjusted Probabilistic Packet Marking for IP Traceback", Networking 2002.
  21. "Understanding SOA Security Design and Implementation", http://www. redbooks. ibm. com/abstracts/SG247310. htm
  22. N. Reed, "Security Guards for the Future Web", The MITRE Corporation,2004. http://www. mitre. org/news/events/tech04/briefings/726 . pdf . Retrieved August 1, 2007.
  23. G. Antoniou, and F. V. Harmelen, "The Semantic Web Vision" in A Semantic Web Primer, The MIT Press, April 2004. http://mitpress. mit. edu/books/chapters/0262012103chap1. pdf Retrieved July 27, 2007.
  24. B. Thuraisingham, "Security Issues for the Semantic Web", Proceedings of the 27th Annual International0 Computer Software and Applications Conference (COMPSAC'03), 2003.
  25. D. Fensel, J. A. Hendler, H. Lieberman, and W. Wahlster, "Introduction" in Spinning the Semantic Web", The MIT Press, March2005. http://mitpress. mit. edu/books/chapters/0262062321intro1. pdf, Retrieved July 27, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Web data mining Security Design performance web services