News Updates Sunday 19th May 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Detection and prevention of data modification attack based on MD5 algorithm


Author : Miss.Gitanjali A. Kadlag and.Prashant S. Dhotre

Pages : 1005-1008
Download PDF
Abstract

Now a day’s wireless communication has many issues like Data security and privacy.. Research survey discusses  regarding  privacy and security is based on the use of internet in traveling, E-Commerce site, social media, banking, study etc. Existing system also often faces the problems with the privacy of the entire network system and stored private data. To avoid these type of issues, increase in widely used application and data complexity, so that web services have design to be a multi-tiered system in that the web server runs the application front-end logic and data is retrieve to a database or file server. Intrusion detection system plays a key role in computer security technique to analysis the data on the server. This problem overcome in proposed Duel Security technique is introduced based on e commerce application. For data security we use the message digest algorithm, an in built web server of windows platform, with database My SQL Server. In this paper proposed system monitoring both web request and database requests. Most of the people do their transaction through web based server use. For that duel security system is used. The duel security system is used to identify & prevent attacks using Intrusion detection system. Duel security prevents attacks and prevents user account data from unauthorized updating from his/her account. Once done all this process then system will more secure for unauthorized data modification attack on database server.

Keywords: Duel security, MD algorithm, Intrusion detection, multi-tier web application, data leakage detection.

Call for Papers
  1. IJCET- May/June 2024 Issue

    Submission Last Date
    30 June 2024
  2. DOI is given to all articles
  3. Current Issue
  4. IJTT-June-2024
  5. IJAIE-June-2024
  6. IJCSB-June-2024
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved