Current Trends in Information Technology vol 6 issue 3

16
INFORMATION TECHNOLOGY Current Trends in (CTIT) ISSN 2249-4707 (Online) ISSN 2348-7895 (Print) September–December 2016 SJIF: 3.577 www.stmjournals.com STM JOURNALS Scientific Technical Medical

Transcript of Current Trends in Information Technology vol 6 issue 3

Page 1: Current Trends in Information Technology  vol 6 issue 3

INFORMATION TECHNOLOGY

Current Trends in

(CTIT)

ISSN 2249-4707 (Online)

ISSN 2348-7895 (Print)

September–December 2016SJIF: 3.577

www.stmjournals.com

STM JOURNALSScientific Technical Medical

Page 2: Current Trends in Information Technology  vol 6 issue 3

STM Journals, a strong initiative by Consortium E-Learning Network Private Ltd. (established 2006), was

launched in the year 2010 under the support and guidance by our esteemed Editorial and Advisory Board

Members from renowned institutes.

Objectives:

Promotion of Scientific, Technical and Medical research.

Publication of Original Research/Review, Short Articles and Case Studies through

Peer Review process.

Publishing Special Issues on Conferences.

Preparing online platform for print journals.

Empowering the libraries with online and print Journals in Scientific, Technical

and Medical domains.

Publishing and distribution of books on various subjects in the category of Nanotechnology,

Scientific and Technical Writing, and Environment, Health and Safety.

Salient Features:

A bouquet of 100+ Journals that fall under Science, Technical and Medical domains.

Employs Open Journals System (OJS)—a journal management and publishing system.

The first and one of the fastest growing publication website in India as well as in abroad

for its quality and coverage.

Rapid online submission and publication of papers, soon after their formal

acceptance/finalization.

Facilitates linking with the other authors or professionals.

Worldwide circulation and visibility.

Current Trends in Information Technology

ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Focus and Scope Covers

Computer Networks

Information Databases

Data Management

Networking

Programming Languages

Technology Developments

Intelligent organisation

Current Trends in Information Technology is published (frequency: three times a year) in India by STM Journals

(division of Consortium e-Learning Network Private Ltd. Pvt.) The views expressed in the articles do not necessarily

reflect of the Publisher. The publisher does not endorse the quality or value of the advertised/sponsored products

described therein. Please consult full prescribing information before issuing a prescription for any products mentioned in

this publication.

No part of this publication may be reproduced, stored in retrieval system or transmitted in any from without written

permission of the publisher.

To cite any of the material contained in this Journal, in English or translation, please use the full English reference at the

beginning of each article. To reuse any of the material, please contact STM Journals ([email protected])

STM Journals

Page 3: Current Trends in Information Technology  vol 6 issue 3

STM Journals (division of Consortium e-Learning Network Private Ltd. ) having its Marketing office located at Office

No. 4, First Floor, CSC pocket E Market, Mayur Vihar Phase II, New Delhi-110091, India is the Publisher of Journal.

Statements and opinions expressed in the Journal reflect the views of the author(s) and are not the opinion of STM

Journals unless so stated.

Subscription Information and Order:

National Subscription:

Print - Rs 3750/- per Journal ( includes 3 print issues), Single Issue copy purchase: Rs 1500.

Online - Rs 3750/- per Journal inclusive Service Tax ( includes 3 online issues), Single Issue purchase: Rs 1500

inclusive Service Tax

Print + Online - Rs 5000/- per Journal inclusive Service Tax ( includes 3 print & online issues).

International Subscription:

Online Only- $199, Print Only-$299 (includes 3 print issues)

Online + Print-$399 (includes 3 print issues + online access of published back volumes )

To purchase print compilation of back issues please send your query at [email protected]

Subscription must be prepaid. Rates outside of India includes delivery. Prices subject to change without notice.

Mode of Payment: At par cheque, Demand draft, and RTGS (payment to be made in favor of

Consortium E-Learning Network. Pvt. ltd., payable at Delhi/New Delhi.

Online Access Policy

A). For Authors:

In order to provide maximum citation and wide publicity to the authors work, STM Journals also have Open Access

Policy, authors who would like to get their work open access can opt for Optional Open Access publication at

nominal cost as follows

India, SARC and African Countries: INR 2500 or 100 USD including single hard copy of Author's Journal.

Other Countries: USD 200 including single hard copy of Author's Journal.

B). For Subscribers:

Online access will be activated within 72 hours of receipt of the payment (working days), subject to receipt of

correct information on user details/Static IP address of the subscriber.

The access will be blocked:

If the user requests for the same and furnishes valid reasons for blocking.

Due to technical issue.

Misuse of the access rights as per the access policy.

Advertising and Commercial Reprint Inquiries: STM Journals with wide circulation and visibility offer an excellent

media for showcasing/promotion of your products/services and the events-namely, Conferences, Symposia/Seminars

etc. These journals have very high potential to deliver the message across the targeted audience regularly with each

published issue. The advertisements on bulk subscriptions, gift subscriptions or reprint purchases for distribution etc. are

also very welcome.

Lost Issue Claims: Please note the following when applying for lost or missing issues:

Claims for print copies lost will be honored only after 45 days of the dispatch date and before publication of the

next issue as per the frequency.

Tracking id for the speed post will be provided to all our subscribers and the claims for the missing Journals will

be entertained only with the proofs which will be verified at both the ends.

Claims filed due to insufficient (or no notice) of change of address will not be honored.

Change of Address of Dispatch should be intimated to STM Journals at least 2 months prior to the dispatch

schedule as per the frequency by mentioning subscriber id and the subscription id.

Refund requests will not be entertained.

Legal Disputes

All the legal disputes are subjected to Delhi Jurisdiction only. If you have any questions, please contact the Publication

Management Team: [email protected]; Tel : +91 0120-4781211.

Page 4: Current Trends in Information Technology  vol 6 issue 3

Gargi Asha Jha

Manager (Publications)

PUBLICATION MANAGEMENT TEAM

Internal Members

External Members

Bimlesh Lochab

Assistant Professor

Department of Chemistry

School of Natural Sciences, Shiv Nadar University

Gautam Buddha Nagar, Uttar Pradesh, India

Dr. Rajiv Prakash

Professor and Coordinator

School of Materials Science and Technology

Indian Institute of Technology (BHU), Varanasi

Uttar Pradesh, India

Dr. Rakesh Kumar

Assistant Professor

Department of Applied Chemistry

BIT Mesra, Patna,

Bihar, India

Prof. S. Ramaprabhu

Alternative Energy and Nanotechnology Technology

Laboratory, Department of Physics

Indian Institute of Technology, Chennai

Tamil Nadu, India

Himani Pandey

Isha Chandra

Senior Associate Editors

Dr. Yog Raj Sood

Dean (Planning and Development)

Professor, Department of Electrical Engineering

National Institute of Technology, Hamirpur

Himachal Pradesh, India

Prof. Chris Cannings

Professor, School of Mathematics and Statistics

University of Sheffield,

Sheffield

United Kingdom

Dr. D. K. Vijaykumar

MS, MCh (Surgical Oncology), Professor and

Head Department of Surgical Oncology

Amrita Institute of Medical Sciences and Research Centre

Ponekkara, Cochin, Kerala, India

Dr. Durgadas Naik

Associate Professor (Microbiology)

Management and Science University,

University Drive, Seksyen13

Selangor, Malaysia

Prof. José María Luna Ariza

Department of Computer Sciences and

Numerical Analysis

Campus of Rabanales

University of Córdoba, Spain

Dr. Khaiser Nikam

Professor, Library and Information Science

Department of Library and Information Science

University of Mysore

Mysore, India

Quaisher J Hossain

Senior Editor

Group Managing Editor Dr. Archana Mehrotra

Managing DirectorCELNET, Delhi, India

Meenakshi Tripathi

Shivani Sharma

Chairman Mr. Puneet Mehrotra

Director

Shambhavi Mishra

Associate Editors

Sugandha Mishra

Page 5: Current Trends in Information Technology  vol 6 issue 3

Prof. Priyavrat TharejaDirector Principal

Rayat Institute of Engineering and Information Technology

Punjab, India

Dr. Baldev RajDirector, National Institute of Advanced Studies

Indian Institute of Science campus Bangalore

Karnataka, India

Former Director

Indira Gandhi Centre for Atomic Research,

Kalpakkam, Tamil Nadu, India

Dr. Pankaj PoddarSenior Scientist

Physical and Materials Chemistry Division,National Chemical Laboratory

Pune, Maharastra India

Prof. D. N. RaoProfessor and Head

Department of BiochemistryAll India Institute of Medical Sciences

New Delhi, India

Dr. Nandini Chatterjee SinghAdditional Professor

National Brain Research CentreManesar, Gurgaon

Haryana, India

Dr. Ashish RunthalaLecturer, Biological Sciences Group

Birla Institute of Technology and SciencePilani, Rajasthan,

India

Dr. Bankim Chandra RayProfessor and Ex-Head of the Department

Department of Metallurgical and Materials Engineering

National Institute of Technology, RourkelaOdisha, India

Prof. Yuwaraj Marotrao GhugalProfessor and Head

Department of Applied MechanicsGovernment College of Engineering

Vidyanagar, Karad Maharashtra, India

Dr. Hardev Singh VirkVisiting Professor, Department of Physics

University of SGGS World UniversityFatehgarh Sahib, Punjab,

IndiaFormer Director Research

DAV Institute of Engineering and TechnologyJallandhar, India

Dr. Shrikant Balkisan DhootSenior Research Scientist, Reliance Industries Limited, Mumbai, India

Former Head (Research and Development)Nurture Earth R&D Pvt Ltd., MIT Campus

Beed Bypass Road, Aurangabad Maharashtra, India

STM JOURNALS

ADVISORY BOARD

Page 6: Current Trends in Information Technology  vol 6 issue 3

Dr. Rakesh KumarAssistant Professor

Department of Applied ChemistryBirla Institute of Technology

Patna, Bihar, India

Prof. Subash Chandra MishraProfessor

Department of Metallurgical and Materials Engineering

National Institute of Technology, RourkelaOdisha, India

Dr. Shankargouda PatilAssistant Professor

Department of Oral PathologyKLE Society's Institute of Dental Sciences

Bangalore, Karnataka, India

Prof. Sundara RamaprabhuProfessor

Department of PhysicsIndian Institute of Technology Madras

Chennai, Tamil Nadu India

Dr. Baskar KaliyamoorthyAssociate Professor

Department of Civil EngineeringNational Institute of Technology, Trichy

Tiruchirappalli, Tamil Nadu, India

STM JOURNALS

ADVISORY BOARD

Page 7: Current Trends in Information Technology  vol 6 issue 3

Dr. N. RakeshAsst.Prof (Senior Grade) Dept. of Computer Science & Engineering

Research laboratory Amrita Vishwa VidyaPeetham Bangalore, India.

Dr. B. M. SagarAssociate Professor, Information

Science Department, R.V. College of Engineering, Bangalore, India.

Dr. R.Devi PriyaAssistant Professor,

Kongu Engineering College , India.

Dr. R. Vinob ChanderAssistant Professor, Department of

Information Technology, SSN College of

Engineering Kalavakkam, Chennai, India.

Dr. S. AnandamuruganAssistant Professor (Selection Grade),

Department of Information Technology,

Kongu Engineering College,

Perundurai, India.

Dr. Munir ahamed RabbaniProf. Department of Computer Science,

College of Computer, Qassim University,

Saudi Arabia.

Dr. Himansu Sekhar BeheraAssistant Professor ,Department

Computer Science and Engineering, Veer Surendra Sai University of

Technology (VSSUT) India.

Editorial Board

Dr. S.NatarajanProfessor, PES Institute of Technology

Global Academy of Technology, India.

Dr. Katta sugamyaAssociate Professor, Dept. of IT,

CBIT, India.

Dr. Ravi Prakash ReddyProfessor & HOD, G.Narayanamma

Institute of Technology & Science

(for women) Shaikpet, Hyderabad, India.

Dr. M. Senthamil SelviProfessor & Head in the Information

Technology Department, Sri Ramakrishna

Engineering College at the University of

Anna University, Chennai, India.

Dr. Sivaraj RajappanProfessor, Department of Computer

Science, Velalar College of Engineering

and Technology, the Anna University,

India.

Page 8: Current Trends in Information Technology  vol 6 issue 3

It is my privilege to present the print version of the [Volume 6 Issue 3] of our Current Trends in

Information Technology, 2016. The intension of CTIT is to create an atmosphere that stimulates

vision, research and growth in the area of Information Technology.

Timely publication, honest communication, comprehensive editing and trust with authors and

readers have been the hallmark of our journals. STM Journals provide a platform for scholarly

research articles to be published in journals of international standards. STM journals strive to publish

quality paper in record time, making it a leader in service and business offerings.

The aim and scope of STM Journals is to provide an academic medium and an important reference

for the advancement and dissemination of research results that support high level learning, teaching

and research in all the Scientific, Technical and Medical domains.

Finally, I express my sincere gratitude to our Editorial/ Reviewer board, Authors and publication

team for their continued support and invaluable contributions and suggestions in the form of

authoring writeups/reviewing and providing constructive comments for the advancement of the

journals. With regards to their due continuous support and co-operation, we have been able to publish

quality Research/Reviews findings for our customers base.

I hope you will enjoy reading this issue and we welcome your feedback on any aspect of the Journal.

Dr. Archana Mehrotra

Managing Director

STM Journals

Director's Desk

STM JOURNALS

Page 9: Current Trends in Information Technology  vol 6 issue 3

1. Hadoop and Map Reduce for Simplified Processing of Big Data Shobha Rani 1

2. Big Data to Big Data Mining: Issues, Challenges and Data Analytics Solutions Neeraj Kumar, Madhulika Pandey, Krishan Kumar 7

3. Group Management for Secure and Dynamic Sharing of Data in Cloud ComputingRaju Dara, Bhongir Sony 16

4. Public Auditing Based Detection of Packet Dropping Attacks in Wireless Ad Hoc NetworksRaju Dara, Srikanth Ravula 24

5. Double Guard: Detection Intrusion in Multitier ApplicationS.D. Jadhav, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar 32

6. Protected Data Compilation in WSN Using Random Routing AlgorithmsRaju Dara, Jellela Satish Reddy 43

Contents

Page 10: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 1-6 © STM Journals 2016. All Rights Reserved Page 1

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Hadoop and Map Reduce for Simplified Processing of

Big Data

Shobha Rani* Department of Computer Science, Akarapu Sharath Chandrika Devi Memorial College for Women,

Warangal, Telangana, India

Abstract

Big data refers to large and complex data sets made up of a variety of structured and unstructured data, which are too big, too fast, or too hard to be managed by traditional techniques. Hadoop is an open source software platform for structuring big data on computer clusters built from commodity hardware and enabling it for data analysis. It is designed to scale up from a single server to thousands of machines, with a very high degree of fault tolerance. MapReduce is a programming model for processing large data sets with parallel distributed algorithm on cluster. This paper presents the survey of simplified big data processing with Hadoop architecture and MapReduce framework. Keywords: Big data, Hadoop, MapReduce, HDFS, Big data Analytics

INTRODUCTION Currently, enormous amounts of data are created every day. With the rapid expansion of data, we are moving from the terabyte to the petabyte Age. At the same time, new technologies make it possible to organize and utilize the massive amounts of data currently being generated. However, this trend creates a great demand for new data storage and analysis methods [1, 2]. Especially, theoretical and practical aspects of extracting knowledge from massive data sets have become quite important. The term “Big Data” has recently been applied to datasets that grow so large and become unsuitable to work with the traditional database management systems. They are data sets whose size is beyond the ability of commonly used

software tools and storage systems to capture, store, manage, as well as process data within a tolerable elapsed time [3]. Big data sizes are constantly increasing, currently ranging from terabytes to petabytes of data in a single data set. Consequently, some of the problems related to big data include data capture, store, searching, sharing, analysis and visualization. Today enterprises are exploring large volumes of highly detailed data so as to discover facts they did not know before [4]. Ambiguity—a lack of metadata creates

ambiguity in big data that leads to inconsistency (Figure 1).

Viscosity—measure of data flow over the network.

Page 11: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 7-15 © STM Journals 2016. All Rights Reserved Page 7

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Big Data to Big Data Mining: Issues, Challenges and Data

Analytics Solutions

Neeraj Kumar, Madhulika Pandey*, Krishan Kumar Department of Computer Science, JIMS Engineering Management Technical Campus, Greater Noida,

Uttar Pradesh, India

Abstract Data has evolved at a great pace due to increasing interest of people and valuable contribution towards the emerging technologies. Emerging technologies are successful in generating huge quantity of data from various sources which in return provides Big Data. Big Data constitutes large amount of data in terms of texts, statistics, facts, figures, and records, etc., generated from heterogeneous environment. Big Data needs special attention for storage, managing, transportation and processing of data. It includes amassing of data in terms of 3V’s, i.e. volume, variety and velocity. Issues and challenges of Big Data are real time obstacles and needs instant consideration. This paper presents the overview of Big Data along with its issues and challenges. Applications of data mining in Big Data along with some of its open sources are also discussed in the paper. Keywords: Big Data, big data analytics, big data mining, Massive Online Analysis, R, GraphLab, Pegasus, Mahout

INTRODUCTION In the pre-digital revolution world of the late 1980s, most of the data was stored on videotapes such as VHS cassettes, Vinyl LP records, audio cassette tapes, and photography accounted for significant portions as well. Paper based storage represented 33% of all the data storage on its own in 1986. 25 % of all the data stored in the world in 2000 was stored digitally. 2002 was the first year in which digital storage capacity overtook analog capacity. The digital storage grew annually by 23% between 1986 and 2007 with 94 % of all the data was stored in digital format by 2007 [1]. Now, we are successful in generating and collecting data from numerous sources. The data volumes are exploding. Today, more than 2.5 exabytes (2.5 billion gigabytes) of data is generated every single day. This is expected to continue growing at a significant rate with mobile devices accounting for much of this data. Every second we create new data. For example, we perform 40,000 search queries every second (on Google alone), which makes it 3.5 searches per day and 1.2 trillion searches per year. Facebook users send on average 31.25 million messages and view 2.77

million videos every minute [2]. Applications of internet, such as E-commerce, social networking sites, etc., are speeding up the data generation process, this type of data generated and gathered in huge volume is ‘Big Data’. Big Data is making its valuable place in global economy as it is turning into driving force for economy. As data is increasing day by day, so with the increase of size of data it is difficult to manage such huge volume with the current technology. Data is collected from various sources because of which it is heterogeneous in nature and may be deficient as well. There is a need to store, manage and process the data with innovative technology that can handle and make use of data and transform it into meaningful data, i.e. information. This information from data is analyzed using new techniques for generating valuable outcomes useful for organizations and businesses (Figure 1). This holds importance in knowledge discovery and decision support system. The data management of Big Data is beyond the capability of classic database or computer system. Big Data Analytics are the one who generates valuable outcomes from

Page 12: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 16-23 © STM Journals 2016. All Rights Reserved Page 16

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Group Management for Secure and Dynamic Sharing of

Data in Cloud Computing

Raju Dara, Bhongir Sony* Department of Computer Science Engineering, Krishna Murthy Institute of Technology and

Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India

Abstract Cloud computing has emerged as new model of computing which allows outsourcing data. The phenomenon of outsourcing data to cloud became obvious as cloud has infrastructure as a service (IaaS) layer for it. With this feature of cloud, there is growing trend in outsourcing data to cloud. When an enterprise outsources its data to cloud, it needs to take care of its functionalities in terms of data sharing across its users. The company creates groups and manages group members in order to have secure and dynamic data sharing. Group manager is responsible to determine data to be shared and privileges of group members. Group management is very dynamic thing where new users may be added and existing members may be removed from group. The users who are not associated with the group may involve in collusion attack. The existing systems focus on group management and data sharing. In this paper, we built a mechanism for revoking a user and disable all credentials given to him. We built a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed scheme is effective. Keywords: Cloud computing, outsourcing, group management, secure data sharing, user revocation

INTRODUCTION Cloud computing became a reality. This is in fact the latest technology that enables the world to have a shared pool of resources and access the resources through internet. This phenomenon works for users without making capital investment. The users of cloud can gain access to resources and pay as they use. This is very useful to computing community as the cloud resources are made available to all without restrictions. As the data is growing exponentially, the enterprises prefer outsourcing data to cloud for reducing expenses and ease of management. However, the cloud is treated as untrusted environment. That is the reason there is security concern while outsourcing data to cloud. Cloud can also be used to store and share data to other users. Cloud services are shown in Figure 1. In this context, the data may be associated with different groups in the cloud assuming that an enterprise has multiple groups of people working on different projects. In this case, data is associated with groups. The data

of one group is not accessible to other group. There is group manager who is responsible to manage data and group members. Group members may be added or removed as required. The group manager is responsible to handle security issues also. Group manager can grant or remake privileges to group members. The problem with such system is that when users are removed from the group, their access credentials are misused by people to make collusion attacks. In this paper, we proposed a user revocation scheme that takes care of perfect user revocation process. With user revocation, it is possible that the old credentials cannot be misused and thus the collusion attack is prevented. In this paper, our contribution is to have a secure and dynamic scheme for data sharing in cloud and it is equipped with user revocation scheme for complete security. The remainder of the paper is structured as follows: next part of the paper provides review of literature. After that, the proposed system is presented in detail, followed by experimental results and the conclusion.

Page 13: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 24-31 © STM Journals 2016. All Rights Reserved Page 24

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Public Auditing Based Detection of Packet Dropping

Attacks in Wireless Ad Hoc Networks

Raju Dara, Srikanth Ravula* Department of Computer Science Engineering, Krishna Murthy Institute of Technology and

Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India

Abstract Wireless ad hoc networks are vulnerable to packet dropping attacks. However, they are also subjected to packet dropping due to link errors. In case of multi-hop wireless networks, it is essential to differentiate packet dropping due to link error or malicious attack. When any mechanism is able to differentiate this, can provide high level of security to the network with respect to packet dropping attacks. Many solutions came into existence as found in the literature. In this paper, we considered a special insider attack where malicious nodes are aware of other nodes in the network and exploit their knowledge to achieve packet drop which is potential risk in communication networks. Achieving satisfactory accuracy in detection of packet loss due to malicious attacks is given high importance. In this paper, public auditing mechanism is proposed and implemented that exploits correlations between lost packets. We proposed a public auditing architecture for accurate detection of packet drop attacks. We built a custom simulator using Java platform to demonstrate the proof of concept. The empirical results reveal the usefulness of the proposed system. Keywords: Wireless ad hoc network, packet dropping, auditing

INTRODUCTION Network is made up of number of nodes. Each node in the network can act as information sender and information receiver. It is true in case of multi-hops between sender and receiver. The sender may not be able to send packets directly to destination without the cooperation from intermediate nodes on the way. Therefore, it is essential to have such cooperation. Having understood this, there are certain issues here. The intermediate nodes may act as malicious nodes and drop packets without forwarding to neighbours. In wireless ad hoc networks, this is the problem that needs to be addressed. As packets play a vital role in communication, dropped packets cannot provide meaningful information to destination. This way the communication quality is deteriorated. With respect to delay, insensitive packets pertaining to a live event, it is important to ensure that packets are reaching destination accurately. Thus there is need for dealing with this problem in order to have meaningful communications in communication networks.

The existing applications either focused on packet dropping caused by link errors or attacks. Many existing mechanisms simply consider packet dropping due to attacks. They do not differentiate packet loss due to link error and packet loss due to an attack. In this paper we proposed a public auditing based solution, which demonstrates the proof of concept. The system is implemented in the form of a custom simulator developed using Java platform. The empirical results revealed that the proposed system is able to differentiate between packet losses due to link error from that caused by malicious attacks. The remainder of the paper is structured as follow: next part of the paper provides review of literature, presentation of the proposed system in detail, experimental results and after that, the conclusion of the paper. RELATED WORKS Malicious packet drops and packet drops due to link errors is the differentiation shown by detection algorithms generally. High malicious dropping rates and low link errors in one pattern. The second pattern is high link errors

Page 14: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 32-42 © STM Journals 2016. All Rights Reserved Page 32

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Double Guard: Detection Intrusion in Multitier

Application

S.D. Jadhav*, S.R. Nallewar, N.V. Burande, G.V. Bawaskar, R.D. Shilpakar Department of Information Technology, Dhole Patil College of Engineering, Wagholi, Pune,

Maharashtra, India

Abstract In double guard intrusion in multitier system, it is important concept taking into account attacks. There is very little work being performed on multi-tiered anomaly detection (AD) systems. It generates models of network behavior for both web and database network interactions. In such multi-tiered architectures, the back-end database server is often protected in system behind a firewall, while the web servers are remotely over the internet. Though they are protected from direct remote attacks, the back-end systems are susceptible to attacks that use web requests as a means to exploit. It detects this type of attack since the web IDS would merely see typical user login traffic. The current multi-threaded web server architecture in this system carries multiple systems; it is not feasible to detect or profile such causal mapping between web server traffic and it has deserver traffic, since traffic cannot be clearly attributed to user sessions in the use. Keywords: Attacks, double guard, IDS, SQL, TCP

INTRODUCTION

Problem Definition In this project we present double guard, a system used to detect various attacks in multi-tiered web services and our approach can create normality models of isolated user sessions that include both, the web front end (HTTP) and back end (File or SQL) network transactions [1]. To achieve this, we employ a lightweight virtualization technique to assign each user’s web session to addicted container, an isolated virtual computing environment. We use the container ID to accurately associate the web request with the subsequent DB queries. Double guard can build a causal mapping profile by taking both, the in web server and DB traffic into account in the system used [2]. Objective

Intrusion detection system currently examines network request individually within both, the web server and the database system. However, there is very little work being performed on multi-tiered anomaly detection systems that generate models of network behavior for both, back end and web server database interactions. The back end database server is often protected

behind a firewall while the web servers are remotely accessible over the internet. Attacks that use web request as a means to exploit the back end and are very important. Need of Project

Attacks like Sql and DDoS are very much severe. These attacks in the past have affected the system many number of times. These types of attacks are not recognized by antivirus or by firewalls. Hence, a system that can recognize and deflect these attacks is required. LITERATURE SURVEY Of all the papers referred to implement the proposed system, systems similar to the one proposed here and on which we attempt to present improvements on, can be espied in three of the research papers [1–3]. We have successfully applied static program analysis to intrusion detection and our approach is automatic: the programmer or system administrator merely needs to run our tools on the program at hand. All other automatic approaches to intrusion detection to date have been based on statistical inference, leading to many false alarms; in contrast, our

Page 15: Current Trends in Information Technology  vol 6 issue 3

CTIT (2016) 43-50 © STM Journals 2016. All Rights Reserved Page 43

Current Trends in Information Technology ISSN: 2249-4707(online), ISSN: 2348-7895(print)

Volume 6, Issue 3 www.stmjournals.com

Protected Data Compilation in WSN Using Random

Routing Algorithms

Raju Dara, Jellela Satish Reddy *

Department of Computer Science Engineering, Krishna Murthy Institute of Technology and Engineering, Jawaharlal Nehru Technological University, Hyderabad, Telangana, India

Abstract

Wireless sensor networks make it conceivable to send secure information from source to destination. On the off chance that connected to network checking information on a host, they can be used to distinguish bargained hub; and refusal of administration is two-key assault. In this paper, we display four "Multi-way randomized directing Algorithm", a technique to send the information, various approaches to order the information into wireless sensor systems. The pure random propagation, shares are engendered in view of one-bounce neighborhood data, sink TTL beginning worth N in every offer and remaining calculations enhance the effectiveness of shares in light of utilizing two-jump neighborhood data. Our work ponders the best calculation by distinguishing the included hubs with dark gaps and refusal of administration in the bundle data with multipath directing calculations that has not been utilized some time recently. We investigated the calculation that have the best proficiency and depicts the proposed framework. Keywords: Wireless sensor networks, security, attacks and routing

INTRODUCTION Wireless sensor networks normally comprise of high cost, low-control, and multifunctional wireless sensor hubs, with detecting wireless correspondence capacities [1, 2]. These sensor hubs impart the separation by means of a wireless medium and work together to fulfill a typical undertaking, for instance, environment checking, military reconnaissance, and mechanical procedure control (Figure 1) [3]. The fundamental reasoning behind WSNs is that, while the ability of every individual sensor hub is constrained, the total force of the whole system is adequate for the required mission. In numerous WSN applications, the organization of sensor hubs is performed in an especially appointed manner without watchful arranging and designing. Once sent, the sensor hubs must have the capacity to self-ruling, and sort out themselves into a wireless correspondence system. Sensor hubs are battery-controlled and are relied upon to work without participation for a generally drawn out stretch of time. Most of the time it is extremely troublesome and even difficult to change or revive batteries for the sensor hubs. WSNs are portrayed with

denser levels of sensor hub, lack of quality of sensor hubs, and separate force, calculation, and memory limitations. In this way, the kinds attributes and requirements present numerous new difficulties for the advancement and use of WSNs. Wireless sensor system (WSN) is a heterogeneous framework joining a large number of small, modest sensor hubs with a few recognizing qualities. It is low handling force and radio reaches, allowing low vitality utilization in the sensor hubs, and performing constrained and particular detecting and observing capacities [1–6]. Notwithstanding WSNs structure, a specific class of specially appointed systems that work with little base and have pulled in scientists for its improvement and numerous potential regular citizen and military applications, for example, ecological observing, combat zone reconnaissance, and country security. Be that as it may, outlining security conventions is a

Page 16: Current Trends in Information Technology  vol 6 issue 3

INFORMATION TECHNOLOGY

Current Trends in

(CTIT)

ISSN 2249-4707 (Online)

ISSN 2348-7895 (Print)

September–December 2016SJIF: 3.577

www.stmjournals.com

STM JOURNALSScientific Technical Medical