2015
DOI: 10.5120/21399-4406
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network

Abstract: World Wide Web has become an ultimate source of information. Traditional services such as banking, education, medicine, defence, and transportation are being presented by web applications. Whenever the users make use of any web application, all the activities of the users get automatically get appended into the web log files. The web log file data helps the website owners in number of ways such as customization of web content, pre-fetching and caching, E-commerce, etc. However, the web log file data is exposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
1
0
1
Order By: Relevance
“…Brute force merupakan ancaman dari penyerang yang mencoba untuk login dengan menggunakan protocol SSH dan telnet untuk mengungkap password login [6]. Penyelesaian dalam menebak password menggunakan algoritma Brute Force dapat dengan mudah mencari password dengan mengkombinasikan karakter dan panjang password [7].…”
Section: Pendahuluanunclassified
“…Brute force merupakan ancaman dari penyerang yang mencoba untuk login dengan menggunakan protocol SSH dan telnet untuk mengungkap password login [6]. Penyelesaian dalam menebak password menggunakan algoritma Brute Force dapat dengan mudah mencari password dengan mengkombinasikan karakter dan panjang password [7].…”
Section: Pendahuluanunclassified
“…ii) IDS service with two components namely Analyzer and Alert System. Kaur, J. et al [19], stated that whenever the users make use of any web application, all the activities of the users are automatically appended into the web log files. This system basically concentrated on these log entries and suggested a preventive technique to protect them from.…”
Section: Literature Surveymentioning
confidence: 99%