Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs.
MODULES Constructing Sensor Network Packet Creation Find authorized and un authorized port Constructing Inter-Domain Packet Filters Receiving the valid packet
Data Flow Diagram Heterogeneous multiple sensor Detec1 A S1 Detec2 B S2 Detec3 C Data Flow Intruder Sending packet from source S to D
Heterogeneous single sensor Rec1 Rec 3 Detector Data Flow Rec 2 Source Filter
Access Models A Java Server Pages file may be accessed in at least two different ways: A client request comes directly into a Java Server Page.
Native code is code that after you compile it, the compiled code runs on a specific hardware platform. As a platform-independent environment, the Java platform can be a bit slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time bytecode compilers can bring performance close to that of native code without threatening portability.
A request comes through a servlet. The servlet generates the dynamic content. To handle the response to the client, the servlet creates a Bean and stores the dynamic content (sometimes called the result set) in the Bean. The servlet then invokes a Java Server Page that will present the content along with the Bean containing the generated from the servlet. There are two APIs to support this model of request processing using Java Server Pages. One API facilitates passing context between the invoking servlet and the Java Server Page. The other API lets the invoking servlet specify which Java Server Page to use. In both of the above cases, the page could also contain any valid Java code. The Java Server Pages architecture encourages separation of content from presentation—it does not mandate it.
Data flow
Class diagram
Seqence daigram
Admin module
Home Page
New Registration
Transtions
Cusotmer Details
Invalid Injection Found
Advantages If primary detector fails another detector detect the intruder. By finding the intruders we can send our information in a secured manner.
Disadvantages Data will not routed if primary detector fails. So that there is no guarantee for our information has been sent securely.
CONCLUSION This paper presented a novel highly automated approach for protecting Web applications from SQLIAs. Our approach consists of 1) Identifying trusted data sources and marking data coming from these sources as trusted, 2) Using dynamic tainting to track trusted data at runtime, and 3) Allowing only trusted data to form the semantically relevant parts of queries such as SQL keywords and operators
Presented by VINODH.M ANIL KUMAR.K DASTAGIRAIAH.K