User Navigation Guard Approach and Web Record Exploration Based On Apriori Algorithm

Authors

  • G. Elakkiya  Department of Computer Science, Tamil university, Thanjavur, Tamilnadu, India

Keywords:

Web Usage Mining, Weblog Records, User Navigation Guard Approach, AES Algorithm, Intruder.

Abstract

User's access records are arrested by implementing a datamining algorithm on the website. Web usage mining is unique technique to fetch user necessities from web log record. By spending this application, product based organization will get to recognize the demand of certain products and it helps organization to target exact consumers. By using web usage mining technique to mine the evidence from the web access behavior of the user at the identical time as they are browsing and exploring through the Web. Intruders may abuse weblog records because that holds user requirements. So the challenge is exactly how to protect weblog records from intruders. Timing attack may allow intruders to fetch user requirements from weblog illegally. The proposed system is User Navigation Guard Approach (UNG) and it helps to protect user requirements records from timing attacks. At the matching time UNG Approach protected webserver from intruders. The proposed system also contains existing system features such as Customer will catch accurate product according to their first choice and this scheme will be valuable for those customers who frequently purchase products online. The main goal of the proposed system is to provide existing system feature with protected environment.AES is a robust encryption algorithm and it implements a public-key cryptosystem that permits protected communications. By using AES algorithm webmaster can encrypt user requirements and it comforts user to feel safe from attacks or intruders.

References

  1. Ajith Abraham, “Business Intelligence from Web Usage Mining”, Journal of Information & Knowledge Management Vol. 2, No. 4, pp.375-390, 2003.
  2. Clemens Scott Kruse1, Brenna Smith1, Hannah Vanderlinden1, Alexandra Nealand1 “Security Techniques for the Electronic Health Records”, J Med Syst, pp. 1-9, 2017.
  3. David S. Wall “Enemies within: Redefining the insider threat in organizational security policy”, Security Journal, 26, 2, pp. 107–124, 2013.
  4. Dhanant Subhadrabandhu1, Saswati Sarkar1, and Farooq Anjum2, “RIDA: Robust Intrusion Detection in Ad Hoc Networks”, IFIP International Federation for Information Processing, pp. 1069–1082, 2005.
  5. Fukun BI1, Chong FENG1, Hongquan QU1*, Tong ZHENG1, and Chonglei WANG2 “Harmful Intrusion Detection Algorithm of Optical Fiber Pre-Warning System Based on Correlation of Orthogonal Polarization Signals”, Photonic SensorsVol. 7, No. 3, pp. 226‒233, 2017.
  6. Hassan Artail*, Ammar El Halabi, Ali Hachem and Louay Al-Akhrass, “A framework for identifying the linkability between Web servers for enhanced internet computing and E-commerce”, Journal of Internet Services and Applications, pp. 1-19, 2017.
  7. Nikolaos Pitropakis1*, Dimitra Anastasopoulou1, Aggelos Pikrakis2 and Costas Lambrinoudakis1 “If you want to know about a hunter, study his prey: detection of network based attacks on KVM basedcloud environments”, Journal of Cloud Computing: Advances, Systems and Applications, pp. 1-10, 2014.
  8. Peter Galdies “Business Intelligence The insider threat to data assets” Journal of Direct, Data and Digital Marketing Practice VOL. 15 NO. 3 PP 197–200 2014.
  9. Roey Tzezana1, “Scenarios for crime and terrorist attacks using the internet of things”, Blavatnik Interdisciplinary Cyber Research Center at Tel Aviv University, pp. 1-7, 2016.
  10. Rongmao Chen*, Yi Mu, Senior Member, IEEE, Guomin Yang, Member, IEEE, Fuchun Guo, Xinyi Huang, Xiaofen Wang and Yongjun Wang, “Server-Aided Public Key Encryption with Keyword Search”, Ieee Transactions on Information Forensics and Security, pp. 1-10, 2016.
  11. Samiksha Sharma and Vinay Chopra Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman International Journal of Security and Its Applications Vol. 11, No. 3, pp.17-28, 2017.
  12. SHE Chundong1, MA Yaqi1, JIA Luting1, FEI Ligang2, KOU Baohua2 “Intrusion-detection model integrating anomaly with misuse for space information network”, Journal of Communications and Information Network Vol.1, No.3, pp. 91-96, Oct. 2016.
  13. Tzvi Chumash and Danfeng Yao, “Detection and Prevention of Insider Threats in Database DrivenWeb Services”, IFIP International Federation for Information Processing, pp. 117–132, 2009.
  14. Veeran Ranganathan Balasaraswathi*, Muthukumarasamy Sugumaran, Yasir Hamid “Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms”, Journal of Communications and Information Networks, Vol.2, No.4, pp. 108-119, Dec. 2017.
  15. Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Senior Member, IEEE, and Wu-Chun Feng, Senior Member, IEEE “Fast Detection of Transformed Data Leaks”, ieee transactions on information forensics and security vol. 11, no. 3, pp. 528-542, Jan. 1979, March 2016.

 

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
G. Elakkiya, " User Navigation Guard Approach and Web Record Exploration Based On Apriori Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1078-1083, January-February-2018.