Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Date Added: Jan 2014
This is the method to detect intrusion in multitier web applications. Multitier web application include two ends that is front end web server as well as back end of the applications database server. The front end web server which can responsible to run the application and gives that output to back end i.e. file server. This strategy is useful to identify the intrusion at both front end and back end of web application. It is used to monitor the behavior across front end web server and back end database server or file server using IDS.