期刊名称:International Journal of Wireless and Microwave Technologies(IJWMT)
印刷版ISSN:2076-1449
电子版ISSN:2076-9539
出版年度:2015
卷号:5
期号:6
页码:53-62
DOI:10.5815/ijwmt.2015.06.07
出版社:MECS Publisher
摘要:Data theft and data attack is very common with internet users and web log files. Web log file is the proof of authentication of any user over any website. Many unauthorized users change them according to their requirement. Attacks like sql injection, brute force attack, IP spoofing might cause severe damage to the database system In this encryption techniques and optimization technique have been applied in order to check the unexpected arrival of messages or queries and the system parameter.