A Framework for Integrated Threat Detection on Semantic Web Services

  • Nagendra Kumar Sing
  • Sandeep Kumar Nayak


In today's digital age, semantic Web amenities have grown progressively. The increasing use of the Semantic Web has attracted the attention of various users and today they are sharing all their private and confidential information through these amenities. Web amenities such as digital-trade have completely changed the way of doing business and made many revolutionary changes in it. The digital-trade Web amenityhoards assortedhues of data in its database server. It is not feasible to use a single database program by adigital-trade Web amenity to hoard all hues of data because the nature of each data is dissimilar. Therefore it is necessary to develop a mechanism that uses apposite database programs for amassing assorted hues of data. Therefore, it is indispensable that all the information hoarded by the user on the Web server must be fortified against illicit admittance or disclosure of clandestine data to illicit persons. This paper purports the integrated threat prevention framework using dispersed database ploy for digital-trade Web amenity. In this paper, the dispersed database ploy has been recommended to store assorted type of data. The security of a Web amenity has also been augmented by pioneering the concept of IP-MAC trussing for both client and server. When the client and server communicate with each other for the first time, the IP-MAC trussing of the client and server is hoards on both sides. In next conversation, this IP-MAC trussing will be used for authenticating the identity of both client and server. This IP-MAC trussing will also be helpful in preventing the network assails such as Renunciation-of-Amenity (RoA) and Man-in-the-Middle (MITM) on database or Web server.

How to Cite
Sing, N. K., & Nayak, S. K. (2019). A Framework for Integrated Threat Detection on Semantic Web Services. International Journal of Control and Automation, 12(4), 157 - 169. Retrieved from http://sersc.org/journals/index.php/IJCA/article/view/787