Research Article

Cronjob Scheduling Algorithm: An Approach for Network Threat Detection and Prevention

by  Promise Enyindah, Umejuru Daniel
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 81
Published: February 2026
Authors: Promise Enyindah, Umejuru Daniel
10.5120/ijca2026926423
PDF

Promise Enyindah, Umejuru Daniel . Cronjob Scheduling Algorithm: An Approach for Network Threat Detection and Prevention. International Journal of Computer Applications. 187, 81 (February 2026), 48-58. DOI=10.5120/ijca2026926423

                        @article{ 10.5120/ijca2026926423,
                        author  = { Promise Enyindah,Umejuru Daniel },
                        title   = { Cronjob Scheduling Algorithm: An Approach for Network Threat Detection and Prevention },
                        journal = { International Journal of Computer Applications },
                        year    = { 2026 },
                        volume  = { 187 },
                        number  = { 81 },
                        pages   = { 48-58 },
                        doi     = { 10.5120/ijca2026926423 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2026
                        %A Promise Enyindah
                        %A Umejuru Daniel
                        %T Cronjob Scheduling Algorithm: An Approach for Network Threat Detection and Prevention%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 81
                        %P 48-58
                        %R 10.5120/ijca2026926423
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Network threat remains a leveraging parameter and serves as a tool for fraudulent individuals to exploit internet users due to voluminous usage of web connected devices and applications. A webserver is a gateway through which the entire internet population connects to with the aim of sharing resources or providing online services. Network and the web domain have been the pathway to deliver and have access to online services; this trend has also gained a higher increase as the need for online services to global users remain important and on the increase. There has always been an increase of intrusion on the cyber space since the web gained more concentration among others; the sophistication of attacks against these applications’ environment has grown as even as the rising use for technology also increases. To prevent common attacks of content, corruption, data theft, integrity and privacy has become an increasing problem. While approaches to security have been improved upon in recent times, intrusion techniques have also become increasingly complex. In this research work an approach for network threat detection and prevention on webserver application environment using cronjob scheduling techniques has been developed. The new system adopted the Dynamic Systems Development Model (DSDM) Methodology and was implemented using PHP7 server-side scripting programming language, Laravel MVC framework and MYSQL relational database for the backend. The proposed system has been tested and was able detect and prevent intruders from gaining unauthorized access into the webserver application environment and also was able to send a rapid response message to the admin through SMS messaging and emailing system.

References
  • Alguliyev, Imamverdiyev.V., &S. Ukhostat, Y. (2020). Cyber-physical systems and their security issues. Computer Security. 1(2), 212–223.
  • Aulds, C (2020). Linux Apache Web Server Administration, lates Edition. SybexInc. 1(1)2
  • Auxilia, D. & Tamilselvan, (2022). Anomaly Detection Using Negative Security Model in Web Application. Security models in web applications, 2 (1)34-38
  • Bendovschi, A. (2024). Cyber-Attacks - Trends, Patterns and Security Counter measures. Proceedings on Economics and Finance, (15) 24-3.
  • Benson, V. &McAlaney, J. (2021). Frumkin, L.A.: Emerging threats for the human element and Counter measures in current cyber security landscape. Psychological and Behavioral Examinations in Cyber Security, 1(2) 266–271.
  • Bharadwaja, Sun.W., Niamat, M.&Shen, F (2021). Collabra Xen Hypervisor based Collaborative Intrusion Detection System, Eighth International Conference on Information technology: New Generations, 1(2) 695-700.
  • Cabaj, K., Kotulski, Z., Księżopolski, B., &Mazurczyk, W. (2022) Cyber security: trends, issues, and challenges. EURASIP Journal on Information Security. 2(1)34-41
  • Cenzic (2024). Cenzic, Application Vulnerability Trends Report: 2014, description available at: www.cenzic.com (website visited on April 12, 2021).
  • Fan, Lejun, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, & ShuyuanJin (2020). Privacy theft malware multi process collaboration analysis. Security and Communication Networks 8 Arabian Journal for Science and Engineering (1) 3171–3189.
  • Gross, M. L., Canetti, D., &Vashdi, D. R. (2020). Cyber terrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cyber Security, 3(1), 49–58.
  • Hydara, I (2023). Current state of research on crosssite scripting (XSS) a Systematic Literature Review. Technol. 5(8), 170–186
  • Juan A, Juan Manuel PikatzaAtxa, (2015). Intrusion Detection in web applications using text Mining. Journal of Artificial Intelligence, 4 (2) 56-59
  • Kieyzun, A. (2023). Automatic creation of SQL injection and crosssite scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society.IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), 01-04.
  • Kruegel. C &Vigna, G (2021). Anomaly Detection of Web-Based Attacks, Proc. 10th ACM Conf. Computer and Comm. Security (CCs’03), Oct. 2013
  • Mazari, A.I. (2021). Cyber terrorism taxonomies: definition, targets, patterns, risk factors, and mitigation strategies. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, IGI Global, Hershey 1(2) 608–621.
  • Mohammed A., Ambusaidi, Xiangjian He, Priyadarsi Nanda &Zhiyuan Tan, (2020). Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE transactions on Computers,2(1) 2986 - 2998.
  • Rajiv. A, A.Prashanthi, Ch. Bharadwaja (2022). Web Server Security evaluation and analysis. International Journal of Computer Science and Mobile Computing, 1(2)23-32.
  • Sekar, R. (2023). An Efficient Black Box Technique for Defeating Web Application Attacks”, Proc. Network and Distributed system security sump. (NDSS) 3(1)12-19.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cronjob Algorithm Digital Attack Network Threat Detection Prevention

Powered by PhDFocusTM