This document discusses security techniques for front-end and back-end databases in three-tier web applications. It proposes a double security system that assigns each user session to a dedicated container or virtual computing environment. This allows the system to map and profile activity between the web server and database server, enabling it to detect attacks. The system separates traffic by session, analyzes HTTP requests and SQL queries, maps requests to queries, and can detect direct database attacks or SQL injection attacks by checking for unmapped queries.