The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), an adaptive solution for dealing with DoS attacks in Web service environments. The solution proposes a two phased mechanism in which each phase incorporates a special type of CBR-BDI agent that functions as a classifier. In the first phase, a case-based reasoning (CBR) engine utilizes a Naïves Bayes strategy to carry out an initial filter, and in the second phase, a CBR engine incorporates a neural network to complete the classification mechanism. AIDeM has been applied within the FUSION@ architecture to improve its curr...
This paper presents an agent specially designed for the prevention and detection of SQL injection at...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...
The availability of services can be comprimised if a service request sent to the web services server...
One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU c...
The use of architectures based on services and multi-agent systems has become an increasingly import...
This paper presents the core component of a solution based on agent technology specifically adapted ...
This paper presents the core component of a solution based on agent technology specifically adapted ...
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS att...
This paper describes a novel proposal based on a real time agent to detect and block denial of servi...
Security is a major concern when service environments are implemented. This has led to the proposal ...
A SOAP message can be affected by a DoS attack if the incoming message has been either created or mo...
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts ...
The agents used in the intrusion detection architectures have multiple characteristics namely delega...
During the last years the use of Web Service-based applications has notably increased. However, the ...
This paper presents an agent specially designed for the prevention and detection of SQL injection at...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...
The availability of services can be comprimised if a service request sent to the web services server...
One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU c...
The use of architectures based on services and multi-agent systems has become an increasingly import...
This paper presents the core component of a solution based on agent technology specifically adapted ...
This paper presents the core component of a solution based on agent technology specifically adapted ...
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS att...
This paper describes a novel proposal based on a real time agent to detect and block denial of servi...
Security is a major concern when service environments are implemented. This has led to the proposal ...
A SOAP message can be affected by a DoS attack if the incoming message has been either created or mo...
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts ...
The agents used in the intrusion detection architectures have multiple characteristics namely delega...
During the last years the use of Web Service-based applications has notably increased. However, the ...
This paper presents an agent specially designed for the prevention and detection of SQL injection at...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Intrusion detection systems are used in an operational IT environment to strengthen the security. Ev...