Browsing by Author "Bajo, Javier"
Now showing items 1-20 of 22
-
An Adaptive Mechanism to Protect Databases against SQL Injection
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (2015-07-01)The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ... -
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (2009-07-01)A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ... -
AIDeM: Agent-Based Intrusion Detection Mechanism
Pinzón Trejos, Cristian; Navarro, Martí; Bajo, Javier (2010-07-02)The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ... -
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Herrero, Álvaro; Herrero, Emilio (08/23/2010)SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ... -
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
Tapia, Dante; De Paz, Juan; Rodríguez, Sara; Pinzón Trejos, Cristian; Cano, Rosa; Bajo, Javier; Corchado, Juan (01/01/2010)This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ... -
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
Pinzón Trejos, Cristian; Herrero, Álvaro; De Paz, Juan; Corchado, Emilio; Bajo, Javier (06/23/2010)One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ... -
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
Pinzón Trejos, Cristian; De Paz, Juan; Herrero, Álvaro; Corchado, Emilio; Bajo, Javier (2010-07-02)SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
Pinzón Trejos, Cristian; De Paz, Juan; Rodríguez, Sara; Bajo, Javier; Corchado, Juan (09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Pinzón Trejos, Cristian; De Paz, Juan; Herrero, Álvaro; Corchado, Emilio; Bajo, Javier; Corchado, Juan (05/10/2013)This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ... -
Improving the security level of the FUSION@ multi-agent architecture
Pinzón Trejos, Cristian; De Paz, Juan; Tapia, Dante; Bajo, Javier; Corchado, Juan (06/06/2012)The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ... -
Mathematical model for a temporal-bounded classifier in security environments
Pinzón Trejos, Cristian; De Paz, Juan; Navarro, Martí; Julián, Vicente; Tapia, Dante; Bajo, Javier (08/01/2012)Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ... -
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
Pinzón Trejos, Cristian; Tapia, Dante; De Paz, Juan; Alonso, Ricardo; Pinzón, Cristian; Bajo, Javier; Corchado, Juan (01/01/2013)Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ... -
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
Tapia, Dante; De Paz, Juan; Pinzón Trejos, Cristian; Bajo, Javier; Alonso, Ricardo; Corchado, Juan (01/26/2012)Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ... -
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
Pinzón Trejos, Cristian; De Paz, Yanira; Bajo, Javier (2009-07-01)This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ... -
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (11/09/2009)SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
Pinzón Trejos, Cristian; De Paz, Juan; Navarro, Martí; Bajo, Javier; Julián, Vicente; Corchado, Juan (10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
Pinzón Trejos, Cristian; Bajo, Javier; De Paz, Juan; Corchado, Juan (05/01/2011)During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
Pinzón Trejos, Cristian; Corchado, Juan; Bajo, Javier; De Paz, Yanira; Perez-Lancho, Belen (04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
Pinzón Trejos, Cristian; González, Angélica; Rubio, Manuel; Bajo, Javier (2012-07-02)This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ... -
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
Pinzón Trejos, Cristian; De Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan (2009-07-01)One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ...