Browsing Investigación by Author "Corchado, Juan"
Now showing items 1-15 of 15
-
An Adaptive Mechanism to Protect Databases against SQL Injection
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (2015-07-01)The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ... -
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (2009-07-01)A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ... -
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
Tapia, Dante; De Paz, Juan; Rodríguez, Sara; Pinzón Trejos, Cristian; Cano, Rosa; Bajo, Javier; Corchado, Juan (01/01/2010)This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ... -
Arquitectura de un Sistema Multiagente para la Clasificación de Consultas con Inyección SQL
Pinzón Trejos, Cristian; Corchado, Juan (2015-07-01)En este artículo se presenta una arquitectura multiagente para la clasificación de consultas con inyección SQL en aplicaciones Web. La arquitectura integra la clasificación de consultas SQL, la monitorización de las acciones ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
Pinzón Trejos, Cristian; De Paz, Juan; Rodríguez, Sara; Bajo, Javier; Corchado, Juan (09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Pinzón Trejos, Cristian; De Paz, Juan; Herrero, Álvaro; Corchado, Emilio; Bajo, Javier; Corchado, Juan (05/10/2013)This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ... -
Improving the Language Active Learning with Multiagent Systems
Pinzón Trejos, Cristian; López, Vivian; Corchado, Juan (09/23/2009)Nowadays, there is a growing need for providing novel solutions to facilitate active learning in dependency environments. This paper present a multiagent architecture that incorporates agents specifically designed to provide ... -
Improving the security level of the FUSION@ multi-agent architecture
Pinzón Trejos, Cristian; De Paz, Juan; Tapia, Dante; Bajo, Javier; Corchado, Juan (06/06/2012)The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ... -
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
Pinzón Trejos, Cristian; Tapia, Dante; De Paz, Juan; Alonso, Ricardo; Pinzón, Cristian; Bajo, Javier; Corchado, Juan (01/01/2013)Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ... -
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
Tapia, Dante; De Paz, Juan; Pinzón Trejos, Cristian; Bajo, Javier; Alonso, Ricardo; Corchado, Juan (01/26/2012)Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ... -
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
Pinzón Trejos, Cristian; De Paz, Juan; Bajo, Javier; Corchado, Juan (11/09/2009)SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
Pinzón Trejos, Cristian; De Paz, Juan; Navarro, Martí; Bajo, Javier; Julián, Vicente; Corchado, Juan (10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
Pinzón Trejos, Cristian; Bajo, Javier; De Paz, Juan; Corchado, Juan (05/01/2011)During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
Pinzón Trejos, Cristian; Corchado, Juan; Bajo, Javier; De Paz, Yanira; Perez-Lancho, Belen (04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
Pinzón Trejos, Cristian; De Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan (2009-07-01)One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ...