Search
Now showing items 11-20 of 22
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(1905-07-01)
A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ...
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(2010-04-04)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
An Adaptive Mechanism to Protect Databases against SQL Injection
(1905-07-01)
The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ...
Improving the security level of the FUSION@ multi-agent architecture
(06/06/2012)
The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ...
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(07/01/1905)
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ...
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)
This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ...
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)
SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ...
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
(01/26/2012)
Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ...