Search
Now showing items 1-9 of 9
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ...
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)
SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ...
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)
SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ...
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)
This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ...
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ...