Facultad de Ingeniería de Sistemas Computacionales: Recent submissions
Now showing items 81-100 of 190
-
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ... -
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ... -
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ... -
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ... -
Estilos digitales de estudiantes universitarios en C&T y aplicaciones didácticas de los SmartPhones en el salón de clases.
(07/22/2014)La actividad universitaria incluye la difusión y la adquisición de datos e informaciones, diseminada en múltiples bases de datos y en las más variadas posibilidades de acceso, gracias a la Internet. La inmersión de los ... -
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ... -
Irrigation system through intelligent agents implemented with arduino technology
(2018-07-05)The water has become in recent years a valuable and increasingly scarce. Its proper use in agriculture has demanded incorporate new technologies, mainly in the area of ICT. In this paper we present a smart irrigation system ... -
Management Ubiquitous of Messages and Documents Organizational through Intelligent Agents
(2009-07-01)In the context of artificial intelligence, the multiagent systems are an alternative solution to address complex problems and distributed. PAINALLI is an multi-agent architecture for managing messages and documents ... -
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
(11/09/2009)SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ... -
Classification Agent-Based Techniques for Detecting Intrusions in Databases
(09/24/2008)This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reasoning mechanism whose main characteristic ... -
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ... -
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
(09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
Improving the security level of the FUSION@ multi-agent architecture
(06/06/2012)The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ... -
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ... -
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ... -
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ...