Ir al contenido

Documat


A hybrid agent-based classification mechanism to detect denial of service attacks

    1. [1] Universidad de Salamanca

      Universidad de Salamanca

      Salamanca, España

    2. [2] Universidad Tecnológica de Panamá

      Universidad Tecnológica de Panamá

      Panamá

  • Localización: JoPha: Journal of Physical Agents, ISSN-e 1888-0258, Vol. 3, Nº. 3, 2009 (Ejemplar dedicado a: Special Session on Hybrid Reasoning and Coordination Methods on MAS), págs. 11-18
  • Idioma: inglés
  • DOI: 10.14198/jopha.2009.3.3.03
  • Enlaces
  • Resumen
    • This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web Services. One of the most common attacks requiring novel solutions is the denial of service attack (DoS), caused for the modifications introduced in the XML of the SOAP messages. The specifications of existing security standards do not focus on this type of attack. This article presents an advanced mechanism of classification designed in two phases incorporated within a CBR-BDI Agent type. This mechanism classifies the incoming SOAP message and blocks the malicious SOAP messages. Its main feature involves the use of decision trees, fuzzy logic rules and neural networks for filtering attacks. These techniques provide a mechanism of classification with the self-adaption ability to the changes that occur in the patterns of attack. A prototype was developed and the results obtained are presented in this study.

  • Referencias bibliográficas
    • [1] Rahaman, M. A., Schaad, A., & Rits, M. (2006). Towards secure SOAP message exchange in a SOA. In SWS ’06: Proceedings of the 3rd ACM...
    • [2] OASIS. (2004). Web services security: SOAP message security 1.1 (WS-Security 2004).
    • [3] Della-Libera, G., Gudgin, M., Hallam-Baker, P., Hondo, M., Granqvist, H., & Kaler, C. (2005). Web Services Security Policy Language...
    • [4] Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della, G., & Dixon, B. (2004). Web services trust language (WS-Trust).
    • [5] Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., & Dixon, B. (2004). Web services secure conversation language...
    • [6] Gruschka, N., & Luttenberger, N. (2006). Protecting web services from DoS attacks by SOAP message validation. In SEC (pp. 171–182).
    • [7] Laza, R., Pavn, R., & Corchado, J. M. (2003). A reasoning model for CBR BDI agents using an adaptable fuzzy inference system. In R....
    • [8] Rao, A. S., & Georgeff, M. P. (1991). Modeling rational agents within a BDI architecture. In Proceedings of the 2nd International...
    • [9] Aamodt, A., & Plaza, E. (1994). Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications,...
    • [10] Bittencourt, H., & Clarke, R. (2003). Use of classification and regression trees (CART) to classify remotely-sensed digital images....
    • [11] Shun, J., & Malki, H. A. (2008). Network intrusion detection system using neural networks. In International Conference on Natural...
    • [12] Snell, J., Tidwell, D., & Kulchenko, P. (2001). Programming Web Services with SOAP. O'Reilly.
    • [13] Loh, Y.-S., Yau, W\.-C., Wong, C.-T., & Ho, W\.-C. (2006). Design and implementation of an XML firewall. In International Conference...
    • [14] Yee, C. G., Shin, W. H., & Rao, G. S. V. R. K. (2007). An adaptive intrusion detection and prevention (ID/IP) framework for web services....
    • [15] Jensen, M., Gruschka, N., Herkenhoner, R., & Luttenberger, N. (2007). SOA and web services: New technologies, new standards—new attacks....
    • [16] Ye, X. (2008). Countering DDoS and XDoS attacks against web services. In IEEE/IFIP International Conference on Embedded and Ubiquitous...
    • [17] Chonka, A., Zhou, W., & Xiang, Y. (2009). Defending grid web services from XDoS attacks by SOTA. In IEEE International Conference...
    • [18] Carrascosa, C., Bajo, J., Julian, V., Corchado, J. M., & Botti, V. (2008). Hybrid multi-agent architecture as a real-time problem-solving...
    • [19] Abraham, A., Jain, R., Thomas, J., & Han, S. Y. (2007). D-SCIDS: Distributed soft computing intrusion detection system. Journal of...
    • [20] Corchado, J. M., & Laza, R. (2003). Constructing deliberative agents with case-based reasoning technology. International Journal...
    • [21] Bratman, M. E., Israel, D. J., & Pollack, M. E. (1988). Plans and resource-bounded practical reasoning. Computational Intelligence,...
    • [22] Bajo, J., Paz, J. F. D., Tapia, D. I., & Corchado, J. M. (2007). Distributed prediction of carbon dioxide exchange using CBR-BDI...
    • [23] Corchado, J. M., Glez-Bedia, M., Paz, Y. D., Bajo, J., & Paz, J. F. D. (2008). Replanning mechanism for deliberative agents in dynamic...
    • [24] Gallagher, M., & Downs, T. (2003). Visualization of learning in multilayer perceptron networks using principal component analysis....
    • [25] LeCun, Y., Bottou, L., Orr, G., & Muller, K. (1998). Efficient backprop. In G. Orr & M. K. (Eds.), Neural Networks: Tricks of...

Fundación Dialnet

Mi Documat

Opciones de artículo

Opciones de compartir

Opciones de entorno