Soft Computing Models in Industrial and Environmental Applications, 5th International Workshop (SOCO 2010) pp 1-8 | Cite as
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
Conference paper
Abstract
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base Reasoning (CBR) model, where the different CBR phases are time bounded. In addition, the reuse phase of the CBR cycle incorporates a mixture of experts to choose a specific technique of classification depending on the feature of the attack and the available time to solve the classification.
Keywords
Multi-agent System CBR Web Service SOAP Message DoS attacksPreview
Unable to display preview. Download preview PDF.
References
- 1.Corchado, J.M., Laza, R., Borrajo, L., Yañez, J.C., Luis, A.D., Valiño, M.: Increasing the Autonomy of Deliberative Agents with a Case-Based Reasoning System. International Journal of Computational Intelligence and Applications 3, 101–118 (2003)CrossRefGoogle Scholar
- 2.Chonka, A., Zhou, W., Xiang, Y.: Defending Grid Web Services from XDoS Attacks by SOTA. In: IEEE International Conference on Pervasive Computing and Communications, pp. 1–6. IEEE Computer Society, Los Alamitos (2009)CrossRefGoogle Scholar
- 3.De Paz, J.F., Rodríguez, S., Bajo, J., Corchado, J.M.: Case-based reasoning as a decision support system for cancer diagnosis: A case study. International Journal of Hybrid Intelligent Systems 6, 97–110 (2009)Google Scholar
- 4.Dean, T., Boddy, M.S.: An Analysis of Time-Dependent Planning. In: 7th National Conference on Artificial Intelligence, pp. 49–54 (1988)Google Scholar
- 5.Gruschka, N., Jensen, M., Luttenberger, N.: A Stateful Web Service Firewall for BPEL. In: IEEE International Conference on Web Services, pp. 142–149 (2007)Google Scholar
- 6.Im, E.G., Song, Y.H.: An Adaptive Approach to Handle DoS Attack for Web Services. In: Heidelberg, S.B. (ed.) Intelligence and Security Informatics, pp. 634–635 (2005)Google Scholar
- 7.Julian, V., Botti, V.: Developing real-time multi-agent systems. Integrated Computer- Aided Engineering 11, 135–149 (2004)Google Scholar
- 8.Padmanabhuni, S., Singh, V., Kumar, K.M.S., Chatterjee, A.: Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach. In: IEEE International Conference on Web Services (ICWS 2006), pp. 577–584. IEEE Computer Society, Washington (2006)CrossRefGoogle Scholar
- 9.Ye, X.: Countering DDoS and XDoS Attacks against Web Services. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 346–352. IEEE Computer Society, Washington (2008)CrossRefGoogle Scholar
- 10.Yee, C.G., Shin, W.H., Rao, G.S.V.R.K.: An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services. In: International Conference on Convergence Information Technology (ICCIT 2007), pp. 528–534. IEEE Computer Society, Washington (2007)CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2010