CAEPIA 2009: Current Topics in Artificial Intelligence pp 181-190 | Cite as
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
Abstract
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web service environments. The solution proposes a distributed hierarchical multiagent architecture that implements a robust mechanism of classification based on an advanced CBR-BDI agent. The agent incorporates a case-based reasoning engine that integrate a Perceptron Multilayer neural network during the re-use phase to classify incoming SOAP messages and reject those that are considered malicious. A prototype of the architecture was developed and the results obtained are presented in this study.
Keywords
SOAP message XML Security multiagent systems CBR ANNPreview
Unable to display preview. Download preview PDF.
References
- 1.Weerawarana, S., Curbera, F., Leymann, F., Storey, T., Ferguson, D.F.: Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, Englewood Cliffs (2005)Google Scholar
- 2.Nadalin, A., Kaler, C., Monzillo, R., Hallam-Baker, P.: Web Services Security: SOAP Message Security 1.1, WS-Security 2004 (2006)Google Scholar
- 3.Bajaj, S., Box, D., Chappell, D., Curbera, F., Daniels, G., Hallam-Baker, P., Hondo, M.: Web Services Policy Framework (WS-Policy) version 1.2 (2006)Google Scholar
- 4.Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della, G., Dixon, B.: Web Services Trust Language, WS-Trust (2004)Google Scholar
- 5.Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., Dixon, B.: Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1 (2004)Google Scholar
- 6.Gruschka, N., Luttenberger, N.: Protecting Web Services from DoS Attacks by SOAP Message Validation. Security and Privacy in Dynamic Environments 201, 171–182 (2006)CrossRefGoogle Scholar
- 7.Laza, R., Pavon, R., Corchado, J.M.: A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System. In: Conejo, R., Urretavizcaya, M., Pérez-de-la-Cruz, J.-L. (eds.) CAEPIA/TTIA 2003. LNCS (LNAI), vol. 3040, pp. 96–106. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 8.Loh, Y., Yau, W., Wong, C., Ho, W.: Design and Implementation of an XML Firewall. Computational Intelligence and Security 2, 1147–1150 (2006)Google Scholar
- 9.Yee, G., Shin, H., Rao, G.S.V.R.K.: An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services. In: International Conference on Convergence Information Technology, pp. 528–534. IEEE Computer Society, Washington (2007)Google Scholar
- 10.Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger, N.: SOA and Web Services: New Technologies, New Standards - New Attacks. In: Fifth European Conference on Web Services-ECOWS ’07, pp. 35–44 (2007)Google Scholar
- 11.Ye, X.: Countering DDoS and XDoS Attacks against Web Services. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 346–352 (2008)Google Scholar
- 12.Chonka, A., Zhou, W., Xiang, Y.: Defending Grid Web Services from XDoS Attacks by SOTA. In: IEEE International Conference on Pervasive Computing and Communications, pp. 1–6 (2009)Google Scholar
- 13.Carrascosa, C., Bajo, J., Julian, V., Corchado, J.M., Botti, V.: Hybrid multi-agent architecture as a real-time problem-solving model. Expert Syst. Appl. 34, 2–17 (2008)CrossRefGoogle Scholar
- 14.Corchado, J.M., Bajo, J., Abraham, A.: GerAmi: Improving Healthcare Delivery in Geriatric Residences. IEEE Intelligent Systems 23, 19–25 (2008)CrossRefGoogle Scholar
- 15.Fujii, K.: Jpcap - A network packet capture library for applications written in Java (2000), http://netresearch.ics.uci.edu/kfujii/jpcap/doc/index.html
- 16.Aamodt, A., Plaza, E.: Case-based reasoning: foundational issues, methodological variations, and system approaches. AI Commun. 7, 39–59 (1994)Google Scholar
- 17.Gallagher, M., Downs, T.: Visualization of learning in multilayer perceptron networks using principal component analysis. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 33(1), 28–34 (2003)CrossRefGoogle Scholar
- 18.LeCun, Y., Bottou, L., Orr, G.B., Müller, K.R.: Efficient BackProp. In: Neural Networks - Tricks of the Trade, p. 546. Springer, Heidelberg (1998)Google Scholar