A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode

نویسندگان

  • Cristian Pinzón
  • Yanira de Paz
  • Javier Bajo
چکیده

This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides to the classifier agents with a great capacity of learning and adaptation to face this type of attack. The architecture combines strategies of intrusion detection systems such as misuse detection and anomaly detection. It has been tested and the results are presented in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Control Strategy for Distributed Generations in Islanded Microgrids

This paper presents a robust control scheme for distributed generations (DGs) in islanded mode operation of a microgrid (MG). In this strategy, assuming a dynamic slack bus with constant voltage magnitude and phase angle, nonlinear equations of the MG are solved in the slack-voltage-oriented synchronous reference frame, and the instantaneous active and reactive power reference for the slack bus...

متن کامل

SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

One of the main attacks to ubiquitous databases is the SQL injection attack, which causes severe damages both in the commercial aspect, as in the user’s confidence. This Chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

کنترل کننده پیشفاز-پسفاز مقاوم برای تولیدات پراکنده در شرایط جزیره‌ای

Distributed generations that are connected to the network via a converter, employ dq current control method to control their active and reactive power components in grid-connected mode. In this paper a simple lead-lag control strategy is proposed for a distributed generation (DG) unit in island mode. When it is connected to the utility grid, the DG is controlled by a conventional dq-current con...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008