C4.5: programs for machine learning
C4.5: programs for machine learning
A survey of research in deliberative real-time artificial intelligence
Real-Time Systems
Continuous case-based reasoning
Artificial Intelligence
Towards a real-time architecture for time-aware agents
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Neural Networks: Tricks of the Trade, this book is an outgrowth of a 1996 NIPS workshop
Modelling Agents in Hard Real-Time Environments
MAAMAW '99 Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: MultiAgent System Engineering
Adaptive Tutoring Processes and Mental Plans
ITS '02 Proceedings of the 6th International Conference on Intelligent Tutoring Systems
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Understanding Enterprise SOA
Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Information Security: Principles and Practice
Information Security: Principles and Practice
Information Security Management Handbook, Volume 1
Information Security Management Handbook, Volume 1
EEG signal classification using wavelet feature extraction and a mixture of expert model
Expert Systems with Applications: An International Journal
Developing real-time multi-agent systems
Integrated Computer-Aided Engineering
A Framework for Enhancing Web Services Security
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Adaptive mixtures of local experts
Neural Computation
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
ACM Transactions on the Web (TWEB)
Countering DDoS and XDoS Attacks against Web Services
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 01
Model of experts for decision support in the diagnosis of leukemia patients
Artificial Intelligence in Medicine
Defending Grid Web Services from XDoS attacks by SOTA
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Mining fuzzy rules using an Artificial Immune System with fuzzy partition learning
Applied Soft Computing
A meta-reasoning model for hard real-time agents
CAEPIA'05 Proceedings of the 11th Spanish association conference on Current Topics in Artificial Intelligence
An adaptive approach to handle dos attack for web services
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Visualization of learning in multilayer perceptron networks using principal component analysis
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these environments. However, most proposed approaches focus only on ensuring confidentiality and integrity, without putting forward mechanisms that ensure the availability of services and resources offered. A considerable number of attack mechanisms can lead to a web service system crash. As a result, the web service cannot allow access to authorized users. This type of attack is a so-called denial of service attack (DoS) which affects the availability of the services and recourses available. This article presents a novel soft computing-based approach to cope with DoS attacks, but unlike existing solutions, our proposal takes into account the different soft computing mechanisms that can lead to a DoS attack. Our approach is based on a real time classifier agent that incorporates a mixture of experts to choose a specific classification technique depending on the feature of the attack and the time available to solve the classification. With this scheme it is possible to divide the problem into subproblems, solving the classification of the web service requests in a more simple and effective way and always within a time bound interval. This research presents a case study to evaluate the effectiveness of the approach and also presents the preliminary results obtained with an initial prototype.