A Neural Network for PCA and Beyond
Neural Processing Letters
Visual information seeking: tight coupling of dynamic query filters with starfield displays
Readings in information visualization
New approximations of differential entropy for independent component analysis and projection pursuit
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
The rectified Gaussian distribution
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
IEEE Transactions on Visualization and Computer Graphics
Neural Networks: Tricks of the Trade, this book is an outgrowth of a 1996 NIPS workshop
Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
Data Mining and Knowledge Discovery
Passive visual fingerprinting of network attack tools
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
ACM SIGGRAPH Computer Graphics
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Complexity Pursuit: Separating Interesting Components from Time Series
Neural Computation
Hierarchical Visualization of Network Intrusion Detection Data
IEEE Computer Graphics and Applications
Security Data Visualization
A hybrid machine learning approach to network anomaly detection
Information Sciences: an International Journal
A Projection Pursuit Algorithm for Exploratory Data Analysis
IEEE Transactions on Computers
SQL-IDS: a specification-based approach for SQL-injection detection
Proceedings of the 2008 ACM symposium on Applied computing
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
An execution time planner for the ARTIS agent architecture
Engineering Applications of Artificial Intelligence
Applied Security Visualization
Applied Security Visualization
Mechanisms for database intrusion detection and response
Proceedings of the 2nd SIGMOD PhD workshop on Innovative database research
Information Sciences: an International Journal
An Approach for SQL Injection Vulnerability Detection
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems
Information Sciences: an International Journal
Reactive reasoning and planning
AAAI'87 Proceedings of the sixth National conference on Artificial intelligence - Volume 2
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
Personalized mode transductive spanning SVM classification tree
Information Sciences: an International Journal
A learning-based approach to the detection of SQL attacks
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Intrusion and misuse detection in large-scale systems
IEEE Computer Graphics and Applications
Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets
IEEE Transactions on Neural Networks
Semantic security against web application attacks
Information Sciences: an International Journal
Information Sciences: an International Journal
A generic framework for a compilation-based inference in probabilistic and possibilistic networks
Information Sciences: an International Journal
Hi-index | 0.07 |
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed strategy where the functionalities are structured on layers. SQL-injection attacks, one of the most dangerous attacks to online databases, are the focus of this research. The agents in each one of the layers are specialized in specific tasks, such as data gathering, data classification, and visualization. This study presents two key agents under a hybrid architecture: a classifier agent that incorporates a Case-Based Reasoning engine employing advanced algorithms in the reasoning cycle stages, and a visualizer agent that integrates several techniques to facilitate the visual analysis of suspicious queries. The former incorporates a new classification model based on a mixture of a neural network and a Support Vector Machine in order to classify SQL queries in a reliable way. The latter combines clustering and neural projection techniques to support the visual analysis and identification of target attacks. The proposed approach was tested in a real-traffic case study and its experimental results, which validate the performance of the proposed approach, are presented in this paper.