메뉴 건너뛰기




Volumn 35, Issue , 2012, Pages 64-76

Policy-enhanced ANFIS model to counter SOAP-related attacks

Author keywords

Business Intelligence; E commerce; Fuzzy inference system; Intrusion detection; Intrusion prevention

Indexed keywords

ADAPTIVE NEURO-FUZZY INFERENCE SYSTEM; ANFIS MODEL; APPLICATION LAYERS; BUSINESS POLICIES; BUSINESS-RELATED INFORMATION; DETECTION ACCURACY; E-COMMERCE APPLICATIONS; FALSE POSITIVE RATES; FUZZY INFERENCE SYSTEMS; FUZZY MODELS; INPUT FIELD; INPUT VALUES; INTRUSION PREVENTION; NETWORK-BASED INTRUSION DETECTION; SECURITY PROTECTION; SERVICE PLATFORMS; SERVICE-BASED;

EID: 84866485165     PISSN: 09507051     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.knosys.2012.04.013     Document Type: Article
Times cited : (19)

References (34)
  • 1
    • 33750528950 scopus 로고    scopus 로고
    • Intrusion detection using a fuzzy genetics-based learning algorithm
    • DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
    • M.S. Abadeh, J. Habibi, and C. Lucas Intrusion detection using a fuzzy genetics-based learning algorithm Journal of Network and Computer Applications 30 1 2007 414 428 (Pubitemid 44666474)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 414-428
    • Abadeh, M.S.1    Habibi, J.2    Lucas, C.3
  • 5
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • X.D. Hoang, J. Hu, and P. Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 6 2009 1219 1228
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.6 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 11
    • 54949111696 scopus 로고    scopus 로고
    • The adaptive neuro-fuzzy model for forecasting the domestic debt
    • A. Keles, M. Kolcak, and A. Keles The adaptive neuro-fuzzy model for forecasting the domestic debt Knowledge-Based-Systems 21 8 2008 951 957
    • (2008) Knowledge-Based-Systems , vol.21 , Issue.8 , pp. 951-957
    • Keles, A.1    Kolcak, M.2    Keles, A.3
  • 12
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • DOI 10.1016/j.comnet.2005.01.009, PII S1389128605000083, Web Traffic
    • C. Kruegel, G. Vigna, and W. Robertson A multi-model approach to the detection of web-based attacks Journal of Computer Networks 48 5 2005 717 738 (Pubitemid 40684159)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 13
    • 78650169163 scopus 로고    scopus 로고
    • The use of artificial intelligence based techniques for intrusion detection: A review
    • G. Kumar, K. Kumar, and M. Sachdeva The use of artificial intelligence based techniques for intrusion detection: a review Artificial Intelligence Review 34 4 2010 369 387
    • (2010) Artificial Intelligence Review , vol.34 , Issue.4 , pp. 369-387
    • Kumar, G.1    Kumar, K.2    Sachdeva, M.3
  • 14
    • 33947265868 scopus 로고    scopus 로고
    • Using multiple uncertain examples and adaptative fuzzy reasoning to optimize image characterization
    • DOI 10.1016/j.knosys.2006.05.018, PII S0950705106001420
    • L. Lancieri, and L. Boubchir Using multiple uncertain examples and adaptive fuzzy reasoning to optimize image characterization Knowledge-Based- Systems 20 3 2007 266 276 (Pubitemid 46436463)
    • (2007) Knowledge-Based Systems , vol.20 , Issue.3 , pp. 266-276
    • Lancieri, L.1    Boubchir, L.2
  • 20
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
    • T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 1 2007 99 113 (Pubitemid 44666485)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Ozyer, T.1    Alhajj, R.2    Barker, K.3
  • 21
    • 33750514606 scopus 로고    scopus 로고
    • Modeling intrusion detection system using hybrid intelligent systems
    • DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
    • S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications 30 1 2007 114 132 (Pubitemid 44666486)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 22
    • 79151480916 scopus 로고    scopus 로고
    • S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
    • C.I. Pinzón, J. Bajo, J.F. De Paz, and J.M. Corchado S-MAS: an adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments Expert Systems with Applications 38 2011 5486 5499
    • (2011) Expert Systems with Applications , vol.38 , pp. 5486-5499
    • Pinzón, C.I.1    Bajo, J.2    De Paz, J.F.3    Corchado, J.M.4
  • 23
    • 84866514695 scopus 로고    scopus 로고
    • Detection and mitigation of web services attacks using markov model
    • V. Relan, B. Sonawane, Detection and Mitigation of Web Services Attacks Using Markov Model. CMSC 678: Machine Learning Project, 2009. < http://userpages.umbc.edu/~relan1/CMSC%20678%20Project%20Report.pdf >.
    • (2009) CMSC 678: Machine Learning Project
    • Relan, V.1    Sonawane, B.2
  • 25
    • 79952059044 scopus 로고    scopus 로고
    • Misuse detection using hybrid of association rule mining and connectionist modeling
    • Special Issue of Computer & IT
    • M. Sheikhan, and Z. Jadidi Misuse detection using hybrid of association rule mining and connectionist modeling World Applied Sciences Journal 7 2009 31 37 Special Issue of Computer & IT
    • (2009) World Applied Sciences Journal , vol.7 , pp. 31-37
    • Sheikhan, M.1    Jadidi, Z.2
  • 26
    • 84861522257 scopus 로고    scopus 로고
    • Misuse detection based on feature selection by fuzzy association rule mining
    • Special Issue of Computer & Electrical Engineering
    • M. Sheikhan, and M.S. Rad Misuse detection based on feature selection by fuzzy association rule mining World Applied Sciences Journal 10 2010 32 40 Special Issue of Computer & Electrical Engineering
    • (2010) World Applied Sciences Journal , vol.10 , pp. 32-40
    • Sheikhan, M.1    Rad, M.S.2
  • 29
    • 79251595062 scopus 로고    scopus 로고
    • Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
    • M.Y. Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Journal of Network and Computer Applications 34 2 2011 722 730
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.2 , pp. 722-730
    • Su, M.Y.1
  • 30
    • 34748892899 scopus 로고    scopus 로고
    • A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection
    • DOI 10.1109/ICNSC.2007.372889, 4239102, 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
    • A.N. Toosi, M. Kahani, A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection, IEEE International Conference on Networking, Sensing and Control, London, UK, 2007, pp. 834-839. (Pubitemid 47468901)
    • (2007) 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07 , pp. 834-839
    • Toosi, A.N.1    Kahani, M.2
  • 32
    • 84866479090 scopus 로고    scopus 로고
    • wsKnight
    • wsKnight. < http://net-square.com/wschess/index.html >.
  • 33
    • 77549083226 scopus 로고    scopus 로고
    • Note-against-note two-voice counterpoint by means of fuzzy logic
    • A.E. Yilmaz, and Z. Telatar Note-against-note two-voice counterpoint by means of fuzzy logic Knowledge-Based-Systems 23 3 2010 256 266
    • (2010) Knowledge-Based-Systems , vol.23 , Issue.3 , pp. 256-266
    • Yilmaz, A.E.1    Telatar, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.