2016
DOI: 10.3233/jifs-169007
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection and prevention of web service attacks for software as a service: Fuzzy association rules vs fuzzy associative patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Chan, Gaik-Yee, Fang-Fang Chua, and Chien-Sing Lee [19] In this paper, we present our fuzzy association rule-based (FAR) and fuzzy associative pattern-based (FAP) intrusion detection and prevention (IDP) systems in defending against WS attacks at the SaaS level. Our experimental results have validated the capabilities of these two IDP systems in terms of detection of known attacks and prediction of new variant attacks with accuracy close to 100%.…”
Section: Literature Survey On Association Rule Miningmentioning
confidence: 99%
“…Chan, Gaik-Yee, Fang-Fang Chua, and Chien-Sing Lee [19] In this paper, we present our fuzzy association rule-based (FAR) and fuzzy associative pattern-based (FAP) intrusion detection and prevention (IDP) systems in defending against WS attacks at the SaaS level. Our experimental results have validated the capabilities of these two IDP systems in terms of detection of known attacks and prediction of new variant attacks with accuracy close to 100%.…”
Section: Literature Survey On Association Rule Miningmentioning
confidence: 99%
“…Further, the paper proposes a penetration testing tool which simulates known XDoS attacks. Chan, Chua [11] presented a fuzzy association rule-based (FAR) and fuzzy associative pattern-based (FAP) intrusion detection and prevention (IDP) system to defend and prevent web service attacks. In this work, authors extend their examination on the use of fuzzy logic, associative pattern matching and association rules in helping for detection and prevention of existing signature-based attacks, as well as prediction of new anomaly-based attacks on a web service-based e-commerce application deployed over the Internet.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation results have demonstrated that the vulnerabilities in 66% of all tested parses in their default configurations. XDoS and DXDoS are found to be more destructive than the traditional DoS [11]. The purpose of these attacks is to consume the system resources by sending SOAP requests that contain malicious XML content.…”
Section: Introductionmentioning
confidence: 99%