[go: up one dir, main page]

Chan et al., 2014 - Google Patents

Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules

Chan et al., 2014

View PDF
Document ID
7583404207263676907
Author
Chan G
Lee C
Heng S
Publication year
Publication venue
Applied Soft Computing

External Links

Snippet

Security administrators need to prioritise which feature to focus on amidst the various possibilities and avenues of attack, especially via Web Service in e-commerce applications. This study addresses the feature selection problem by proposing a predictive fuzzy …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Sarker et al. Cybersecurity data science: an overview from machine learning perspective
Kaur et al. Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
Naik et al. The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Dai et al. A review of artificial intelligence to enhance the security of big data systems: state-of-art, methodologies, applications, and challenges
Demilie et al. Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques
Ju et al. Hetemsd: A big data analytics framework for targeted cyber‐attacks detection using heterogeneous multisource data
Chan et al. Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Sangaiah et al. Towards data security assessments using an IDS security model for cyber-physical smart cities
Sharma et al. A multilayer stacking classifier based on nature-inspired optimization for detecting cross-site scripting attack
Chan et al. Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules
Chan et al. Policy-enhanced ANFIS model to counter SOAP-related attacks
Aldo Tenis et al. Challenges and security issues of online social networks (OSN)
Ramya et al. Advancing cybersecurity with explainable artificial intelligence: a review of the latest research
Sriramya et al. Anomaly based detection of cross site scripting attack in web applications using gradient boosting classifier
Amar et al. Weighted LSTM for intrusion detection and data mining to prevent attacks
Marimuthu et al. Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach
Rohatgi et al. Introduction to Artificial Intelligence and Cybersecurity for Industry
Abdul Abiodun et al. Performance Assessment of some Phishing predictive models based on Minimal Feature corpus
Ismail et al. Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks
US12111926B1 (en) Generative artificial intelligence model output obfuscation
Priyalakshmi et al. Intrusion Detection Using Enhanced Transductive Support Vector Machine
Mishra et al. Prediction of DDoS Attacks Using Machine Learning Algorithms Based on Classification Technique
Singh et al. Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes
Khudadad et al. Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD