Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution

  • Nicholas Beliz
    Universidad Tecnológica de Panamá nicholas.beliz[at]utp.ac.pa
  • José Carlos Rangel
    Universidad Tecnológica de Panamá
  • Chi Shun Hong
    Universidad Tecnológica de Panamá

Abstract

One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. Resources available in the server (memory and CPU cycles) of the provider can be drastically reduced or exhausted while a malicious SOAP message is being parsed. This article presents a solution based on an adaptive solution for dealing with DoS attacks in Web service environments. The solution proposes a multi-agent hierarchical architecture that implements a classification mechanism in two phases. Each phase incorporates a special type of CBR-BDI agent that functions as a classifier. In the first phase, a case-based reasoning (CBR) engine utilizes a decision tree to carry out an initial filter, and in the second phase, a CBR engine incorporates a neural network to complete the classification mechanism. A prototype of the architecture was developed and the results obtained are presented in this study. 
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
BAJAJ, Siddharth. et al., Web Services Policy Framework (WS-Policy) http://www.ibm.com/developerworks/library/specification/ws-polfram 2004

CARRASCOSA, C., BAJO, J., JULIAN, V., CORCHADO, J. M., BOTTI, V.: Hybrid multi-agent architecture as a real-time problem-solving model, Expert Systems With Applications, vol. 34, 2008, pp. 2-17.

CORCHADO, Juan M., BAJO, Javier, ABRAHAM, Ajith: GerAmi: Improving Healthcare Delivery in Geriatric Residences, IEEE Intelligent Systems. Special Issue on Ambient Intelligence, vol. 23, 2008, pp.19-25.

DAGDEE, Nirmal, THAKAR, Urjita: Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots, In: First International Conference Emerging Trends in Engineering and Technology, Nagpur, Maharashtra, India, 2008, pp. 1232-1237

GRUSCHKA, Nils. & LUTTENBERGER, Norbert. Protecting Web Services from DoS Attacks by SOAP Message Validation, In: Security and Privacy in Dynamic Environments 21st International Information Security Conference, Karlstad, Sweden, 2006, Vol (201) pp. 171-182.

JENSEN, Meiko, GRUSCHKA, Nils, HERKENHONER, Ralph, LUTTENBERGER, Norbert: SOA and Web Services: New Technologies, New Standards - New Attacks, In: Fifth European Conference on Web Services-ECOWS '07, Halle, Germany, 2007, pp. 35-44.

LAZA, Rosalia, PAVON, Reyes, CORCHADO, Juan M.: A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System, In: 10th Conference of the Spanish Association for Artificial Intelligence, 2003, vol. 3040, pp. 96-106.

LOH, Yin-Sonn, YAU, Wei-Cheun, WONG, Chien-Thang, HO, Wai-Chuen: Design and Implementation of an XML Firewal, In: Computational Intelligence and Security, Guangzhou, China, 2006, vol. 2, pp. 1147-1150.

OASIS. Web Services Security: SOAP Message Security 1.1 (WS-Security 2004), OASIS Standard 2004. http://docs.oasis-open.org/wss/2004/01/oasis-200401- wss-soap-message-security-1.0.pdf. 2006

WEERAWARANA, Sanjiva, CURBERA, Francisco, LEYMANN, Frank, STOREY, Tony and FERGUSON, Donald F.: Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More, Prentice Hall PTR, 2005.

WS-Trust , Web Services Trust Language. http://specs.xmlsoap.org/ ws/2005/02/trust/WS-Trust.pdf

YEE, Chan Gaik., SHIN, Wong Hui., RAO, G. S. V. R. K: An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services, In: International Conference on Convergence Information Technology, IEEE Computer Society, Gyeongju, South Korea, 2007, pp. 528-534
Beliz, N., Rangel, J. C., & Hong, C. S. (2013). Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 1(2), 57–63. https://doi.org/10.14201/ADCAIJ2012125763

Downloads

Download data is not yet available.
+