Buscar
Mostrando ítems 1-10 de 2066
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ...
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)
This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ...
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)
This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ...
An Adaptive Mechanism to Protect Databases against SQL Injection
(2015-07-01)
The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ...
Perturbation of Numerical Confidential Data via Skew-t Distributions
(INFORMS, 2010)
We propose a new data perturbation method for numerical database security problems based on skew-t distributions. Unlike the normal distribution, the more general class of skew-t distributions is a flexible parametric ...
Vulnerabilidad de sistemas gestores de bases de datos
(Universidad Nacional (Costa Rica), 2008)
Existe una constante preocupación por la seguridad de las bases de datos; muchas veces la seguridad se ve afectada por la configuración de los procesos de conexión. En este ensayo se estudia como se configuran las conexiones ...
Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base
(2018-10-10)
In the latest years, the network computers and computational systems are receiving several cyber-attacks that affect its security. This issue is pushing researches at intrusion detection system (IDS) techniques development. ...
Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base
(Ieee, 2018-01-01)
In the latest years, the network computers and computational systems are receiving several cyber-attacks that affect its security. This issue is pushing researches at intrusion detection system (IDS) techniques development. ...
Vulnerabilidad de sistemas gestores de bases de datosVulnerabilidad de sistemas gestores de bases de datos
(Universidad Nacional de Costa Rica, 2016)