dc.creatorPinzón Trejos, Cristian
dc.creatorDe Paz, Yanira
dc.creatorBajo, Javier
dc.creatorAbraham, Ajith
dc.creatorCorchado, Juan
dc.date.accessioned2018-06-07T18:27:33Z
dc.date.accessioned2018-06-07T18:27:33Z
dc.date.available2018-06-07T18:27:33Z
dc.date.available2018-06-07T18:27:33Z
dc.date.created2018-06-07T18:27:33Z
dc.date.created2018-06-07T18:27:33Z
dc.date.issued2009-07-01
dc.date.issued2009-07-01
dc.identifierhttp://ridda2.utp.ac.pa/handle/123456789/4884
dc.identifierhttp://ridda2.utp.ac.pa/handle/123456789/4884
dc.description.abstractOne of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
dc.rightsinfo:eu-repo/semantics/embargoedAccess
dc.subjectSQL injection
dc.subjectSecurity database
dc.subjectIntrusion detection system
dc.subjectMultiagent
dc.subjectCase based reasoning
dc.subjectSQL injection
dc.subjectSecurity database
dc.subjectIntrusion detection system
dc.subjectMultiagent
dc.subjectCase based reasoning
dc.titleSiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Este ítem pertenece a la siguiente institución