- -

Mathematical model for a temporal-bounded classifier in security environments

RiuNet: Institutional repository of the Polithecnic University of Valencia

Share/Send to

Cited by

Statistics

Mathematical model for a temporal-bounded classifier in security environments

Show simple item record

Files in this item

dc.contributor.author Paz, Juan F. de es_ES
dc.contributor.author Navarro Llácer, Martín es_ES
dc.contributor.author Pinzón, Cristian I. es_ES
dc.contributor.author Julian Inglada, Vicente Javier es_ES
dc.contributor.author Tapia, Dante I. es_ES
dc.contributor.author Bajo, Javier es_ES
dc.date.accessioned 2013-12-18T09:11:18Z
dc.date.issued 2012
dc.identifier.issn 1367-0751
dc.identifier.uri http://hdl.handle.net/10251/34595
dc.description.abstract Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks on web applications have become one of the most important information security concerns over the past few years. The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks taking into account a controlled time response. Our approach is based on a soft real-time classifier agent that incorporates a mixture of experts based on soft computing to choose a specific classification technique depending on the attack and the time available to solve the classification. A case study to evaluate the effectiveness of the approach and the preliminary results obtained with an initial prototype are also presented. © 2011 The Author. Published by Oxford University Press. All rights reserved. es_ES
dc.description.sponsorship MICINN TIN 2009-13839-C03 and CSD2007-00022 projects; Professional Excellence Program 2006-2010 IFARHU-SENACYT-Panama. en_EN
dc.format.extent 10 es_ES
dc.language Inglés es_ES
dc.publisher Oxford University Press (OUP): Policy A - Oxford Open Option A es_ES
dc.relation.ispartof Logic Journal of the IGPL es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject Clustering es_ES
dc.subject Dendrogram es_ES
dc.subject Hierarchical clustering es_ES
dc.subject PAM es_ES
dc.subject SOM es_ES
dc.subject.classification LENGUAJES Y SISTEMAS INFORMATICOS es_ES
dc.title Mathematical model for a temporal-bounded classifier in security environments es_ES
dc.type Artículo es_ES
dc.embargo.lift 10000-01-01
dc.embargo.terms forever es_ES
dc.identifier.doi 10.1093/jigpal/jzr015
dc.relation.projectID info:eu-repo/grantAgreement/MICINN//TIN2009-13839-C03-01/ES/Organizaciones Virtuales Adaptativas: Arquitecturas Y Metodos De Desarrollo/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/MEC//CSD2007-00022/ES/Agreement Technologies/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/MICINN//TIN2009-13839-C03-03/ES/Organizaciones Virtuales Adaptativas: Deliberacion, Simulacion Y Herramientas/
dc.rights.accessRights Cerrado es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Sistemas Informáticos y Computación - Departament de Sistemes Informàtics i Computació es_ES
dc.description.bibliographicCitation Paz, JFD.; Navarro Llácer, M.; Pinzón, CI.; Julian Inglada, VJ.; Tapia, DI.; Bajo, J. (2012). Mathematical model for a temporal-bounded classifier in security environments. Logic Journal of the IGPL. 20(4):712-721. https://doi.org/10.1093/jigpal/jzr015 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://jigpal.oxfordjournals.org/content/20/4/712 es_ES
dc.description.upvformatpinicio 712 es_ES
dc.description.upvformatpfin 721 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 20 es_ES
dc.description.issue 4 es_ES
dc.relation.senia 215490
dc.identifier.eissn 1368-9894
dc.contributor.funder Ministerio de Educación y Ciencia es_ES
dc.contributor.funder Ministerio de Ciencia e Innovación es_ES
dc.contributor.funder Secretaría Nacional de Ciencia, Tecnología e Innovación, Panamá; Instituto para la Formación y Aprovechamiento de Recursos Humanos, Panamá es_ES
dc.description.references CORCHADO, E., & FYFE, C. (2003). CONNECTIONIST TECHNIQUES FOR THE IDENTIFICATION AND SUPPRESSION OF INTERFERING UNDERLYING FACTORS. International Journal of Pattern Recognition and Artificial Intelligence, 17(08), 1447-1466. doi:10.1142/s0218001403002915 es_ES
dc.description.references Garvey, A. J., & Lesser, V. R. (1993). Design-to-time real-time scheduling. IEEE Transactions on Systems, Man, and Cybernetics, 23(6), 1491-1502. doi:10.1109/21.257749 es_ES
dc.description.references Herrero, Á., Corchado, E., Sáiz, L., & Abraham, A. (2010). DIPKIP: A CONNECTIONIST KNOWLEDGE MANAGEMENT SYSTEM TO IDENTIFY KNOWLEDGE DEFICITS IN PRACTICAL CASES. Computational Intelligence, 26(1), 26-56. doi:10.1111/j.1467-8640.2009.00351.x es_ES
dc.description.references Ivanciuc, O. (2007). Applications of Support Vector Machines in Chemistry. Reviews in Computational Chemistry, 291-400. doi:10.1002/9780470116449.ch6 es_ES
dc.description.references Jacobs, R. A., Jordan, M. I., Nowlan, S. J., & Hinton, G. E. (1991). Adaptive Mixtures of Local Experts. Neural Computation, 3(1), 79-87. doi:10.1162/neco.1991.3.1.79 es_ES
dc.description.references Julian, V., & Botti, V. (2004). Developing real-time multi-agent systems. Integrated Computer-Aided Engineering, 11(2), 135-149. doi:10.3233/ica-2004-11204 es_ES
dc.description.references Navarro, M., Heras, S., Julián, V., & Botti, V. (2011). Incorporating temporal-bounded CBR techniques in real-time agents. Expert Systems with Applications, 38(3), 2783-2796. doi:10.1016/j.eswa.2010.08.070 es_ES
dc.description.references Sedano, J., Curiel, L., Corchado, E., de la Cal, E., & Villar, J. R. (2010). A soft computing method for detecting lifetime building thermal insulation failures. Integrated Computer-Aided Engineering, 17(2), 103-115. doi:10.3233/ica-2010-0337 es_ES
dc.description.references SUBASI, A. (2007). EEG signal classification using wavelet feature extraction and a mixture of expert model. Expert Systems with Applications, 32(4), 1084-1093. doi:10.1016/j.eswa.2006.02.005 es_ES


This item appears in the following Collection(s)

Show simple item record