Use of Data Mining to Enhance Security for SOA

被引:0
|
作者
El Yamany, Hany F. [1 ]
Capretz, Miriam A. M. [1 ]
机构
[1] Univ Western Ontario, Fac Engn, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
关键词
D O I
10.1109/ICCIT.2008.173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Service-Oriented Architecture (SOA) is an architectural paradigm for developing distributed applications so that their design is structured on loosely coupled services such as Web Services. One of the most significant difficulties with developing SOA concerns its security challenges, since the responsibilities of SOA security are based on both the servers and the clients. In recent years, a lot of solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-Security Policy. However, those standards are completely insufficient for the promising new generations of web applications, such as Web 2.0 and its upgraded edition, Web 3.0. In this work, we are proposing an intelligent security service for SOA using data mining to predict the attacks that could arise with SOAP (Simple Object Access Protocol) messages. Moreover, this service will validate the new security policies before deploying them on the service provider side by testing the probability of their vulnerability.
引用
收藏
页码:551 / 558
页数:8
相关论文
共 50 条
  • [1] Data provenance in SOA: security, reliability, and integrity
    Tsai, W. T.
    Wei, Xiao
    Chen, Yinong
    Paul, Ray
    Chung, Jen-Yao
    Zhang, Dawei
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2007, 1 (04) : 223 - 247
  • [2] Activities of the Security Transparency Consortium to Enhance the Effective Use of Visualization Data
    Kumazaki, Yusuke
    Yamada, Akira
    Sato, Ryota
    NTT Technical Review, 2024, 22 (11): : 53 - 57
  • [3] Security Related Data Mining
    Monshizadeh, Mehrnoosh
    Yan, Zheng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 775 - 782
  • [4] Data mining and Cyber security
    Thuraisingham, B
    THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
  • [5] A review on security in Data Mining
    Singh, Amarpreet
    Bhardwaj, Vinay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 70 - 74
  • [6] Data mining for security applications
    Thuraisingham, BM
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 1 - 3
  • [7] Data Mining for Security Applications
    Thuraisingham, Bhavani
    Khan, Latifur
    Masud, Mohammad M.
    Hamlen, Kevin W.
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 585 - 589
  • [8] Data mining for security applications
    Thuraisingham, B
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA'04), 2004, : 3 - 4
  • [9] Security issues for data warehousing and data mining
    Thuraisingham, BM
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 11 - 20
  • [10] Q-Mon: An Adaptive SOA System with Data Mining
    Ge, Jiang
    Tang, Xinhuai
    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA), 2016, : 304 - 308