Use of Data Mining to Enhance Security for SOA

被引:0
|
作者
El Yamany, Hany F. [1 ]
Capretz, Miriam A. M. [1 ]
机构
[1] Univ Western Ontario, Fac Engn, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
关键词
D O I
10.1109/ICCIT.2008.173
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Service-Oriented Architecture (SOA) is an architectural paradigm for developing distributed applications so that their design is structured on loosely coupled services such as Web Services. One of the most significant difficulties with developing SOA concerns its security challenges, since the responsibilities of SOA security are based on both the servers and the clients. In recent years, a lot of solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-Security Policy. However, those standards are completely insufficient for the promising new generations of web applications, such as Web 2.0 and its upgraded edition, Web 3.0. In this work, we are proposing an intelligent security service for SOA using data mining to predict the attacks that could arise with SOAP (Simple Object Access Protocol) messages. Moreover, this service will validate the new security policies before deploying them on the service provider side by testing the probability of their vulnerability.
引用
收藏
页码:551 / 558
页数:8
相关论文
共 50 条
  • [31] Data mining techniques for information security applications
    Al-Shawi, Amany
    WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [32] Predictive security model using data mining
    Alampalayam, SP
    Kumar, A
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2208 - 2212
  • [33] Security Implications of Data Mining in Cloud Scheduling
    Delimitrou, Christina
    Kozyrakis, Christos
    IEEE COMPUTER ARCHITECTURE LETTERS, 2016, 15 (02) : 109 - 112
  • [34] Data mining techniques for security of web services
    Malek, Manu
    Harmantzis, Fotios
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 3 - +
  • [35] Massive Data Mining, Cyber Security Approach
    Guizani, Sghaier
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1368 - 1372
  • [36] Enhance discovery and retrieval of geospatial data using SOA and Semantic Web technologies
    Tian, Yong
    Huang, Mutao
    EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (16) : 12522 - 12535
  • [37] Using data mining to enhance automated planning and scheduling
    Frank, Jeremy
    2007 IEEE Symposium on Computational Intelligence and Data Mining, Vols 1 and 2, 2007, : 251 - 260
  • [38] Security Broker - A Complementary Tool for SOA Security
    Kamatchia, R.
    Rakshit, Atanu
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2011: INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS A-C, 2011, 1389
  • [39] Security as a Service - A Reference Architecture for SOA Security
    Memon, Mukhtiar
    Hafner, Michael
    Breu, Ruth
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 79 - 89
  • [40] Data Mining Techniques to Enhance Customer Lifetime Value
    Lin, Chia-Chia
    Shih, Dong-Her
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 3 - +