Abstract
The problem of the network security has been taken up since eighties and has been developed up to present day. A major problem of an automatic intrusion detection is that, it is difficult to make a difference between a normal and an abnormal user behaviour. We propose the framework of a distributed anomaly detection system based on Service Oriented Architecture (SOA). The main idea of SOA is to treat applications, systems and processes as encapsulated components, which are called services. These services are represented by input and output parameters and the semantic description of their functionalities. We assume that all the functionalities of our system are delivered by the Web services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Juszczyszyn, K., Nguyen, N.T., Kolaczek, G., Grzech, A., Pieczynska, A., Katarzyniak, R.: Agent-Based Approach for Distributed Intrusion Detection System Design. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol. 3993, pp. 224–231. Springer, Heidelberg (2006)
Kanneganti, R., Chodavarapu, P.: SOA Security. Manning Publications (2008)
Maselli, G., Deri, L., Suin, S.: Design and Implementation of an Anomaly Detection System: an Empirical Approach. In: Terena Networking Conference (TNC 2003), Zagreb, Croatia (May 2003)
Newcomer, E., Lomow, G.: Understanding SOA with Web Services. Addison Wesley Professional (2004)
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51(12), 3448–3470 (2007)
Prusiewicz, A.: On Some Method for Intrusion Detection Used by the Multi-Agent Monitoring System. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part III. LNCS, vol. 5103, pp. 614–623. Springer, Heidelberg (2008)
Prusiewicz, A., Zięba, M.: The Proposal of Service Oriented Data Mining System for Solving Real-Life Classification and Regression Problems. In: Camarinha-Matos, L.M. (ed.) Technological Innovation for Sustainability. IFIP AICT, vol. 349, pp. 83–90. Springer, Heidelberg (2011)
Rosen, M., Lublinsky, B., Smith, K.T., Balcer, M.J., Service-Oriented Architecture and Design Strategies. Wiley Publishing, Inc. (2008)
NIST/SEMATECH e-Handbook of Statistical Methods (2011), http://www.itl.nist.gov/div898/handbook/
Kołaczek, G.: Architecture for security level evaluation in service-based systems. In: Ruan, D. (ed.) Computational Intelligence: Foundations and Applications, pp. 844–850. World Scientific, New Jersey (2010)
Jagusiak, S., Kolaczek, G., et al.: Sniffer architecture for security level measurement in service oriented systems. In: Borzemski, L. (ed.) Information Systems Architecture and Technology: New Developments in Web-Age Information Systems, pp. 101–111. Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław (2010)
Kołaczek, G., Juszczyszyn, K.: Smart security assessment of composed web services. Cybern. Syst. 41(1), 46–61 (2010)
Juszczyszyn, K., Kołaczek, G., Prusiewicz, A.: Security assessment of composed Web services in a layered SOA security architecture. In: Ambroszkiewicz, S. (ed.) SOA Infrastructure Tools: Concepts and Methods, pp. 313–344. Poznań University of Economics Press, Poznań (2010)
Juszczyszyn, K., Kołaczek: Subjective logic-based framework for the evaluation of Web services’ security. In: Grzech, A. (ed.) Information Systems Architecture and Technology: Service Oriented Distributed Systems: Concepts and Infrastructure, pp. 349–360. Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kołaczek, G., Prusiewicz, A. (2012). Anomaly Detection System Based on Service Oriented Architecture. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28493-9_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-28493-9_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28492-2
Online ISBN: 978-3-642-28493-9
eBook Packages: Computer ScienceComputer Science (R0)