Skip to main content

Anomaly Detection System Based on Service Oriented Architecture

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7198))

Included in the following conference series:

  • 2495 Accesses

Abstract

The problem of the network security has been taken up since eighties and has been developed up to present day. A major problem of an automatic intrusion detection is that, it is difficult to make a difference between a normal and an abnormal user behaviour. We propose the framework of a distributed anomaly detection system based on Service Oriented Architecture (SOA). The main idea of SOA is to treat applications, systems and processes as encapsulated components, which are called services. These services are represented by input and output parameters and the semantic description of their functionalities. We assume that all the functionalities of our system are delivered by the Web services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Juszczyszyn, K., Nguyen, N.T., Kolaczek, G., Grzech, A., Pieczynska, A., Katarzyniak, R.: Agent-Based Approach for Distributed Intrusion Detection System Design. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol. 3993, pp. 224–231. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Kanneganti, R., Chodavarapu, P.: SOA Security. Manning Publications (2008)

    Google Scholar 

  3. Maselli, G., Deri, L., Suin, S.: Design and Implementation of an Anomaly Detection System: an Empirical Approach. In: Terena Networking Conference (TNC 2003), Zagreb, Croatia (May 2003)

    Google Scholar 

  4. Newcomer, E., Lomow, G.: Understanding SOA with Web Services. Addison Wesley Professional (2004)

    Google Scholar 

  5. Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51(12), 3448–3470 (2007)

    Article  Google Scholar 

  6. Prusiewicz, A.: On Some Method for Intrusion Detection Used by the Multi-Agent Monitoring System. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part III. LNCS, vol. 5103, pp. 614–623. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Prusiewicz, A., Zięba, M.: The Proposal of Service Oriented Data Mining System for Solving Real-Life Classification and Regression Problems. In: Camarinha-Matos, L.M. (ed.) Technological Innovation for Sustainability. IFIP AICT, vol. 349, pp. 83–90. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Rosen, M., Lublinsky, B., Smith, K.T., Balcer, M.J., Service-Oriented Architecture and Design Strategies. Wiley Publishing, Inc. (2008)

    Google Scholar 

  9. NIST/SEMATECH e-Handbook of Statistical Methods (2011), http://www.itl.nist.gov/div898/handbook/

  10. Kołaczek, G.: Architecture for security level evaluation in service-based systems. In: Ruan, D. (ed.) Computational Intelligence: Foundations and Applications, pp. 844–850. World Scientific, New Jersey (2010)

    Chapter  Google Scholar 

  11. Jagusiak, S., Kolaczek, G., et al.: Sniffer architecture for security level measurement in service oriented systems. In: Borzemski, L. (ed.) Information Systems Architecture and Technology: New Developments in Web-Age Information Systems, pp. 101–111. Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław (2010)

    Google Scholar 

  12. Kołaczek, G., Juszczyszyn, K.: Smart security assessment of composed web services. Cybern. Syst. 41(1), 46–61 (2010)

    Article  MATH  Google Scholar 

  13. Juszczyszyn, K., Kołaczek, G., Prusiewicz, A.: Security assessment of composed Web services in a layered SOA security architecture. In: Ambroszkiewicz, S. (ed.) SOA Infrastructure Tools: Concepts and Methods, pp. 313–344. Poznań University of Economics Press, Poznań (2010)

    Google Scholar 

  14. Juszczyszyn, K., Kołaczek: Subjective logic-based framework for the evaluation of Web services’ security. In: Grzech, A. (ed.) Information Systems Architecture and Technology: Service Oriented Distributed Systems: Concepts and Infrastructure, pp. 349–360. Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kołaczek, G., Prusiewicz, A. (2012). Anomaly Detection System Based on Service Oriented Architecture. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28493-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28493-9_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28492-2

  • Online ISBN: 978-3-642-28493-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics