Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
Cloud computing inherits all the systems, networks as well asWeb Services’ security vulnerabilities, in particular for software as a service (SaaS), where business applications or services are provided over the Cloud as Web Service (WS). Hence, WS-based applications must be protected against loss o...
| Main Authors: | Chan, Gaik Yee, Chua, Fang Fang, Lee, Chien Sing * |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IOS Press
2016
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/686/ http://eprints.sunway.edu.my/686/1/Lee%20Chien%20Sing%20Intrusion%20Detection.pdf |
Similar Items
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Using fuzzy association rule mining in cancer classification
by: Mahmoodian, Sayed Hamid, et al.
Published: (2011)
by: Mahmoodian, Sayed Hamid, et al.
Published: (2011)
Fuzzy integral for rule aggregation in fuzzy inference systems
by: Tomlin, Leary, et al.
Published: (2016)
by: Tomlin, Leary, et al.
Published: (2016)
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
by: Tay, Kai Mei, et al.
Published: (2009)
by: Tay, Kai Mei, et al.
Published: (2009)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Fuzzy service quality review in service oriented architectures
by: Schmidt, Stefan, et al.
Published: (2006)
by: Schmidt, Stefan, et al.
Published: (2006)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS)
by: Leow, Yu Hong
Published: (2024)
by: Leow, Yu Hong
Published: (2024)
Designing an Adaptive Coach in Collaborative Learning Systems Using Service-Oriented Architecture
by: Chua, Fang Fang
Published: (2009)
by: Chua, Fang Fang
Published: (2009)
Monotone Fuzzy Rule Relabeling for the Zero-Order TSK Fuzzy Inference System
by: Tay, Kai Meng, et al.
Published: (2016)
by: Tay, Kai Meng, et al.
Published: (2016)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Fuzzy-based NCTF controller for PTP positioning: fuzzy membership and rule based modifications
by: Purtojo, Purtojo, et al.
Published: (2011)
by: Purtojo, Purtojo, et al.
Published: (2011)
A hybrid approach to intrusion detection and prevention for business intelligence applications
by: Yee, , Chan Gaik, et al.
Published: (2006)
by: Yee, , Chan Gaik, et al.
Published: (2006)
A New Framework With Similarity Reasoning and
Monotone Fuzzy Rule Relabeling for Fuzzy Inference
Systems
by: Tay, Kai Meng, et al.
Published: (2013)
by: Tay, Kai Meng, et al.
Published: (2013)
Fuzzy Rules Optimization in Fuzzy Expert System for
Machinability Data Selection: Genetic Algorithms Approach
by: Wong, Shaw Voon, et al.
Published: (2001)
by: Wong, Shaw Voon, et al.
Published: (2001)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Rule-based fuzzy logic controller with adaptable reference
by: Khan, Sheroz, et al.
Published: (2008)
by: Khan, Sheroz, et al.
Published: (2008)
Minimum rule-based parallel structure fuzzy controller
by: Karimadini, Mohammad, et al.
Published: (2005)
by: Karimadini, Mohammad, et al.
Published: (2005)
Optimization of fuzzy rules design using genetic algorithm
by: Wong, S.V., et al.
Published: (2000)
by: Wong, S.V., et al.
Published: (2000)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
A hybrid fuzzy framework for Cloud service selection
by: Le, S., et al.
Published: (2014)
by: Le, S., et al.
Published: (2014)
Designing an Intelligent Coach for a Collaborative Concept-Mapping Learning Environment
by: Fang-Fang, Chua, et al.
Published: (2008)
by: Fang-Fang, Chua, et al.
Published: (2008)
Refinement of generated weighted fuzzy production rules by using fuzzy neural networks for stock market prediction.
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Informative top-k class associative rule for cancer biomarker discovery on microarray data
by: Ong, Huey Fang, et al.
Published: (2020)
by: Ong, Huey Fang, et al.
Published: (2020)
Informative top-k class associative rule for cancer biomarker discovery on microarray data
by: Ong, Huey Fang, et al.
Published: (2020)
by: Ong, Huey Fang, et al.
Published: (2020)
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
by: Malekzadeh, Mina, et al.
Published: (2012)
by: Malekzadeh, Mina, et al.
Published: (2012)
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A fuzzy-based technique for describing security requirements of intrusion tolerant systems
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Classifying modality learning styles based on Production-Fuzzy Rules
by: Rahmah, Mokhtar, et al.
Published: (2011)
by: Rahmah, Mokhtar, et al.
Published: (2011)
A New Monotonicity Index for Fuzzy Rule-based Systems
by: Lie, Meng Pang, et al.
Published: (2014)
by: Lie, Meng Pang, et al.
Published: (2014)
Measuring customer satisfaction of service quality by fuzzy evaluation approach
by: Firdawati Mohamed,, et al.
Published: (2022)
by: Firdawati Mohamed,, et al.
Published: (2022)
A fuzzy VSM-based approach for semantic service retrieval
by: Chotipant, S., et al.
Published: (2014)
by: Chotipant, S., et al.
Published: (2014)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Fuzzy decision support for service selection in e-business environments
by: Schmidt, S., et al.
Published: (2007)
by: Schmidt, S., et al.
Published: (2007)
A New Fuzzy Ratio and Its Application to the Single Input Rule Modules Connected Fuzzy Inference System
by: Chian, Haur Jong, et al.
Published: (2014)
by: Chian, Haur Jong, et al.
Published: (2014)
Similar Items
-
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013) -
Using fuzzy association rule mining in cancer classification
by: Mahmoodian, Sayed Hamid, et al.
Published: (2011) -
Fuzzy integral for rule aggregation in fuzzy inference systems
by: Tomlin, Leary, et al.
Published: (2016) -
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
by: Tay, Kai Mei, et al.
Published: (2009) -
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)