Research on Intrusion Detection Method of Web Service Composition

Article Preview

Abstract:

The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

331-335

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jiang Jianchun, Ma Heng Tai, Ren dang'en. Network security intrusion detection: Overview of study [J]. Journal of software, 2000 (11).

Google Scholar

[2] Liu Xiaodong. A New Mathematical Axiomatic System of Fuzzy Sets and Systems [J]. Journal of Fuzzy Mathematics, 1995, 3: 559-560.

Google Scholar

[3] Han Liyan, Wang Peizhuang. Applied fuzzy mathematics [C]. The publishing house of the capital university of economic and trade, 1989, 8: 31-43.

Google Scholar

[4] Zhang Hao, Tao Ran, Li Zhiyong et al. A Research and Application of Feature Selection based on KNN and Tabu Search Algorithm in the Intrusion Detection [J]. Acta Electronica Sinica, 2009, 37(7): 1628-1632.

Google Scholar

[5] Chen Shitao, Chen Guolong, Guo Wenzhong. Feature Selection of the Intrusion Detection Data based on Particle Swarm Optimization and Neighborhood Reduction [J]. Computer Research and Development, 2010, 47(7): 126-1267.

Google Scholar