Method and system for detecting DoS attack in semantic Web application

A web application and semantic technology, applied in the field of network security, can solve the problems of inability to detect and defend malicious access behavior, do not support semantic Web technology, insufficient inspection, etc., to ensure normal access, improve access experience, and ensure the effect of query performance.

Active Publication Date: 2014-04-23
NEUSOFT CORP
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Although some inappropriate or malicious queries can be found by checking the graph mode of SPARQL query statements, such checks are far from enough to detect a large number of disguised malicious access behaviors, such as queries that continuously dynamically change the identity of the access subject or the access target.
[0013] Because the traditional DoS attack detection and defense mechanism does not support the Semantic Web technology, nor does it support the detection of new attack behaviors initiated by using the security flaws of the Semantic Web technology itself, therefore, the traditional DoS attack detection and defense mechanism cannot identify the above-mentioned of malicious queries
Although the current access control mechanism based on Semantic Web technology supports the relevant technical standards of the Semantic Web, it is only used to solve the security issues and policy consistency issues caused by reasoning in the Semantic Web environment because the traditional access control mechanism cannot defend against it. It does not provide the DoS attack detection function in the semantic Web environment, so it cannot detect and defend against DoS attacks against malicious access behaviors initiated by the access subject

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting DoS attack in semantic Web application
  • Method and system for detecting DoS attack in semantic Web application
  • Method and system for detecting DoS attack in semantic Web application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Aiming at the aforementioned problem that the current access control mechanism based on Semantic Web technology does not provide DoS detection function in Semantic Web environment, and cannot detect and defend against malicious DoS attacks. The present invention concretizes the access behavior of the access subject in the access control domain, records the concretized access behavior in the access history ontology database, and then learns the characteristics of the access behavior in the access control domain based on the historical ontology database, Record the learning threshold and determine the policy threshold of the DoS attack detection subject; based on the determined policy threshold, perform DoS attack detection on the access behavior of the access subject. The present invention can solve the problem that the current DoS detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for detecting DoS attack in semantic Web application, wherein the method comprises the following steps that through adopting an RDF (resource description framework) statement materialization mode, the access behavior features of an access agent for accessing an access agent in an access control domain are subjected to individualization description, and the individualization description access behavior features are recorded in an access historical body base; the access behavior features generated by the access agent, an access object and an access control domain are respectively learned on the basis of the historical body base, and the three kinds of learning thresholds are counted and recorded; strategy thresholds of the corresponding DoS attack detection strategy rules are respectively determined according to the three kinds of learning thresholds; then, the DoS attack behaviors generated in the access control domain are detected according to the strategy thresholds. The method and the system provided by the invention can solve the problem that the current DoS detection and defense mechanism does not support the semantic Web technology on one hand and does not support the novel DoS attack behavior detection and dense initiated by self safety defects using the semantic Web technology per se.

Description

technical field [0001] The invention relates to the technical field of network security, and more specifically, to a method and system for detecting DoS attacks in semantic Web applications. Background technique [0002] The existing Internet network is a collection of web pages, and the Semantic Web is a terminology definition made by computers and the Internet for the next stage of network development. Its basic meaning is to establish any tiny data connection based on the network. [0003] The Semantic Web marks the semantics of Web resources by adopting a formalized and machine-processable Semantic Web language, and finally allows machines to do more work instead of humans, and realizes automatic discovery, automatic integration, sharing and reuse of different Web resources on the Internet. And supports trusted interactions over the Internet. With the release of Semantic Web technology and related standards and the maturity of Semantic Web technology, applications based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈德彦张霞赵宏赵立军平安蒋理成
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products