Skip to main content
Top

2011 | OriginalPaper | Chapter

7. Denial of Service Defence Appliance for Web Services

Authors : S. Suriadi, A. Clark, H. Liu, D. Schmidt, J. Smith, D. Stebila

Published in: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Service-oriented architectures (SOAs), implemented using web services, seek to use open and interoperable standards to facilitate easier enterprise application integration, provide application flexibility and facilitate the dynamic composition of applications from component services. As with traditional distributed computing environments such as common object request broker architecture (CORBA), remote procedure call (RPC) and remote method invocation (RMI), the exposure of information resources via computer networks to remote users and applications requires that those resources be adequately protected.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The figures depicting a WSDL specification are adapted from [31, Chapter 2].
 
2
Earlier versions of the SOAP specification indicate that SOAP was an acronym for simple object access protocol; recent versions of the standard no longer use the term SOAP as an acronym.
 
6
It is not clear from the SOAP standard whether SOAP fault messages must always be generated or not. However, from the Web Services Interoperability Organization (WSI) Basic Profile document, one of the requirements (R1027, [5, Section 3.2.2]) is that a recipient must generate a SOAP fault if it cannot process a mandatory SOAP header block (those with the mustUnderstand attribute set).
 
7
Nevertheless, it is still possible for multiple non- < wsse:Security > SOAP header blocks to be targeted to the same recipient.
 
9
The DMM component is still more of a conceptual idea at this point. It is still a work-in-progress and further research is needed to properly develop this module.
 
10
In our subsequent experiments, we have not included codes to verify the freshness of timestamps however, we assume that such a process is straightforward.
 
Literature
1.
go back to reference Ahmed, E., A. Clark, and G. Mohay. 2008. A novel sliding window based change detection algorithm for asymmetric traffic. In Proceedings of the IFIP International Conference on Network and Parallel Computing, 168–175, Oct 2008. Ahmed, E., A. Clark, and G. Mohay. 2008. A novel sliding window based change detection algorithm for asymmetric traffic. In Proceedings of the IFIP International Conference on Network and Parallel Computing, 168–175, Oct 2008.
2.
go back to reference Algergawy, A., R. Nayak, and G. Saake. 2009. XML schema element similarity measures: A schema matching context. In OTM Conferences (2), 1246–1253, 2009. Algergawy, A., R. Nayak, and G. Saake. 2009. XML schema element similarity measures: A schema matching context. In OTM Conferences (2), 1246–1253, 2009.
3.
go back to reference Aura, T., P. Nikander, and J. Leiwo. 2000. DoS-resistant authentication with client puzzles. In Security Protocols Workshop 2000, 170–181. Cambridge, Apr 2000. Aura, T., P. Nikander, and J. Leiwo. 2000. DoS-resistant authentication with client puzzles. In Security Protocols Workshop 2000, 170–181. Cambridge, Apr 2000.
4.
go back to reference Badishi, G., A. Herzberg, I. Keidar, O. Romanov, and A. Yachin. 2008. An empirical study of denial of service mitigation techniques. In IEEE Symposium on Reliable Distributed Systems. SRDS ’08, 115–124, Oct 2008. Badishi, G., A. Herzberg, I. Keidar, O. Romanov, and A. Yachin. 2008. An empirical study of denial of service mitigation techniques. In IEEE Symposium on Reliable Distributed Systems. SRDS ’08, 115–124, Oct 2008.
10.
go back to reference Dean, D. and A. Stubblefield. 2001. Using Client Puzzles to Protect TLS. In Proc. 10th USENIX Security Symposium, 2001. Dean, D. and A. Stubblefield. 2001. Using Client Puzzles to Protect TLS. In Proc. 10th USENIX Security Symposium, 2001.
11.
go back to reference Dwork, C. and M. Naor. 1992. Pricing via processing or combatting junk mail. In CRYPTO ’92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, 139–147, London, 1992. Springer. Dwork, C. and M. Naor. 1992. Pricing via processing or combatting junk mail. In CRYPTO ’92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, 139–147, London, 1992. Springer.
16.
go back to reference Juels, A. and J. Brainard. 1999. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS ’99), 151–165, San Diego, Feb 1999. Internet Society Press, Reston. Juels, A. and J. Brainard. 1999. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS ’99), 151–165, San Diego, Feb 1999. Internet Society Press, Reston.
17.
go back to reference Kutty, S., T. Tran, R. Nayak, and Y. Li. 2007. Clustering XML documents using closed frequent subtrees: A structural similarity approach. In INEX, 183–194, 2007. Kutty, S., T. Tran, R. Nayak, and Y. Li. 2007. Clustering XML documents using closed frequent subtrees: A structural similarity approach. In INEX, 183–194, 2007.
27.
go back to reference Nayak, R. and S. Xu. 2005. XML documents clustering by structures. In INEX, 432–442, 2005 Nayak, R. and S. Xu. 2005. XML documents clustering by structures. In INEX, 432–442, 2005
29.
go back to reference Padmanabhuni, S., V. Singh, K. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, DC, 2006. IEEE Computer Society. Padmanabhuni, S., V. Singh, K. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, DC, 2006. IEEE Computer Society.
30.
go back to reference Reid, J., A. Clark, J. Gonzalez-Nieto, J. Smith, and K. Viswanathan. 2004. Denial of service issues in voice over IP networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), Setubal, Portugal, 25–28 August 2004 Reid, J., A. Clark, J. Gonzalez-Nieto, J. Smith, and K. Viswanathan. 2004. Denial of service issues in voice over IP networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), Setubal, Portugal, 25–28 August 2004
31.
go back to reference Rosenberg, J. and D. Remy. 2004. Securing web services with WS-security: Demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption. SAMS Publishing. Rosenberg, J. and D. Remy. 2004. Securing web services with WS-security: Demystifying WS-security, WS-policy, SAML, XML signature, and XML encryption. SAMS Publishing.
34.
go back to reference Smith, J., J. Gonzalez-Nieto, and C. Boyd. 2006. Modelling denial of service attacks on JFK with Meadows’s cost-based framework. In R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo (eds) ACSW Frontiers 2006, 16–19 January 2006, Australia, Tasmania, Hobart. Smith, J., J. Gonzalez-Nieto, and C. Boyd. 2006. Modelling denial of service attacks on JFK with Meadows’s cost-based framework. In R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo (eds) ACSW Frontiers 2006, 16–19 January 2006, Australia, Tasmania, Hobart.
36.
go back to reference Stebila, D. and B. Ustaoglu. 2009. Towards denial-of-service-resilient key agreement protocols. In Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP), LNCS, vol. 5594, 389–406. Springer. Stebila, D. and B. Ustaoglu. 2009. Towards denial-of-service-resilient key agreement protocols. In Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP), LNCS, vol. 5594, 389–406. Springer.
37.
go back to reference Suriadi, S., A. Clark, and D. Schmidt. 2010. Validating denial of service vulnerabilities in Web services. In 4th International Conference on Network and System Security (NSS), 175–182, Sept 2010. Suriadi, S., A. Clark, and D. Schmidt. 2010. Validating denial of service vulnerabilities in Web services. In 4th International Conference on Network and System Security (NSS), 175–182, Sept 2010.
38.
go back to reference Tran, T., R. Nayak, and P. Bruza. 2008. Combining structure and content similarities for XML document clustering. In AusDM, 219–226, 2008. Tran, T., R. Nayak, and P. Bruza. 2008. Combining structure and content similarities for XML document clustering. In AusDM, 219–226, 2008.
Metadata
Title
Denial of Service Defence Appliance for Web Services
Authors
S. Suriadi
A. Clark
H. Liu
D. Schmidt
J. Smith
D. Stebila
Copyright Year
2011
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-0277-6_7