Biologically Inspired Security as a Service for Service-Oriented Middleware

Tashreen Shaikh Jamaluddin, Hoda Hassan, Haitham S. Hamza

2017

Abstract

Service-Oriented computing is a new programming paradigm based on service-oriented architecture that uses web services as its basic building block. Service-Oriented Middleware is a middleware layer that was developed to support service-oriented computing by allowing the flexible integration and operation of web services within the service-oriented computing environment. With the wide adoption of service-oriented computing, web service applications are no longer contained within tightly controlled environments, and thus could be subjected to malicious attacks, such as Denial of Service attacks. In this paper, we propose a generic security service that protects web services against denial of service attacks at the service-oriented middleware layer. Our security service draws on a bio-inspired framework that was developed to counteract denial of service at the network layer. To evaluate our work we have developed a prototype that showed that our proposed security service was able to detect denial of service attacks targeting a web service.

References

  1. Al-Jaroodi, J., & Al-Dhaheri, A., 2011, 'Security Issues of Service-Oriented Middleware' in International Journal of Computer Science and Network Security, vol. 11, no.1.
  2. Al-Jaroodi, J., Mohamed, N., & Aziz, J., 2010a, 'Service Oriented Middleware: Trends and Challenges' in Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations (ITNG) , IEEE CPS, Las Vegas, USA.
  3. Al-Jaroodi, J., & Mohamed, N., 2012, 'Service-oriented middleware: A survey' in Journal of Network and Computer Applications, vol.35, p. 211-220.
  4. Al-Jaroodi, J., Jawhar, I., Al-Dhaheri, A., Al-Abdouli, F., & Mohamed, N., 2010b, 'Security middleware approaches and issues for ubiquitous applications' in Science Direct Computers and Mathematics with Applications, vol. 60, p. 187-197.
  5. Lazarevic, A., Kumar, V., & Srivastava, J., 2005, 'Intrusion Detection: Survey' in Managing Cyber Threats: Issues, Approaches, and Challenges, Springer Science and Business Media, Inc., New York, p. 19- 78.
  6. Bichler, M., & Lin, K.J., 2006, 'Service-Oriented Computing' in IEEE Computer, vol. 39, no. 3, p. 99- 101.
  7. Hashim, F., Munasinghe, K.S., & Jamalipour, A., 2010, 'Biologically Inspired Anomaly Detection and Security Control Frameworks for Complex Heterogeneous Networks' in Proceedings of the IEEE Transactions on Network and Service Management, vol. 7, no. 4, p. 268-281.
  8. Gruschka, N., & Luttenberger, N., 2006, 'Protecting Web Services from DoS Attacks by SOAP Message Validation' in IFIP TC-11 21st International Information Security Conference, SEC 2006, vol. 201, p. 22-24.
  9. Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger, N., 2007, 'SOA and Web Services: New Technologies, New Standards - New Attacks' in ECOWS'07 Fifth European Conference on Web Services, p. 35-44.
  10. Jensen, M., Gruschka, N., & Herkenh, R., 2009, 'A Survey of Attacks on Web Services' in Journal Computer Science - Research and Development.
  11. Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J., 2011, 'On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks' in IEEE, viewed 12 January 2015, from http://dx.doi.org/10.1109/IWSSCloud.2011.6049019.
  12. Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, JJ., Nielsen, HF., Karmarkar, A., & Lafon, Y., 2007, 'SOAP Version 1.2.78 in W3C Recommendation specification?SOAP Version 1.2, vol. 24.
  13. “Web Services Security: SOAP Messages Security 1.1”, OASIS Standard, viewed 2 March 2015, from http://www.oasis-open.org/.
  14. Vipul, P., Mohandas, R., & Pais, A. R., 2011a, 'Attacks On Web Services And Mitigation Schemes' in Proceedings of the 2010 International Conference, Security and Cryptography (SECRYPT).
  15. Vipul, P., Mohandas, R., & Pais, A., 2011b, 'Safeguarding Web Services Using Self-Adaptive Schema Hardening Algorithm' in Advances in Network Security and Applications, Communications in Computer and Information Science, vol. 196, Springer Berlin Heidelberg, Chennai, India.
  16. Gupta, A. N., & Thilagam, P. S., 2013, 'Attacks On Web Services Need To Secure Xml On Web' in Computer Science & Engineering: An International Journal (CSEIJ), vol. 3, no. 5.
  17. Gruschka, N. & Iacono, L., 2009, 'Vulnerable Cloud: SOAP Message Security Validation Revisited' in IEEE International Conference on Web Services ICWS.
  18. Schäfer, G., Sisalem, D., & Kuthan, J., 2014, 'Denial of Service Attacks and Sip Infrastructure Attack Scenarios and Prevention Mechanisms', viewed 10 May 2014, from http://www.iptel.org/dor/papers/Sisalem1204_DoS.p df.
  19. W3C.2008, viewed 22 March 2015, from https://www.w3.org/TR/xml.
  20. W3C.2001, viewed 22 March 2015, from http://www.w3.org/TR/wsdl.
  21. W3C.2007, viewed 22 March 2015, from http://www.w3.org/TR/soap/
  22. W3C.2001 viewed 22 March 2015, from https://www.w3.org/XML/Schema.
  23. OASIS UDDI Specification TC, viewed 22 March 2015, from https://www.oasis-open.org/committees/uddispec/faq.php.
  24. MANTID Using XML Schema, viewed 18 Oct 2016, from http://www.mantidproject.org/Using_XML_Schema.
Download


Paper Citation


in Harvard Style

Shaikh Jamaluddin T., Hassan H. and Hamza H. (2017). Biologically Inspired Security as a Service for Service-Oriented Middleware . In Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE, ISBN 978-989-758-250-9, pages 121-132. DOI: 10.5220/0006337801210132


in Bibtex Style

@conference{enase17,
author={Tashreen Shaikh Jamaluddin and Hoda Hassan and Haitham S. Hamza},
title={Biologically Inspired Security as a Service for Service-Oriented Middleware},
booktitle={Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE,},
year={2017},
pages={121-132},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006337801210132},
isbn={978-989-758-250-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE,
TI - Biologically Inspired Security as a Service for Service-Oriented Middleware
SN - 978-989-758-250-9
AU - Shaikh Jamaluddin T.
AU - Hassan H.
AU - Hamza H.
PY - 2017
SP - 121
EP - 132
DO - 10.5220/0006337801210132