“Security as a Service” (SECaaS) architecture that
employs SOAP message validation and subsequent
schema hardening to defend against DoS attacks. To
evaluate our work we have developed a prototype
for the (SECaaS) architecture and tested it against
several DoS SOAP-based attacks. Results show that
our prototype was capable of detecting all attacks
administered to the system. Our future work will
focus on implementation and evaluation of CP
algorithm. Although the proposed work presents the
detection of some DoS attacks, a formal proof for
mitigation is missing. Thus, upcoming work would
focus on performance evaluation of the presented
work in comparison to other techniques.
REFERENCES
Al-Jaroodi, J., & Al-Dhaheri, A., 2011, ‘Security Issues of
Service-Oriented Middleware’ in International
Journal of Computer Science and Network Security,
vol. 11, no.1.
Al-Jaroodi, J., Mohamed, N., & Aziz, J., 2010a, ‘Service
Oriented Middleware: Trends and Challenges’ in
Proceedings of the 2010 Seventh International
Conference on Information Technology: New
Generations (ITNG) , IEEE CPS, Las Vegas, USA.
Al-Jaroodi, J., & Mohamed, N., 2012, ‘Service-oriented
middleware: A survey’ in Journal of Network and
Computer Applications, vol.35, p. 211–220.
Al-Jaroodi, J., Jawhar, I., Al-Dhaheri, A., Al-Abdouli, F.,
& Mohamed, N., 2010b, ‘Security middleware
approaches and issues for ubiquitous applications’ in
Science Direct Computers and Mathematics with
Applications, vol. 60, p. 187–197.
Lazarevic, A., Kumar, V., & Srivastava, J., 2005,
‘Intrusion Detection: Survey’ in Managing Cyber
Threats: Issues, Approaches, and Challenges,
Springer Science and Business Media, Inc., New
York, p. 19- 78.
Bichler, M., & Lin, K.J., 2006, ‘Service-Oriented
Computing’ in IEEE Computer, vol. 39, no. 3, p. 99–
101.
Hashim, F., Munasinghe, K.S., & Jamalipour, A., 2010,
‘Biologically Inspired Anomaly Detection and
Security Control Frameworks for Complex
Heterogeneous Networks’ in Proceedings of the IEEE
Transactions on Network and Service Management,
vol. 7, no. 4, p. 268–281.
Gruschka, N., & Luttenberger, N., 2006, ‘Protecting Web
Services from DoS Attacks by SOAP Message
Validation’ in IFIP TC-11 21st International
Information Security Conference, SEC 2006, vol. 201,
p. 22–24.
Jensen, M., Gruschka, N., Herkenhoner, R., Luttenberger,
N., 2007, ‘SOA and Web Services: New
Technologies, New Standards - New Attacks’ in
ECOWS’07 Fifth European Conference on Web
Services, p. 35-44.
Jensen, M., Gruschka, N., & Herkenh, R., 2009, ‘A
Survey of Attacks on Web Services’ in Journal
Computer Science - Research and Development.
Jensen, M., Meyer, C., Somorovsky, J., & Schwenk, J.,
2011, ‘On the Effectiveness of XML Schema
Validation for Countering XML Signature Wrapping
Attacks’ in IEEE, viewed 12 January 2015, from
http://dx.doi.org/10.1109/IWSSCloud.2011.6049019.
Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, JJ.,
Nielsen, HF., Karmarkar, A., & Lafon, Y., 2007,
‘SOAP Version 1.2.’ in W3C Recommendation
specification―SOAP Version 1.2, vol. 24.
“Web Services Security: SOAP Messages Security 1.1”,
OASIS Standard, viewed 2 March 2015, from
http://www.oasis-open.org/.
Vipul, P., Mohandas, R., & Pais, A. R., 2011a, ‘Attacks
On Web Services And Mitigation Schemes’ in
Proceedings of the 2010 International Conference,
Security and Cryptography (SECRYPT).
Vipul, P., Mohandas, R., & Pais, A., 2011b, ‘Safeguarding
Web Services Using Self-Adaptive Schema Hardening
Algorithm’ in Advances in Network Security and
Applications, Communications in Computer and
Information Science, vol. 196, Springer Berlin
Heidelberg, Chennai, India.
Gupta, A. N., & Thilagam, P. S., 2013, ‘Attacks On Web
Services Need To Secure Xml On Web’ in Computer
Science & Engineering: An International Journal
(CSEIJ), vol. 3, no. 5.
Gruschka, N. & Iacono, L., 2009, ‘Vulnerable Cloud:
SOAP Message Security Validation Revisited’ in
IEEE International Conference on Web Services
ICWS.
Schäfer, G., Sisalem, D., & Kuthan, J., 2014, ‘Denial of
Service Attacks and Sip Infrastructure Attack
Scenarios and Prevention Mechanisms’, viewed 10
May 2014, from
http://www.iptel.org/~dor/papers/Sisalem1204_DoS.p
df.
W3C.2008, viewed 22 March 2015, from
https://www.w3.org/TR/xml.
W3C.2001, viewed 22 March 2015, from
http://www.w3.org/TR/wsdl.
W3C.2007, viewed 22 March 2015, from
http://www.w3.org/TR/soap/
W3C.2001 viewed 22 March 2015, from
https://www.w3.org/XML/Schema.
OASIS UDDI Specification TC, viewed 22 March 2015,
from https://www.oasis-open.org/committees/uddi-
spec/faq.php.
MANTID Using XML Schema, viewed 18 Oct 2016, from
http://www.mantidproject.org/Using_XML_Schema.
ENASE 2017 - 12th International Conference on Evaluation of Novel Approaches to Software Engineering
132