期刊文献+

Web服务恶意内容攻击检测技术 被引量:2

Detection of malicious content attacks on Web services
下载PDF
导出
摘要 基于SOAP消息的恶意内容攻击对Web服务的应用与推广具有很大的影响,但目前尚缺乏能有效检测SOAP消息中恶意内容的方法,为此提出了一种新的SOAP消息特征检测方法。通过定义SOAP项和SOAP规则来描述恶意内容的特征,提出了SOAP消息解析算法和SOAP规则匹配算法,用来实施恶意内容的特征检测。根据提出的方法,设计并实现了一个Web服务攻击检测的原型系统。攻击检测实验和性能分析实验的结果表明,该方法有较好的检测效果和性能。 Malicious content attacks based on SOAP messages have great impact on application and popularization of Web services.In order to detect the malicious content in SOAP message this paper proposed a new method of SOAP message signature detection.This method defined the SOAP Item and SOAP Rule to describe the feature of malicious content and introduced the SOAP message parsing algorithm and SOAP rule matching algorithm to detect the malicious content attacks detection.According to this proposed method a prototype system of Web services attack detection was designed and implemented.The experimental results of attack detection and performance analysis show that this system has good detection effect and performance.
出处 《计算机应用》 CSCD 北大核心 2010年第8期2134-2138,共5页 journal of Computer Applications
基金 国防预研基金资助项目(51406020105JB8103)
关键词 WEB服务 攻击 SOAP消息 恶意内容 特征检测 Web service attack SOAP message malicious content signature detection
  • 相关文献

参考文献9

  • 1W3C.Web services architecture[S/OL].[2009-12-09].http://www.w3.org/TR/WS-arch/.
  • 2W3C.Web services Description anguage (WSDL) version 2.0 Part 1:Core language[S/OL].[2009 -12 -09].http://www.w3.org/TR/wsdl/.
  • 3W3C.Simple Object Access Protocol (SOAP) 1.1[S/OL].[2009-12-09].http://www.w3.org/TR/2000/NOTE-SOAP-20000508.
  • 4OASIS.UDDI version 3.0.2[S/OL].[2009-12-09].http:// www.uddi.org/pubs/uddi_v3.htm.
  • 5JENSEN M,GRUSCHKA N,HERKENHONER R,et al.SOA and Web services:New technologies,new standards梟ew attacks[C] //Proceedings of Fifth European Conference on Web services.Washington,DC:IEEE,2007:35 -44.
  • 6Actional Corporation.The Web services security threat:The risk,the threats and what you can do about it[EB/OL].[2009-09 -10].http://www.actional.com/products/docs/white_paper_Web_service_security_threat.pdf.
  • 7MORADIAN E,HAKANSSON A.Possible attacks on XML Web services[J].International Journal of Computer Science and Network Security,2006,6(1B):154-170.
  • 8GRUSCHKA N,LUTTENBERGER N,HERKENHONER R.Eventbased SOAP message validation for ws-security policy-enriched Web services[EB/OL].[2010-01-12].http://www.informatik.unikiel.de/fileadmin/arbeitsgruppen/comsys/files/public/swws-full.pdf.
  • 9GRUSCHKA N,LUTTENBERGER N.Protecting Web services from Dos attacks by SOAP message validation[C] // Protecting Web services from DoS Attacks by SOAP Message Validation.Boston:Springer,2006,201:171 -182.

同被引文献17

  • 1林岳,宋保华,段海波,黄风雷.现代语义技术及其应用[J].计算机应用研究,2005,22(6):130-132. 被引量:5
  • 2蔡秀珍.获取远程主机MAC地址的两种方法[J].唐山学院学报,2007,20(2):26-28. 被引量:2
  • 3PADMANABHUNI S, SINGH V, KUMAR K M S, et al. Preventing Service Oriented Denial of Service (PreSODoS) [ C]. ICWS'06: Proceedings of the IEEE International Conference on Web Services. Washington, DC: IEEE Computer Society, 2006:577-584.
  • 4XU JUN, LEE WOOYONG. Sustaining availability of Web services under distributed denial of service attacks[ J]. IEEE Transactions on Computers, 2003, 52(2): 195-208.
  • 5WANG JUN. Defending against denial of Web serviees using sessions[ R]. Sankt Augustin: NEC Europe, 2006.
  • 6RASKIN V, NIRENBURG S, TRIEZENBERG K E, et al. Ontology in information security: A useful theoretical foundation and methodological tool[C]// NSPW'01: Proceedings of the 2001 Workshop on New Security Paradigms. New York: ACM Press, 2002:67 -73.
  • 7UNDERCOFFER J, JOSHI A, PINKSTON J. Modeling computer attacks: An ontology for intrusion detection[ C]// Proceedings of 6th International Symposium on Recent Advances in Intrusion Detection, LNCS 2516. Berlin: Springer-Verlag, 2003:113 - 135.
  • 8OWL Web Ontology Language Guide Recommendation[ EB/OL]. [2010 - 09 - 01 ]. http://www, w3. org/TR/2004/REC-owl- guide-20040210/.
  • 9GRUBER T R. A translation approach to portable ontology specifications[J]. Knowledge Acquisition, 1993, 5(2): 199- 220.
  • 10BORST W N. Construction of engineering ontologies for knowledge sharing and reuse[ D]. Enschede: University of Tweente, 1997.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部