期刊文献+

一种基于操作请求图的Web服务入侵检测方法

A Method of Web Service Intrusion Detection Based on Operation Request Graph
下载PDF
导出
摘要 为了解决松散耦合性导致的Web服务易遭受攻击的问题,提出一种针对Web服务调用的异常检测方法.通过对BPEL文件的控制流程图进行分析,提取出服务编排中涉及的所有服务操作,以结构性活动为逻辑关系,以操作间传递的参数为有向边权值构造操作请求图,将该操作请求图作为异常检测模型的"活动简档",对于不符合异常检测模型的行为判定为入侵.这种方法约束用户按照BPEL的编排执行业务流程,从而保证了Web服务调用的安全性. The loosely-coupled property makes web service vulnerable.A method focused on web service invoking is proposed to solve the problem.Firstly,we analyze the control-flow graph of the BPEL document and extract all the operations it involved.Then an operation request graph is created based on the structure activities and the parameter which the operations pass among each other.The operation request graph is regarded as the profile of the anomaly detection model.If user behavior goes against the model,it will be judged as illegal.This method regulates the user behavior by forcing the users to execute the business process according to the BPEL document,so it guarantee the safety of the web service.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第11期9-12,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60703086 60973046) 江苏省自然科学基金(BK2009426) 江苏省高校自然科学基金(10KJB520015) 南应变邮电大学攀登计划(NY210009) 江苏省普通高校研究生科研创新计划(CXLX12_0479)
关键词 WEB服务 BPEL 控制流程图 操作请求图 异常检测 web service BPEL control-flow graph operation request graph anomaly detection
  • 相关文献

参考文献8

  • 1Valipour M H,Amirzafari B, Maleki K N,et al. Abrief survey of software architecture concepts and serv-ice oriented architecture [C] // Proceedings of 2ndIEEE International Conference on Computer Scienceand Information Technology. 2009*34-38.
  • 2Liu W J,Pang T,Qu H C. The research on the appli-cation of WS-security signature flow middleware basedon SOA [C]// Proceedings of International Conferenceon Management and Service Science. 2009:1-3.
  • 3Jensen M, Gruschka N, Herkenhoner R. A survey ofattacks on web services[J]. Computer Science-reswarchand Development, 2009,24(4) * 185-197.
  • 4Sebastian Hinz, Karsten Schmidt, Christian Stahl.Transforming BPEL to petri nets[C] // Proceeding ofBPM 2005. LNCS 3649,2005: 220-235.
  • 5Sharif M,Singh K*Giffin J?et al. Understanding preci-sion in host based intrusion detection[J]. RAID Re-cent Advances in Intrusion Detection,2007 ,46(37) ? 21-41.
  • 6Fritz D G,Sargent R G. An overview of hierarchicalcontrol flow graph models [C] // the Proceedings ofSimulation Conference. 1995 : 1347-1355.
  • 7Feng H,Kolesnikov 0,Fogla P,et al. Anomaly detec-tion using call back stack information [C] // IEEESymposium on Security and Privacy. 2003:62-75.
  • 8Harary F,Palmer E M, Graphical enumeration[M].New York:Academic Press,1973.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部