Please use this identifier to cite or link to this item: https://idr.l2.nitk.ac.in/jspui/handle/123456789/7410
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPatel, V.-
dc.contributor.authorMohandas, R.-
dc.contributor.authorPais, A.R.-
dc.date.accessioned2020-03-30T09:59:02Z-
dc.date.available2020-03-30T09:59:02Z-
dc.date.issued2010-
dc.identifier.citationSECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, 2010, Vol., , pp.499-504en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7410-
dc.description.abstractWeb Services have become dependable platform for e-commerce and many B2B models. Extensive adaptation of Web Services has resulted in a bunch of standards such as WS-Security, WS-Trast etc. to support business and security requirements for the same. Majority of the web services are offered over Http with Simple Object Access Protocol (SOAP) as an underlying exchange infrastructure. This paper describes attacks targeted at Web Services such as XML injection, XSS injection, HTTP header manipulation, sending stale message and other protocol specific attacks. We have used XML Re-Writing mechanism to perform "timestamp modification attack" and WS-Trast, WS-SecureConversation protocols attack. Schemas stated in WSDL file may not be accurate enough to validate messages effectively; Schemas should reflect structure of all possible genuine requests. Hence, we have proposed a new self-adaptive schema hardening algorithm to obtain fine-tuned schema that can be used to validate SOAP messages more effectively. We have also proposed mitigation techniques to counter attacks using MIME/DIME attachments.en_US
dc.titleAttacks on web services and mitigation schemesen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
7410.pdf125.14 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.