Sidharth et al., 2008 - Google Patents
Intrusion resistant soap messaging with iapfSidharth et al., 2008
- Document ID
- 10439810225121023307
- Author
- Sidharth N
- Liu J
- Publication year
- Publication venue
- 2008 IEEE Asia-Pacific Services Computing Conference
External Links
Snippet
Simple object access protocol (SOAP) is the communication protocol used by Web services to communicate between systems. Since SOAP messages have the ability to bypass firewalls and directly get processed by web servers, their security is critical to the security of …
- 239000000344 soap 0 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rahaman et al. | Towards secure SOAP message exchange in a SOA | |
Singhal et al. | Guide to secure web services | |
Mainka et al. | Penetration testing tool for web services security | |
US9021586B2 (en) | Apparatus and methods for preventing cross-site request forgery | |
US8689295B2 (en) | Firewalls for providing security in HTTP networks and applications | |
US7647627B2 (en) | System and methods for secure service oriented architectures | |
Moradian | Possible attacks on XML web services | |
Patel et al. | A novel methodology towards a trusted environment in mashup web applications | |
Sidharth et al. | A framework for enhancing web services security | |
Kumar | J2EE Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice | |
Ladan | Web services: Security challenges | |
Desmet et al. | Threat modelling for web services based web applications | |
Sidharth et al. | Intrusion resistant soap messaging with iapf | |
Doroodchi et al. | An investigation on integrating XML-based security into Web services | |
Stephens | Security architecture for system wide information management | |
Jansen et al. | Guidelines on active content and mobile code | |
Balasubramanian et al. | Security: a major threat for web services | |
Weeks et al. | CCI-Based Web security: a design using PGP | |
Yu et al. | Trustworthy web services based on testing | |
Indrakanti | Service Oriented Architecture Security Risks and their Mitigation | |
Singhal et al. | SP 800-95. Guide to Secure Web Services | |
Ilchev et al. | Modular data hiding for improved web-portal security | |
Diouri | Web Service Security Overview, analysis and challenges | |
O'Ree et al. | Security enhancements for UDDI | |
Xiong | New Attack Surfaces Against Emerging Cloud and Web Based Infrastructures and Defenses |