ISSN: 0976 - 9811 (Online); 2230 - 7702 (print)
http://airccse.org/journal/jwsc/ijwsc.html
AN ONTOLOGY-BASED APPROACH FOR DETECTING SOAP MESSAGE ATTACKS
Mahmoud A. Hamouda1 and Rebhi S. Baraka2
1Information Technology Graduate Studies, Islamic University of Gaza, Palestine
2Faculty of Information Technology, Islamic University of Gaza, Palestine
Abstract:
An ontology-based detection approach aiming to check SOAP messages for XML rewriting attacks is presented. The approach comprises a SOAP message ontology and a set of policy filters. The ontology is used in preserving the message structure including its constituent elements and their relationships. The policy filters check if the message complies with denial-of-service vulnerability restrictions. Message integrity is preserved using the ontology-based checker, which checks that the message has not been modified during the transmission process. Message confidentiality is preserved by encrypting a copy of the message in a log file combined with the message. Time efficiency is achieved by executing the policy filters in a concurrent manner.
Original Source URL: https://aircconline.com/ijwsc/V9N4/9418ijwsc01.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
http://airccse.org/journal/jwsc/ijwsc.html
AN ONTOLOGY-BASED APPROACH FOR DETECTING SOAP MESSAGE ATTACKS
Mahmoud A. Hamouda1 and Rebhi S. Baraka2
1Information Technology Graduate Studies, Islamic University of Gaza, Palestine
2Faculty of Information Technology, Islamic University of Gaza, Palestine
Abstract:
An ontology-based detection approach aiming to check SOAP messages for XML rewriting attacks is presented. The approach comprises a SOAP message ontology and a set of policy filters. The ontology is used in preserving the message structure including its constituent elements and their relationships. The policy filters check if the message complies with denial-of-service vulnerability restrictions. Message integrity is preserved using the ontology-based checker, which checks that the message has not been modified during the transmission process. Message confidentiality is preserved by encrypting a copy of the message in a log file combined with the message. Time efficiency is achieved by executing the policy filters in a concurrent manner.
Original Source URL: https://aircconline.com/ijwsc/V9N4/9418ijwsc01.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
No comments:
Post a Comment