2009
DOI: 10.1007/s00450-009-0092-6
|View full text |Cite
|
Sign up to set email alerts
|

A survey of attacks on web services

Abstract: Being regarded as the new paradigm for Internet communication, Web Services have introduced a large number of new standards and technologies. Though founding on decades of networking experience, Web Services are not more resistant to security attacks than other open network systems. Quite the opposite is true: Web Services are exposed to attacks well-known from common Internet protocols and additionally to new kinds of attacks targeting Web Services in particular. Along with their severe impact, most of these … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
75
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(81 citation statements)
references
References 9 publications
0
75
0
1
Order By: Relevance
“…Even if proactive recovery can eliminate some unknown attacks like zero-day attacks periodically [28], stealth resource exhaustion attacks like an application-layer DDoS directly causes the performance degradation, and they cannot be tolerated easily by existing proactive recovery or reactive recovery which use the signature based intrusion detection. However, since such attacks could interrupt services seriously or damage the performance of the system by exhausting system resources [29], they can be noticed easily by the resource monitoring.…”
Section: Reactive Recovery With Cpu Utilizationmentioning
confidence: 99%
“…Even if proactive recovery can eliminate some unknown attacks like zero-day attacks periodically [28], stealth resource exhaustion attacks like an application-layer DDoS directly causes the performance degradation, and they cannot be tolerated easily by existing proactive recovery or reactive recovery which use the signature based intrusion detection. However, since such attacks could interrupt services seriously or damage the performance of the system by exhausting system resources [29], they can be noticed easily by the resource monitoring.…”
Section: Reactive Recovery With Cpu Utilizationmentioning
confidence: 99%
“…Furthermore, several vulnerabilities in Web Services (WS) technologies [24], [25], [35] that exploit the XML verbosity and the complex parsing process of the SOAP message body are available. For example, the processing of a large number of name-space declarations, oversize prefix names or name-space URIs, and very deeply nested XML structures/tags), can exhaust most of the computational resources of the target systems (mainly CPU and memory) according to a technique known as coercive parsing.…”
Section: Processing Power Exhaustion Dosesmentioning
confidence: 99%
“…We have not identified any particular area of web security research that would be unique or more important in EM, and would not be covered in a generalist web security review paper. An excellent effort to formalise and categorise web security has been recently presented in [45] and a survey of current threats can be found in [46].…”
Section: World Wide Web (Www)mentioning
confidence: 99%
“…Malware infection of on board computers [113] Hijacked control of locks, brakes and engine Malware detection [113] GPS Spoofing [50,117] Artificial traffic jam caused Signal analysis [51][52][53] Web-based immobilisation hijacked [114] Cars immobilised remotely and simultaneously Web security literature [46] GPS Spoofing [50,117] Unmanned vehicle redirected [117,118] Signal analysis [51][52][53] Gain-scheduling attack [117] Control stability affected [117] No known solutions…”
Section: Manned Vehiclesmentioning
confidence: 99%