2013 IEEE International Conference on Technologies for Homeland Security (HST) 2013
DOI: 10.1109/ths.2013.6698966
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…The information specified by a WSDL interface reveals sensitive information, which allows the attacker to launch other attacks . Metadata spoofing: This attack is aimed to reengineer the web service's metadata descriptions . Attack obfuscation: It uses XML encryption to mask message content from being inspected by the firewall or IDS. These encrypted contents can be used to launch other attacks such as oversize payload, coercive parsing or XML injection, and encryption . Business Process Execution Language (BPEL) state deviation attack: BPEL engine can provide the web service endpoints, which accept the service request. Each BPEL process has more than one process instance; thus, the endpoints will be able to accept the request messages at all times.…”
Section: Attacks On the Cloud Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The information specified by a WSDL interface reveals sensitive information, which allows the attacker to launch other attacks . Metadata spoofing: This attack is aimed to reengineer the web service's metadata descriptions . Attack obfuscation: It uses XML encryption to mask message content from being inspected by the firewall or IDS. These encrypted contents can be used to launch other attacks such as oversize payload, coercive parsing or XML injection, and encryption . Business Process Execution Language (BPEL) state deviation attack: BPEL engine can provide the web service endpoints, which accept the service request. Each BPEL process has more than one process instance; thus, the endpoints will be able to accept the request messages at all times.…”
Section: Attacks On the Cloud Componentsmentioning
confidence: 99%
“…• Attack obfuscation: It uses XML encryption to mask message content from being inspected by the firewall or IDS. These encrypted contents can be used to launch other attacks such as oversize payload, coercive parsing or XML injection, and encryption [64]. • Business Process Execution Language (BPEL) state deviation attack: BPEL engine can provide the web service endpoints, which accept the service request.…”
Section: • Web Services Description Language (Wsdl)mentioning
confidence: 99%
“…The Web service interfaces are public by nature, so different software can use the services for the purpose of integration to share data/knowledge. Due to the public interface of Web services, there are threats to user authentication, authorization, and data integrity [12,21,22]. To avoid suspected aforementioned threats over public network, SSM and XML security modules are integrated with Web service.…”
Section: Web Service Clientmentioning
confidence: 99%
“…The Encryption Key remains valid between BLL and data layer/KLP until the termination of session. The Client Public Key is used to validate the digital signature of the client, in order to check the client verification and XML document validation [22].…”
Section: Profiling Agentmentioning
confidence: 99%
See 1 more Smart Citation