Skip to main content

An Empirical Study of Security Threats and Countermeasures in Web Services-Based Services Oriented Architectures

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3806))

Abstract

As enterprises deploy Services Oriented Architecture (SOA), Web Services Security and Management has become the cornerstone of successful architectures. The greatest potential of Web Services is through re-usability and flexibility. This required flexibility in turn leads to significant security and management challenges. Enterprises migrating to SOA face security challenges such as malicious and malformed SOAP messages parser vulnerabilities and Denial of Service attacks over Web Services. Discovering Web Service Vulnerabilities and Compliance Violations and establishing countermeasure policies for Web Services security threats across large enterprises need to be addressed through standards-based products. This paper explores typical Web Services implementations, threat identification methods, and countermeasures against Web Services vulnerabilities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ort, E.: Service-Oriented Architecture and Web Services: Concepts, Technologies, and Tools. Sun Developer Network (April 2005)

    Google Scholar 

  2. W3C, Web Services Description Language (WSDL) 1.1 (March 2001), http://www.w3.org/TR/wsdl

  3. Nystorm, M.G.: North Carolina State University: Securing Web Services (March 2004)

    Google Scholar 

  4. Associated Press (June 2005), http://www.securitypipleine.com

  5. W3C, SOAP Messages with Attachments (December 2000), http://www.w3.org/TR/SOAP-attachments

  6. RosettaNet Press, Industry Standard Facilities Product Material Composite Exchange, May 31 (2005), http://www.rosettanet.org/

  7. Griffin, B.: An Introduction to Viruses and Malicious Code, Part One: Overview (November 2000), http://www.securityfocus.com

  8. Nazario, J.: The Future of Internet Worms, Black Hat Proceedings, Las Vegas (2001)

    Google Scholar 

  9. Shetty, S.: Introduction to Spyware Keyloggers (March 2005), http://www.securityfocus.com

  10. Howard, M., LeBlanc, D., Viega, J.: 19 Deadly Sins of Software Security. McGraw-Hill, New York (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yunus, M., Mallal, R. (2005). An Empirical Study of Security Threats and Countermeasures in Web Services-Based Services Oriented Architectures. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, JY., Sheng, Q.Z. (eds) Web Information Systems Engineering – WISE 2005. WISE 2005. Lecture Notes in Computer Science, vol 3806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11581062_72

Download citation

  • DOI: https://doi.org/10.1007/11581062_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30017-5

  • Online ISBN: 978-3-540-32286-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics