skip to main content
10.1145/2554850.2555010acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

In the wild: a large scale study of web services vulnerabilities

Published:24 March 2014Publication History

ABSTRACT

The pervasiveness of Web Services, compounded with seamless interoperability characteristics, introduces security concerns that are to be carefully considered with the envisioned internet architecture. In this paper, we propose a comprehensive study on Web Service vulnerabilities. We consider not only well known Web-based vulnerabilities such as SQL injection, session replay etc, but we also analyze Web-Service specific vulnerabilities and their potential of attacks due to poor service construction and service maintenance. In our analysis, we classify each of the studied vulnerability according to a new taxonomy, discuss remedies and impact, and propose methods of detection based on real-time analysis. Our analysis is supported by the results of a large scale study involving over 2,000 real-world Web Services. We note that many of the least studied vulnerabilities are present in the wild.

References

  1. Acunetix web application security. http://www.acunetix.com/.Google ScholarGoogle Scholar
  2. Al-Masri E. and Mahmoud, H. Web service data set. http://www.uoguelph.ca/qmahmoud/qws/dataset/.Google ScholarGoogle Scholar
  3. N. Antunes and M. Vieira. Evaluating and improving penetration testing in web services. In IEEE 23rd International Symposium on Software Reliability Engineering (ISSRE), pages 201--210, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Aslam. A taxonomy of security faults in the unix operating system. PhD thesis, Purdue University, 1995.Google ScholarGoogle Scholar
  5. C. V. Berghe, J. Riordan, and F. Piessens. A vulnerability taxonomy methodology applied to web services, 2005.Google ScholarGoogle Scholar
  6. E. Bertino, L. Martino, F. Paci, and A. Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. B. Brahim, T. Chaari, M. B. Jemaa, and M. Jmaiel. Semantic matching of ws-securitypolicy assertions. In Service-Oriented Computing-ICSOC 2011 Workshops, pages 114--130. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Canvel, A. Hiltgen, S. Vaudenay, and M. Vuagnoux. Password interception in a ssl/tls channel. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 583--599. Springer Berlin Heidelberg, 2003.Google ScholarGoogle Scholar
  9. Y. Demchenko, L. Gommans, C. De Laat, and B. Oudenaarde. Web services and grid security vulnerabilities and threats analysis and model. In The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. W. G. Halfond, J. Viegas, and A. Orso. A classification of SQL-Injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering, March 2006.Google ScholarGoogle Scholar
  11. J. Holgersson and E. Soderstrom. Web service security - vulnerabilities and threats within the context of ws-security. In Standardization and Innovation in Information Technology, 2005. The 4th Conference on, pages 138--146, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. Microsoft. STRIDE Categories. http://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx.Google ScholarGoogle Scholar
  13. Microsoft. Vulnerability categories. http://msdn.microsoft.com/en-us/library/aa302418.aspx.Google ScholarGoogle Scholar
  14. A. Mirtalebi and M. R. Khayyambashi. Enhancing security of Web service against WSDL threats. In IEEE International Conference on Emergency Management and Management Sciences, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. Moradian and A. Hakansson. Possible attacks on xml web services. In International Journal of Computer Science and Network Security, Vol. 6 No. 1B, January 2006.Google ScholarGoogle Scholar
  16. OASIS: WS-Security 1.1. http://www.oasis-open.org/specs/.Google ScholarGoogle Scholar
  17. Object Management Group. Corba. http://www.corba.org.Google ScholarGoogle Scholar
  18. Oracle. Rmi. http://www.oracle.com/technetwork/java/javase/tech/index-jsp-136424.html.Google ScholarGoogle Scholar
  19. N. Sidharth and J. Liu. Intrusion resistant soap messaging with iapf. In Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, APSCC '08, pages 856--862, Washington, DC, USA, 2008. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. G. Simpson. Principles of animal taxonomy, volume 20. Columbia University Press, 1961.Google ScholarGoogle Scholar
  21. M. Vieira, N. Antunes, and H. Madeira. Using web security scanners to detect vulnerabilities in web services. In Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference on, pages 566--571, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  22. W. Wang. Security based heuristic sax for xml parsing. In Security and Management, pages 179--185, 2007.Google ScholarGoogle Scholar
  23. S. Weber, P. A. Karger, and A. Paradkar. A software flaw taxonomy: aiming tools at security. In ACM SIGSOFT Software Engineering Notes, volume 30, pages 1--7. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. In the wild: a large scale study of web services vulnerabilities

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied Computing
                March 2014
                1890 pages
                ISBN:9781450324694
                DOI:10.1145/2554850

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 24 March 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SAC '14 Paper Acceptance Rate218of939submissions,23%Overall Acceptance Rate1,650of6,669submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader