SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Protecting Web Services from
DDOS Attacks

        T.Ponraj MCA,
        Research Assistant ,
        Pondicherry University ,
        Puducherry.
Web services
 •   Software components that can be published,
     located, and run over the Internet using Extensible
     Markup Language (XML).

 •   A web service is a software application that works
     over the internet.

 •   A web service is service-oriented application that
     communicates over the web using messages

 •   The web service is also a software, with its own
     class and methods .
Working of web service

    A request by the client application constitutes
     construction and sending a SOAP request using
     HTTP to the web server.

    For a web service to work, the computer has to be
     connected to the internet.

    The web server hosts the class and its methods of a
     web service, for a client computer to request and
     use.

    Any client computer located any where in the world,
     with an internet connection can request and use the
     class and its methods of the web service.
Web Service Technologies

     A web service is service-oriented application that
communicates over the web using messages.



                   The Web
                   XML
                   SOA
Web Service Roles

Service provider :-
       Who develops or supplies the service.


Service consumer (or) Requester :-
      Who uses the service.


Service broker :-
       Facilitates the advertising and discovery process.
Operation on web service
Register :-
      The service provider registers the service with a
  service broker.

Find :-
       The service broker gives the service consumer
  directions on how to find the service and its service
  contract .

Bind :-
       The service consumer uses the contract to bind the
  client to the service, at which point the client and service
  can communicate.
Web Service Standards

WSDL   :-
      WSDL provides a mechanism to describe a Web
  service.
UDDI :-
      UDDI provides a mechanism to advertise and
  discover a Web service.
SOAP:-
      SOAP provides a mechanism for clients and
  services to communicate.
Functional SOA

          FIND
Denial Of Service
   The prevention of authorized access to resources or the
    delaying of time critical operations.

   Targets for a DoS attack include the communications
    bandwidth, memory buffers, computational resources,
    the network protocol or application processing logic of
    the victim, or any systems on which the victim depends
    for delivering service e.g. the domain name system
    (DNS) or credit card payment service.
DOS in Web Services
•   WS messages are expressed using the XML
    technology, which itself contains DoS vulnerabilities,
    these extend to WS applications.

•   The loosely-coupled nature of WS applications means
    that clients need access to application metadata in
    order to invoke services.

•   The authentication of each and every request can itself
    be exploited by attackers due to the heavy processing
    required by some authentication systems, especially
    those based on public-key cryptography.
Literature Survey
•   Paper # 1 : “Protecting Web Services from DDOS
    attacks by SOAP message validation”


•   Paper # 2 : “Defending Web Services against DOS
    attacks using Client puzzles”


•   Paper # 3 : “Validating DOS vulnerabilities in Web
    Services”, Sep 2010.


•   Paper # 4 : “JXTA & Web Services using Secret key
    based Encryption”
Paper # 1 : SOAP Validation
 Attacks :-
          1. Protocol Deviation Attack
          2. Resource Exhaustion

 Result :-
           CheckWay Gateway

 Author :-
          Nils Gruschka
          Norbert Luttenberger
          Christian-Albrecht's-University of Kiel
1.1. Protocol Deviation Attacks

      Protocol Deviation Attacks exploit vulnerabilities in
       implementations of protocol processing entities.

      In some cases a single packet that diverges from
       the intended protocol flow can make the attacked
       system crash.

      A well-known example is Ping of Death.
1.2. Resource Exhaustion
    Resource Exhaustion attacks consume the
     resources necessary to provide the service
     (network bandwidth, memory and computation
     resources).

    The simplest attack produces an extremly high
     network traffic load to the system providing the
     service.

    A well-known example is Dump Flooding.
2.1 Results

     CheckWay Gateway is an XML validation engine,
      which validates the SOAP message to the
      appropriate schemas.

     If the validation is successful, the SOAP message
      is forwarded.

     SOAP messages containing an ”unlimited” number
      of elements do not match the (hardened) schema
      and are rejected.
2.1 CheckWay Web Service Firewall
Paper # 2 : Client Puzzles
  Attacks :-
            1. Flooding Attack
            2. Semantic Attack (or)
               Heavy Cryptography Attack
  Result :-
            Client Puzzles
  Author :-
           Suriadi Suriadi , Dougles Stebila ,
           Andrew Clark And Hua Liu .
           Queensland University of Technology ,
           Australia.
2.1. Flooding Attack

      This attack attempts to exhaust a server’s
       resources by sending a large amount of
       legitimate requests.

      An attack cannot be detected by relying on a
       signature-based XML firewall.

      An attack is mitigated through some forms of
       lower network layer packet analysis, such as IP
       address analysis.
2.2. Semantic Attack

     It is the heavy cryptographic processing attack in
      which an attacker sends a payload with an
      oversized WS-Security header containing many
      cryptographic elements.

     The goal is to overload the server’s resources,
      either through parsing a large security header or by
      forcing the server to process the numerous
      cryptographic directives.
2.3. Result
  •   Client puzzles, also called proofs of work, can be used
      to counter resource-depletion denial of service attacks.
  •   Before a server is willing to perform some
      computationally expensive operation, it requires that
      the client commit some of its own resources and solve
      some moderately hard puzzle.
  •   The most commonly proposed type of client puzzle is a
      hash-based computation-bound puzzle, in which a
      client is required to find a partial preimage in a
      cryptographic hash function.

                 H(C;NS;NC;X) = 0 … 0 || Y
                                  d
          H - Cryptography Hash Function , C - Client ,
          NS - Server Nonce , CS - Client Nonce , X - Client Solution
          d - Bits , Y - String .
The client puzzle protocol

                               Server
Client
         Service request   R

         Request puzzle


          Result puzzle


              O.K.               Buffer
Paper # 3 : Validating DOS
 Attacks :-
         1.    Deeply-Nested XML
         2.    WSDL Flooding
         3.    Heavy Cryptographic Processing
         4.    Malformed External Schema
               Referencing
 Result :-
          SNMP
          MIB
 Author :-
         Suriadi Suriadi , Andrew Clark And
         Desmond Schmidt .
         Queensland University of Technology ,
         Australia.
3.1. Deeply – Nested XML
   This type of attack exploits the SOAP format,
    which allows the embedding of excessively nested
    XML in the message body.

   The SOAP message is then sent to a WSprovider.

   The goal is to force the XML parser within the
    service to exhaust the memory resources of the
    host system by processing numerous deeply-
    nested documents, and so cause a denial of
    service.
3.2. WSDL Flooding

      WSDL specifications are in most cases publicly
       accessible, access is often unauthenticated.

      As a result, a brute force DoS attack could be
       initiated by sending a large number of WSDL
       requests.
3.3. Heavy Cryptographic Processing
    The SOAP message also allows for multiple
     signature blocks to be included within a SOAP
     header.

    Therefore, an attacker could craft a SOAP message
     containing only one <wsse:Security> header block,
     but with a large number of <ds:Signature> elements.

    To process every <ds:Signature> element, resulting
     in CPU exhaustion, since the signature verification
     process involves heavy public key cryptographic
     processing. A similar attack also targets message
     encryption.
3.4.Malformed external Schema Referencing

     The syntax of an XML schema specification allows a
      document to reference an externally defined XML
      namespace.

     An XML parser may then attempt to contact the
      referenced location to obtain the schema.

     This attribute of XML processing can result in various
      types of DoS. One type of attack references a
      malformed schema.

     In another type of attack a malicious provider may
      point to a bogus schema location that instead causes
      the parser to retrieve a large or malicious payload.
3.5. Results
    •   The Network Interface Card may be saturated
        with traffic and the available CPU and memory
        resources may be very limited.
        Two interface cards :-
                 Attack Network
                 Monitoring Network

    •   The monitoring network carries no attack traffic,
        only monitoring requests, it is available for
        measuring the performance of the target
        machine.
    •   The monitoring technology used was the Simple
        Network Management Protocol (SNMP).
Experimental DOS Testbed
Paper # 4 : Secret Key based
Encryption
  Aim :-
            To develop a distributed service discovery
            mechanism.

  Result :-
             RSA
             AES
  Author :-
          Sabiha Hossain , Upama Kabir ,
          Shaila Rahman And Aloke Kumar Saha .
          University Of Asia pacific (UAP) ,
          Dhaka, Bangladesh .
4.1 Abstract
    JXTA is a P2P (Peer-to-Peer) Semantic Web application.
    The aim of this thesis will be to develop a distributed
     service discovery mechanism.
    JXTA's P2P provides perfect solution for Web Service
     discovery and Algorithm for Web Service Security.
    An implementation using an algorithm for web service
     security by using RSA Cryptographic Library and AES
     Encryption technology.
    It focuses on peer-to-peer as a method to combine Web
     Services and mobile ad hoc networks and to use JXTA
     as peer-to-peer platform.
4.2 JXTA Protocols
  •   JXTA technology is a set of protocols.
  •   Each protocol is defined by one or more messages
      exchanged among participants of the protocol.
  •   Each message has a pre-defined format.
  •   It is akin to TCP/IP.

                •   Peer Discovery Protocol
                •   Peer Resolver Protocol
                •   Peer Information Protocol
                •   Peer Membership Protocol
                •   Pipe Binding Protocol
                •   Endpoint Routing Protocol
4.3. JXTA Architecture
4.4. Service Invocation from a JXTA
Network
 Client Application                               Service



                      Encrypted    Decrypt &
    JAX-WS                         Authenticate   JAX-WS
                      User Info    User Info
       pipe




                                                    Pipe
      JXTA
                                                   JXTA
                            JXTA Message
                                  SOAP
4.5. Web Service Security
 •   RSA Encryption :-

              Ron Rivest, Adi Shamir, and Len Adleman
              developed the public key encryption scheme that
              is now known as RSA .


 •   AES :-

              The Advanced Encryption Standard (AES) is a
              symmetric-key encryption standard adopted by
              the U.S. government.
4.6. Encryption Decryption Procedure

   Client

  • RSA Signing Private Key
  • RSA Exchange Public

   Server

  • RSA Signing Public Key
  • RSA Exchange Private Key

   Secure Login (Single Sign on or Secure Login).
References
•   “Defending Web Services Against Denial of Service Attacks Using
    Client Puzzles” Suriadi Suriadi, Douglas Stebila, Andrew Clark, and
    Hua Liu. Information Security Institute, Queensland University of
    Technology Brisbane, Queensland, Australia.
•   “Validating Denial of Service Vulnerabilities in Web Services” Suriadi
    Suriadi, Andrew Clark, and Desmond Schmidt .Information Security
    Institute Queensland University of Technology Brisbane,
    Queensland, Australia.
•   “JXTA & Web Services Using Secret Key Based Encryption” Sabiha
    Hossain, Upama Kabir, Shaila Rahman and Aloke Kumar Saha.
•   “Protecting Web Services from DDOS attacks by SOAP message
    validation” Nils Gruschka ,Norbert Luttenberger, Christian-
    Albrecht's-University of Kiel.
•   “Web Service Security Management Using Semantic Web
    Techniques” Diego Zuquim Guimarães Garcia , Maria Beatriz Felgar
    de Toledo , University of Campinas ,POB 6176 – Postal Code
    13.084-971 ,Campinas, SP, Brazil.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

API Security - Null meet
API Security - Null meetAPI Security - Null meet
API Security - Null meetvinoth kumar
 
REST API Design for JAX-RS And Jersey
REST API Design for JAX-RS And JerseyREST API Design for JAX-RS And Jersey
REST API Design for JAX-RS And JerseyStormpath
 
Serverless security: defense against the dark arts
Serverless security: defense against the dark artsServerless security: defense against the dark arts
Serverless security: defense against the dark artsYan Cui
 
Elegant Rest Design Webinar
Elegant Rest Design WebinarElegant Rest Design Webinar
Elegant Rest Design WebinarStormpath
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom PresentationAlert Logic
 
2018 JavaLand Deconstructing and Evolving REST Security
2018 JavaLand Deconstructing and Evolving REST Security2018 JavaLand Deconstructing and Evolving REST Security
2018 JavaLand Deconstructing and Evolving REST SecurityDavid Blevins
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM Oleg Gryb
 
Automating the VMware Virtual Datacenter
Automating the VMware Virtual DatacenterAutomating the VMware Virtual Datacenter
Automating the VMware Virtual DatacenterJosh Atwell
 
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates SecurityKeynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates SecurityCloudVillage
 
Making Security Approachable for Developers and Operators
Making Security Approachable for Developers and OperatorsMaking Security Approachable for Developers and Operators
Making Security Approachable for Developers and OperatorsArmonDadgar
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWSManojAccTest
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
Overview of IoT Infrastructure and Connectivity at AWS
Overview of IoT Infrastructure and Connectivity at AWSOverview of IoT Infrastructure and Connectivity at AWS
Overview of IoT Infrastructure and Connectivity at AWSAmazon Web Services
 
Applciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationApplciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationBlueinfy Solutions
 
OWASP SF - Reviewing Modern JavaScript Applications
OWASP SF - Reviewing Modern JavaScript ApplicationsOWASP SF - Reviewing Modern JavaScript Applications
OWASP SF - Reviewing Modern JavaScript ApplicationsLewis Ardern
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionalityvivekbhat
 
Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Puma Security, LLC
 
Top Ten Web Attacks
Top Ten Web Attacks Top Ten Web Attacks
Top Ten Web Attacks Ajay Ohri
 
Cloud Security: Attacking The Metadata Service
Cloud Security: Attacking The Metadata ServiceCloud Security: Attacking The Metadata Service
Cloud Security: Attacking The Metadata ServicePuma Security, LLC
 

Was ist angesagt? (20)

API Security - Null meet
API Security - Null meetAPI Security - Null meet
API Security - Null meet
 
REST API Design for JAX-RS And Jersey
REST API Design for JAX-RS And JerseyREST API Design for JAX-RS And Jersey
REST API Design for JAX-RS And Jersey
 
Serverless security: defense against the dark arts
Serverless security: defense against the dark artsServerless security: defense against the dark arts
Serverless security: defense against the dark arts
 
Elegant Rest Design Webinar
Elegant Rest Design WebinarElegant Rest Design Webinar
Elegant Rest Design Webinar
 
Austin CSS Slalom Presentation
Austin CSS Slalom PresentationAustin CSS Slalom Presentation
Austin CSS Slalom Presentation
 
2018 JavaLand Deconstructing and Evolving REST Security
2018 JavaLand Deconstructing and Evolving REST Security2018 JavaLand Deconstructing and Evolving REST Security
2018 JavaLand Deconstructing and Evolving REST Security
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM
 
Automating the VMware Virtual Datacenter
Automating the VMware Virtual DatacenterAutomating the VMware Virtual Datacenter
Automating the VMware Virtual Datacenter
 
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates SecurityKeynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
 
Making Security Approachable for Developers and Operators
Making Security Approachable for Developers and OperatorsMaking Security Approachable for Developers and Operators
Making Security Approachable for Developers and Operators
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Overview of IoT Infrastructure and Connectivity at AWS
Overview of IoT Infrastructure and Connectivity at AWSOverview of IoT Infrastructure and Connectivity at AWS
Overview of IoT Infrastructure and Connectivity at AWS
 
Applciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationApplciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumeration
 
OWASP SF - Reviewing Modern JavaScript Applications
OWASP SF - Reviewing Modern JavaScript ApplicationsOWASP SF - Reviewing Modern JavaScript Applications
OWASP SF - Reviewing Modern JavaScript Applications
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2
 
Top Ten Web Attacks
Top Ten Web Attacks Top Ten Web Attacks
Top Ten Web Attacks
 
Cloud Security: Attacking The Metadata Service
Cloud Security: Attacking The Metadata ServiceCloud Security: Attacking The Metadata Service
Cloud Security: Attacking The Metadata Service
 

Andere mochten auch

Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Stormpath
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack CA API Management
 
Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...Jammy Wang
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddosfangjiafu
 
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingWeek 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingIIIT Hyderabad
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
SQL Injection Attacks cs586
SQL Injection Attacks cs586SQL Injection Attacks cs586
SQL Injection Attacks cs586Stacy Watts
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Effective fault handling in SOA Suite 11g
Effective fault handling in SOA Suite 11gEffective fault handling in SOA Suite 11g
Effective fault handling in SOA Suite 11gGuido Schmutz
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Microservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices SuccessMicroservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices SuccessApigee | Google Cloud
 

Andere mochten auch (19)

Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...Presentation of "On the effectiveness of route-based packet filtering for dis...
Presentation of "On the effectiveness of route-based packet filtering for dis...
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddos
 
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear PhishingWeek 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear Phishing
 
Week 7.1 Link Farming
Week 7.1 Link FarmingWeek 7.1 Link Farming
Week 7.1 Link Farming
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
SQL Injection Attacks cs586
SQL Injection Attacks cs586SQL Injection Attacks cs586
SQL Injection Attacks cs586
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Effective fault handling in SOA Suite 11g
Effective fault handling in SOA Suite 11gEffective fault handling in SOA Suite 11g
Effective fault handling in SOA Suite 11g
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Microservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices SuccessMicroservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices Success
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 

Ähnlich wie Protecting Web Services from DDOS Attack

Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxShivamBajaj36
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...IJNSA Journal
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Mumbai Academisc
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do smehr77
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdffms12345
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingZTech Proje
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM ijcseit
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMijcseit
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfbrijeshagarwa329898l
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1InfoSec Girls
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Jay Nagar
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015saifam
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvseSAT Publishing House
 

Ähnlich wie Protecting Web Services from DDOS Attack (20)

Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
Report on xss and do s
Report on xss and do sReport on xss and do s
Report on xss and do s
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
D do s_white_paper_june2015
D do s_white_paper_june2015D do s_white_paper_june2015
D do s_white_paper_june2015
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 

Kürzlich hochgeladen

9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfFrancenel Paul
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...USDAReapgrants.com
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingFalcon Invoice Discounting
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 

Kürzlich hochgeladen (15)

9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdf
 
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discounting
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 

Protecting Web Services from DDOS Attack

  • 1. Protecting Web Services from DDOS Attacks T.Ponraj MCA, Research Assistant , Pondicherry University , Puducherry.
  • 2. Web services • Software components that can be published, located, and run over the Internet using Extensible Markup Language (XML). • A web service is a software application that works over the internet. • A web service is service-oriented application that communicates over the web using messages • The web service is also a software, with its own class and methods .
  • 3. Working of web service  A request by the client application constitutes construction and sending a SOAP request using HTTP to the web server.  For a web service to work, the computer has to be connected to the internet.  The web server hosts the class and its methods of a web service, for a client computer to request and use.  Any client computer located any where in the world, with an internet connection can request and use the class and its methods of the web service.
  • 4. Web Service Technologies A web service is service-oriented application that communicates over the web using messages.  The Web  XML  SOA
  • 5. Web Service Roles Service provider :- Who develops or supplies the service. Service consumer (or) Requester :- Who uses the service. Service broker :- Facilitates the advertising and discovery process.
  • 6. Operation on web service Register :- The service provider registers the service with a service broker. Find :- The service broker gives the service consumer directions on how to find the service and its service contract . Bind :- The service consumer uses the contract to bind the client to the service, at which point the client and service can communicate.
  • 7. Web Service Standards WSDL :- WSDL provides a mechanism to describe a Web service. UDDI :- UDDI provides a mechanism to advertise and discover a Web service. SOAP:- SOAP provides a mechanism for clients and services to communicate.
  • 9. Denial Of Service  The prevention of authorized access to resources or the delaying of time critical operations.  Targets for a DoS attack include the communications bandwidth, memory buffers, computational resources, the network protocol or application processing logic of the victim, or any systems on which the victim depends for delivering service e.g. the domain name system (DNS) or credit card payment service.
  • 10. DOS in Web Services • WS messages are expressed using the XML technology, which itself contains DoS vulnerabilities, these extend to WS applications. • The loosely-coupled nature of WS applications means that clients need access to application metadata in order to invoke services. • The authentication of each and every request can itself be exploited by attackers due to the heavy processing required by some authentication systems, especially those based on public-key cryptography.
  • 11. Literature Survey • Paper # 1 : “Protecting Web Services from DDOS attacks by SOAP message validation” • Paper # 2 : “Defending Web Services against DOS attacks using Client puzzles” • Paper # 3 : “Validating DOS vulnerabilities in Web Services”, Sep 2010. • Paper # 4 : “JXTA & Web Services using Secret key based Encryption”
  • 12. Paper # 1 : SOAP Validation  Attacks :- 1. Protocol Deviation Attack 2. Resource Exhaustion  Result :-  CheckWay Gateway  Author :- Nils Gruschka Norbert Luttenberger Christian-Albrecht's-University of Kiel
  • 13. 1.1. Protocol Deviation Attacks  Protocol Deviation Attacks exploit vulnerabilities in implementations of protocol processing entities.  In some cases a single packet that diverges from the intended protocol flow can make the attacked system crash.  A well-known example is Ping of Death.
  • 14. 1.2. Resource Exhaustion  Resource Exhaustion attacks consume the resources necessary to provide the service (network bandwidth, memory and computation resources).  The simplest attack produces an extremly high network traffic load to the system providing the service.  A well-known example is Dump Flooding.
  • 15. 2.1 Results  CheckWay Gateway is an XML validation engine, which validates the SOAP message to the appropriate schemas.  If the validation is successful, the SOAP message is forwarded.  SOAP messages containing an ”unlimited” number of elements do not match the (hardened) schema and are rejected.
  • 16. 2.1 CheckWay Web Service Firewall
  • 17. Paper # 2 : Client Puzzles  Attacks :- 1. Flooding Attack 2. Semantic Attack (or) Heavy Cryptography Attack  Result :-  Client Puzzles  Author :- Suriadi Suriadi , Dougles Stebila , Andrew Clark And Hua Liu . Queensland University of Technology , Australia.
  • 18. 2.1. Flooding Attack  This attack attempts to exhaust a server’s resources by sending a large amount of legitimate requests.  An attack cannot be detected by relying on a signature-based XML firewall.  An attack is mitigated through some forms of lower network layer packet analysis, such as IP address analysis.
  • 19. 2.2. Semantic Attack  It is the heavy cryptographic processing attack in which an attacker sends a payload with an oversized WS-Security header containing many cryptographic elements.  The goal is to overload the server’s resources, either through parsing a large security header or by forcing the server to process the numerous cryptographic directives.
  • 20. 2.3. Result • Client puzzles, also called proofs of work, can be used to counter resource-depletion denial of service attacks. • Before a server is willing to perform some computationally expensive operation, it requires that the client commit some of its own resources and solve some moderately hard puzzle. • The most commonly proposed type of client puzzle is a hash-based computation-bound puzzle, in which a client is required to find a partial preimage in a cryptographic hash function. H(C;NS;NC;X) = 0 … 0 || Y d H - Cryptography Hash Function , C - Client , NS - Server Nonce , CS - Client Nonce , X - Client Solution d - Bits , Y - String .
  • 21. The client puzzle protocol Server Client Service request R Request puzzle Result puzzle O.K. Buffer
  • 22. Paper # 3 : Validating DOS  Attacks :- 1. Deeply-Nested XML 2. WSDL Flooding 3. Heavy Cryptographic Processing 4. Malformed External Schema Referencing  Result :-  SNMP  MIB  Author :- Suriadi Suriadi , Andrew Clark And Desmond Schmidt . Queensland University of Technology , Australia.
  • 23. 3.1. Deeply – Nested XML  This type of attack exploits the SOAP format, which allows the embedding of excessively nested XML in the message body.  The SOAP message is then sent to a WSprovider.  The goal is to force the XML parser within the service to exhaust the memory resources of the host system by processing numerous deeply- nested documents, and so cause a denial of service.
  • 24. 3.2. WSDL Flooding  WSDL specifications are in most cases publicly accessible, access is often unauthenticated.  As a result, a brute force DoS attack could be initiated by sending a large number of WSDL requests.
  • 25. 3.3. Heavy Cryptographic Processing  The SOAP message also allows for multiple signature blocks to be included within a SOAP header.  Therefore, an attacker could craft a SOAP message containing only one <wsse:Security> header block, but with a large number of <ds:Signature> elements.  To process every <ds:Signature> element, resulting in CPU exhaustion, since the signature verification process involves heavy public key cryptographic processing. A similar attack also targets message encryption.
  • 26. 3.4.Malformed external Schema Referencing  The syntax of an XML schema specification allows a document to reference an externally defined XML namespace.  An XML parser may then attempt to contact the referenced location to obtain the schema.  This attribute of XML processing can result in various types of DoS. One type of attack references a malformed schema.  In another type of attack a malicious provider may point to a bogus schema location that instead causes the parser to retrieve a large or malicious payload.
  • 27. 3.5. Results • The Network Interface Card may be saturated with traffic and the available CPU and memory resources may be very limited. Two interface cards :-  Attack Network  Monitoring Network • The monitoring network carries no attack traffic, only monitoring requests, it is available for measuring the performance of the target machine. • The monitoring technology used was the Simple Network Management Protocol (SNMP).
  • 29. Paper # 4 : Secret Key based Encryption  Aim :- To develop a distributed service discovery mechanism.  Result :-  RSA  AES  Author :- Sabiha Hossain , Upama Kabir , Shaila Rahman And Aloke Kumar Saha . University Of Asia pacific (UAP) , Dhaka, Bangladesh .
  • 30. 4.1 Abstract  JXTA is a P2P (Peer-to-Peer) Semantic Web application.  The aim of this thesis will be to develop a distributed service discovery mechanism.  JXTA's P2P provides perfect solution for Web Service discovery and Algorithm for Web Service Security.  An implementation using an algorithm for web service security by using RSA Cryptographic Library and AES Encryption technology.  It focuses on peer-to-peer as a method to combine Web Services and mobile ad hoc networks and to use JXTA as peer-to-peer platform.
  • 31. 4.2 JXTA Protocols • JXTA technology is a set of protocols. • Each protocol is defined by one or more messages exchanged among participants of the protocol. • Each message has a pre-defined format. • It is akin to TCP/IP. • Peer Discovery Protocol • Peer Resolver Protocol • Peer Information Protocol • Peer Membership Protocol • Pipe Binding Protocol • Endpoint Routing Protocol
  • 33. 4.4. Service Invocation from a JXTA Network Client Application Service Encrypted Decrypt & JAX-WS Authenticate JAX-WS User Info User Info pipe Pipe JXTA JXTA JXTA Message SOAP
  • 34. 4.5. Web Service Security • RSA Encryption :- Ron Rivest, Adi Shamir, and Len Adleman developed the public key encryption scheme that is now known as RSA . • AES :- The Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government.
  • 35. 4.6. Encryption Decryption Procedure  Client • RSA Signing Private Key • RSA Exchange Public  Server • RSA Signing Public Key • RSA Exchange Private Key  Secure Login (Single Sign on or Secure Login).
  • 36. References • “Defending Web Services Against Denial of Service Attacks Using Client Puzzles” Suriadi Suriadi, Douglas Stebila, Andrew Clark, and Hua Liu. Information Security Institute, Queensland University of Technology Brisbane, Queensland, Australia. • “Validating Denial of Service Vulnerabilities in Web Services” Suriadi Suriadi, Andrew Clark, and Desmond Schmidt .Information Security Institute Queensland University of Technology Brisbane, Queensland, Australia. • “JXTA & Web Services Using Secret Key Based Encryption” Sabiha Hossain, Upama Kabir, Shaila Rahman and Aloke Kumar Saha. • “Protecting Web Services from DDOS attacks by SOAP message validation” Nils Gruschka ,Norbert Luttenberger, Christian- Albrecht's-University of Kiel. • “Web Service Security Management Using Semantic Web Techniques” Diego Zuquim Guimarães Garcia , Maria Beatriz Felgar de Toledo , University of Campinas ,POB 6176 – Postal Code 13.084-971 ,Campinas, SP, Brazil.