Cited 4 time in
A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Nasridinov, Aziz | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Byun, Jeong-Yong | - |
| dc.contributor.author | Park, Young-Ho | - |
| dc.date.accessioned | 2024-08-08T04:31:44Z | - |
| dc.date.available | 2024-08-08T04:31:44Z | - |
| dc.date.issued | 2016-04 | - |
| dc.identifier.issn | 1939-0114 | - |
| dc.identifier.issn | 1939-0122 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/18091 | - |
| dc.description.abstract | In order to secure the content of simple object access protocol (SOAP) messages in Web services, several security standards of Web service security, such as XML digital signature, are used. However, the content of a SOAP message, protected with XML digital signature, can be altered without invalidating the signature. Existing methods for detecting XML rewriting attacks are inefficient because the cost of performing detection operation is linear to the height of the SOAP message tree. Thus, each element of SOAP message needs to be accessed and checked. In this paper, we propose an efficient method for detecting XML rewriting attacks on SOAP messages using a histogram. With our method, once the source of attacks is identified, we save it in the form of a histogram, which enables us to maintain a statistical information about the location of the attack in the SOAP message. We can use this information to detect attacks in the future and thus avoid unnecessary check of all elements in the SOAP message. Experiments show that our methods outperform existing methods by several times in many cases. Copyright (c) 2014 John Wiley & Sons, Ltd. | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | WILEY-HINDAWI | - |
| dc.title | A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1002/sec.934 | - |
| dc.identifier.scopusid | 2-s2.0-84959288417 | - |
| dc.identifier.wosid | 000372410800005 | - |
| dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.9, no.6, pp 492 - 499 | - |
| dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
| dc.citation.volume | 9 | - |
| dc.citation.number | 6 | - |
| dc.citation.startPage | 492 | - |
| dc.citation.endPage | 499 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordAuthor | Web services | - |
| dc.subject.keywordAuthor | SOAP message | - |
| dc.subject.keywordAuthor | XML rewriting attack | - |
| dc.subject.keywordAuthor | histogram | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
