Skip to Main Content
The Major Task of an IT professional is to integrate diverse application. The problem with DCOM, CORBA or APIs type of integration is that, it is rigid and breaks up with application up gradation and thus needs refractory. The enhanced connectivity and flexibility attributed to Web Services comes at the cost of increased security risks, since XML is essentially text. Research data shows that 70% of attack paths that has been closed by fire walls over the past decade will again be reopened by the XML Web services.The modulus of operand of attacker is different in case of Web Service, as WSDL files are made publicly available. Attacks such as coercive parsing, these extract parameters, determine which method to invoke, insert content into database or perform some other function. This basic operation is an easy target for a hacker to create a DOS attack or degrade application performance. Similarly, in parameter tampering, as the parameters of operation are described within a WSDL document, the hacker can again "play around" with different parameter patterns in order to access unauthorized information. The paper proposes a set of tests to detect attacks as oversize payloads, recursive payloads, parameter tampering, buffer overflow, replay attack, entity expansion and XML rewriting. System is developed, which gather SOAP request made to Web Service provider over a given period of time, as per the parameter set by the administrator for given services proposed test are carried out. This help to detect whether SOAP request was prone to attack or may create attack. All SOAP requests who fail tests are separated out, so that further action can be taken. The system is developed using JAVA along with AXIS2 SOAP engine. The results of the test show it is capable of detecting attack, further these test sets can be incorporated in XML firewalls.
Date of Conference: 12-14 Dec. 2008