Infiltrate Testing Tool for Web Services Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
For distributed computing solutions Web Services are widely used. Web Services technology is used to integrate existing homogenous or heterogeneous enterprise applications. It can also be used to build inter-operable components that can be reused by many applications irrespective of the platforms in which they are built. Service Oriented Architecture (SOA) is being used for such distributed applications. This architecture enables integration of many services and allows access through a single interface. As this technology is widely used many extension specifications came into existences which were developed by W3C. This has caused the rise in attacks on web services applications. The attacks include denial of service attacks to various other attacks that break security of the systems. Web application developers generally test their applications for security using penetration testing tools. However, for applications built using Web Services technology no such penetration testing tools are available. Mainka et al. developed a penetration testing tool by name WSAttacker which is plug-in based. They have implemented only two plugins namely SOAPAction Spoofing and WS-Address Spoofing. In this paper we improve the tool by implementing plugins for two more attacks namely Oversize Payload Attack, Oversized Encryption Attack. The WSAttacker is meant for testing web services applications for security. The empirical results revealed that the proposed plugins are effective and they could enhance the use of the tool.
Authors and Affiliations
Shaik Kabeer, Anjini Prasad S, Venkatesh D
Agile Software Development Teams on Autopoiesies Aspects
Self-organizing teams are at the spirit of agile software development. Self-organizing Agile teams are composed of individuals supervise their own workload shift work among themselves based on need and best fit and p...
Access Control And Privacy Preserving Mechanisms On Sensitive Data
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....
Energy Efficient Full-adder using GDI Technique
A full-adder is one of the essential component in digital circuit design, many improvements have been made to reduce the architecture of a fulladder. The proposed method aims on GDI(Gate Diffusion Input).GDI is a nov...
Security Approach Induction of Client Transferred Pictures on Content Sharing Website
Online Social networking’s gotten to be a standout amongst the most critical piece of our daily life as it empowers us to correspond with many people. Production of interpersonal interaction locales, for example, Mys...
Classified Average Precision (CAP) To Evaluate The Performance of Inferring User Search Goals
The presumption and examination of user search goals can be very useful in getting better performance of search engine. To deduce user search goals by analyzing search engine query logs a novel approach is proposed....