Infiltrate Testing Tool for Web Services Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
For distributed computing solutions Web Services are widely used. Web Services technology is used to integrate existing homogenous or heterogeneous enterprise applications. It can also be used to build inter-operable components that can be reused by many applications irrespective of the platforms in which they are built. Service Oriented Architecture (SOA) is being used for such distributed applications. This architecture enables integration of many services and allows access through a single interface. As this technology is widely used many extension specifications came into existences which were developed by W3C. This has caused the rise in attacks on web services applications. The attacks include denial of service attacks to various other attacks that break security of the systems. Web application developers generally test their applications for security using penetration testing tools. However, for applications built using Web Services technology no such penetration testing tools are available. Mainka et al. developed a penetration testing tool by name WSAttacker which is plug-in based. They have implemented only two plugins namely SOAPAction Spoofing and WS-Address Spoofing. In this paper we improve the tool by implementing plugins for two more attacks namely Oversize Payload Attack, Oversized Encryption Attack. The WSAttacker is meant for testing web services applications for security. The empirical results revealed that the proposed plugins are effective and they could enhance the use of the tool.
Authors and Affiliations
Shaik Kabeer, Anjini Prasad S, Venkatesh D
Dynamic Authentication over Graphical Passwords using Visual Cryptography
CAPTCHA is a test build by computer programs which human can pass but computer programs cannot pass CAPTCHA as graphical passwords (CaRP) are a graphical password scheme used for a user access authentication. It is m...
Providing Security and Minimizing Data Management Cost in the Cloud
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome...
Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength
Locating the site of a mobile user with a high degree of correctness is a research interest that holds the key to a get through in many service challenges faced by operators in the wireless communication world. The b...
A New Frame Work and Technique For Earthquake Alert System
As an application, we develop a earthquake reporting structure for use in Japan. In perspective of the different shudders and the tremendous number of Twitter customers all through the country, we can recognize a tre...
Performance Analysis of Pilot Based Channel Estimation in OFDM System using Recursive Least Square Estimator
For a wireless communication system, the channel is unknown a priori to the receiver. Channel parameter estimation is used for improving data transmission performance. To estimate the channel properties and correct t...