Reducing the Effect of Denial of Service in Web Service Environment

被引:0
作者
Alshayea, Abdulrahman [1 ]
Eljinini, Mohammad Ali H. [2 ]
机构
[1] Isra Univ, Dept Software Engn, Amman, Jordan
[2] Isra Univ, Dept Comp Informat Syst, Amman, Jordan
关键词
denial of service; web service; attack; CLOUD; ATTACKS;
D O I
10.12720/jait.14.5.1096-1102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service (DoS) attacks can cost online and web service providers money and damage their reputations. The lack of security protection in web services creates a vulnerability attackers can exploit. A new XDoS attack targeting web services has recently emerged, using XML rather than plain old HTML as the attack vector. This paper proposes a middleware tool for detecting and preventing web service XDoS and HTTP flooding attacks. A rule-based technique classifies requests as benign or malicious to detect XDoS attacks. According to the middleware tool's trial findings, rule-based technology has successfully recognized and blocked XDoS and HTTP flooding assaults such as large payloads, forceful parsing, and external XML elements in near-real time, such as 0.006s across web services. Middleware protects web services from XDoS and distributed XDoS attacks by ensuring nearly 100% service availability for routine requests (DXDoS).
引用
收藏
页码:1096 / 1102
页数:7
相关论文
共 23 条
[1]   An efficient filter for denial-of-service bandwidth attacks [J].
Abdelsayed, S ;
Glimsholt, D ;
Leckie, C ;
Ryan, S ;
Shami, S .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :1353-1357
[2]  
Alasri A., 2018, International Journal of Engineering and Technology (UAE), V7, P322
[3]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[4]  
Anitha E, 2013, 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), P367, DOI 10.1109/ICICES.2013.6508330
[5]   RETRACTED: Automated query classification based web service similarity technique using machine learning (Retracted Article) [J].
Balaji, B. Saravana ;
Balakrishnan, S. ;
Venkatachalam, K. ;
Jeyakrishnan, V. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (06) :6169-6180
[6]  
Bherde GP, 2016, 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), P1174, DOI 10.1109/ICACDOT.2016.7877771
[7]  
Bourekkache S., 2019, J DIGIT INFORM MANAG, V17, P133, DOI DOI 10.6025/JDIM/2019/17/3/133-144
[8]   Intrusion detection and prevention of web service attacks for software as a service: Fuzzy association rules vs fuzzy associative patterns [J].
Chan, Gaik-Yee ;
Chua, Fang-Fang ;
Lee, Chien-Sing .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (02) :749-764
[9]  
Daigneau R., 2012, Service Design Patterns
[10]  
Elhamam M., 2022, P 2022 2 INT C INN R, P1