Openly accessible

Protecting web services with service oriented traceback architecture

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang 2008, Protecting web services with service oriented traceback architecture, in CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, IEEE, Piscataway, N.J., pp. 706-711.

Attached Files
Name Description MIMEType Size Downloads
Zhou-protectingwebservices-2008.pdf Published version application/pdf 440.57KB 513

Title Protecting web services with service oriented traceback architecture
Author(s) Chonka, Ashley
Zhou, Wanlei
Xiang, Yang
Conference name IEEE International Conference on Computer and Information Technology (8th : 2008 : Sydney, N.S.W.)
Conference location Sydney, N.S.W.
Conference dates 8-11 July 2008
Title of proceedings CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology
Editor(s) Wu, Qiang
He, Xiangjian
Nguyen, Quang Vinh
Jia, Wenjing
Huang, Maolin
Publication date 2008
Conference series International Conference on Computer and Information Technology
Start page 706
End page 711
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) distributed denial of service
service-oriented architecture (SOA)
service-oriented computing (SOC)
traceback
XDoS
Summary Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions. However, current Web security systems, like WS-Security are not efficient enough to handle distributed denial of service (DDoS) attacks. Our new approach, service oriented traceback architecture (SOTA), provides a framework to be able to identify the source of an attack. This is accomplished by deploying our defence system at distributed routers, in order to examine the incoming SOAP messages and place our own SOAP header. By this method, we can then use the new SOAP header information, to traceback through the network the source of the attack. According to our experimental performance evaluations, we find that SOTA is quite scaleable, simple and quite effective at identifying the source.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9781424423583
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2008, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30018209

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 585 Abstract Views, 514 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 14:06:02 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.