SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 35-39
www.iosrjournals.org
DOI: 10.9790/0661-17353539 www.iosrjournals.org 35 | Page
Algorithm for Securing SOAP Based Web Services from WSDL
Scanning Attacks
Mohamed Ibrahim B1
, Mohamed Shanavas A R2
1
Software Solution Architect & Research Scholar
2
Associate Professor, Jamal Mohamed College, Tiruchirappalli, India
Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modern
enterprise computing to achieve interconnection of related applications in an organization in terms of services.
A service is a Software component which fulfills a defined functionality and does not depend on the context of
other services. In programming terms, the service is called as web method which is a function that accepts input
parameters and returns the output. The data types of input/output parameters may be simple or complex. In SOA
architecture, the list of web methods that a web service offers and the data types of their input/output
parameters are described using Web Services Description Language (WSDL) standard and published to
Universal Description, Discovery and Integration (UDDI) service registry where the web services clients search
the service registry for obtaining the required WSDL and start binding to the web server. The WSDL is prone
for SOA attacks as the WSDL is represented in XML format which is a plain text. Even though few researchers
proposed solutions for WSDL, those solutions are inadequate concerning to the modern communication
technologies and they are not able to achieve any landmark in providing security for WSDL attacks. This paper
proposes a new algorithm for preventing WSDL attacks which uses the existing security standards such as
Public Key Infrastructure (PKI), Digital Signatures, and XML Encryption/Decryption standards.
Keywords - SOA, Web Services, Security, WSDL, PKI, Computer Networks
I. Introduction
In order to integrate the related applications in an enterprise, several standards such as RMI, CORBA
and DCOM are used earlier. These standards adhere to the Service Oriented Architecture (SOA) where a service
is a component in an application which fulfills the defined functionality where it does not depend on the context
of other services. However, these standards belong to specific vendors and depend on the languages, platforms
and machine architectures. The Web Services are the emerging model in SOA which uses standard Internet
protocols for communication between web server and its clients. The Internet protocols are supported by
majority of machine architectures and platforms and the web services use simple XML format for data
exchange. As all the modern programming languages are comfortable to parsing XML formats, web services
can be developed and maintained in any language, thus provides language independent.
The list of available services, their input/output parameters and data types are described using Web
Services Description Language (WSDL). The WSDL is a standard recommended by World Wide Web
Consortium (W3C). The latest version of WSDL is 2.0 [1] and its previous standard version is 1.2 [2], where the
structures of both versions are different. The web service descriptions are published in Service Registry using
Universal Description, Discovery and Integration (UDDI) standard where the web service clients will look into
this registry for the required service description and start communicating with service provider. Thus the
standard SOA architecture contains three important components: (i) Service Provider, (ii) Service Registry and
(iii) Client. The three different basic operations that can be performed in SOA architecture are: (i) Publish by
Service Provider to Service Registry, (ii) Find by Client from Service Registry and (iii) Bind by Client to
Service Provider [3].
In this paper, we concentrate on providing security for “publish” and “find” part of SOA architecture,
i.e. protecting WSDL operations in order to prevent attackers to attack web services by gaining advantage of
interpreting WSDL content which is in plain text format.
This paper is organized as: Section 2 reviews the available literature for WSDL attack prevention, the
proposed algorithm for protecting SOAP web services from WSDL attacks is explained along with proof-of-
concept and result analysis in Section 3, and Section 4 concludes the paper.
II. Literature Review
Reviewing literature, we can see many researchers shown interest in protecting message level attacks,
which may occur during web service request and response between web service client and web service provider.
Only very less researchers are provided solutions for WSDL attacks. In fact, the WSDL attacks are severe which
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 36 | Page
may halt the entire web services down and provides opportunity for attackers to retrieve sensitive information of
the organization.
Mirtalebi et al. [4, 5] and Narges et al. [6, 7] proposed security solutions in the form of framework for
defending WSDL attacks. Both the researchers use the symmetric key cryptography for securing the WSDL
content before publishing it to service registry. However the key maintenance methods and key exchange
mechanisms in order to receive the symmetric from the service provider are not clearly defined in their papers.
The security solutions that are provided by vendors only work as part of their products and they have
few implementation constraints. At present, there is no comprehensive security solution defined for preventing
WSDL attacks.
III. Proposed Algorithm for Preventing WSDL attacks
The proposed algorithm uses the XML encryption standard to protect the WSDL scanning attacks on
the SOAP based web services. It does not aim to encrypt the entire WSDL which is represented XML format,
but only the critical portion through which the attacks can interpret the important information of the defined
services such as the exposed service names along with their input/output parameters.
The custom security elements are added with WSDL segment in order to notify the clients the retrieved
WSDL from the service registry is encrypted and the clients are needed to descript before they bind to the web
server. The security algorithm use symmetric key cryptography for encrypting the content of the WSDL and
asymmetric key cryptography for validating service provider/service requester of web service. The hashing
algorithm such as MD5/SH-1 is applied to ensure the message integrity of the WSDL content transmission.
It is assumed that the service provider and requester trust on the same Certificate Authority (CA) in
order to create and validate digital signatures. To maintain the digital certificates, the existing PKI and XMKS
standards are used.
The proposed algorithm uses the existing security standards as stated below.
 Symmetric Key Cryptography for encrypting the WSDL content at Service Provider [8].
 Hashing Algorithm for generating digest for ensuring message integrity to check whether the received
message at the web service client is not altered by the intermediate nodes passed through from service
registry.
 Public Key Infrastructure (PKI) and XML Key Management System (XKMS) are used for maintaining
private/public keys of using asymmetric key cryptography. Private Key is used for encryption and Public
Key is used for decryption, and vice versa [9, 10]
 Digital Signatures for ensuring the request/response is from right resource [11].
 Certificate Authority (CA) for maintaining digital certificates used for digital signatures.
 A new Software component named “Intelligent Security Engine (ISE)” is introduced at Service Provider
end which is the implementation of the proposed security algorithm at server side.
 The ISE can be placed in a proxy server so that it can serve for many web servers in which different web
services are running. Even it can be attached to Enterprise Service Bus (ESB) network, through which
security can be applied to the entire Enterprise Application Integration (EAI) components.
The proposed security algorithm for protecting SOAP web services from WSDL attacks are given in
Figure 1 and Figure 2 respectively for service provider and service requester side. The flow chart representation
of the proposed algorithm is outlined in Figure 3.
As proof-of-concept (POC), the proposed algorithm is implemented using Java technologies and tested
in web service environment with real time banking data. From the preliminary analysis of the result, we can see
that the extra time taken by web services after the implementation of this security concept is minimal and
acceptable.
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 37 | Page
Algorithm: WSDL_Attack_Prevention_At_Server_Side
Input: WSDL file
Variable: wsdl: WSDL file;
PriKSP: Private Key of Service Provider;
DSignSP: Digital Sign of SP; Digest: Hash of WSDL content;
SymK: Symmetric key; encWSDL: Encrypted WSDL file
Output: Encrypted WSDL
Begin
Step I: /* Service Provider sends WSDL to ISE */
wsdl = WSDL(SP)
Step II: /* Generates values for Keys and Hash; Assign to variables */
Call XKMS, KeyGen, Hash modules
Step III: /* Encrypt WSDL */
encWSDL = [wsdl + [Digest]PriKSP + DSignSP]SymK + Custom_Security_Elements
Step IV: /* Publish encWSDL */
Call UDDI Directory Service API
Service Registry  encWSDL
End
Figure 1: WSDL Attack Prevention (at Server Side)
Algorithm: WSDL_Attack_Prevention_At_Client_Side
Input: Encrypted WSDL file
Variable: wsdl: WSDL file; digest: Hash; SymK: Symmetric key; encWSDL: Encrypted WSDL file
Output: WSDL
Begin
Step I: /* Service Requester gets WSDL from Service Registry*/
Call UDDI Directory Service API;
Service Requester  ServiceRegistry[WSDL]
Step II: /* Check whether received WSDL is encrypted */
If Custom_Security_Elements found Then
encWSDL = Received WSDL
Else
Display “WSDL is not encrypted”;
End If
Step III: /* Get Symmetric Key from Service Provider using PKI and Decrypt WSDL */
wsdl = [encWSDL]SymK
Step IV: /* Calculate Digest of the decrypted WSDL & Compare it against received Digest */
If Calculated_Digest = Received_Digest Then
WSDL is not altered; Initiate binding process with Service Provider
Else
WSDL content is altered; Report to ISE;
End If
End
Figure 2: WSDL Attack Prevention (at Client Side)
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 38 | Page
Figure 3: Flow chart representation of the proposed security algorithm
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
DOI: 10.9790/0661-17353539 www.iosrjournals.org 39 | Page
IV. Conclusion
The earlier technologies for SOA such as RMI and CORBA are already sunset by the industry, and the
web services are preferred choice of enterprises for the implementation of SOA. The web services use XML as
data exchange format for its communication with service provider, service registry and service requester. As the
XML format is in a simple text, it is prone for attacks. From scanning the WSDL, an attacker can become to
know the list of available services along with their input/output parameters and their data types. It became
vulnerability for web service where the attackers can use these retrieved information in order to make attacks on
SOAP web services. A new security algorithm is proposed in this paper to protect the web services from the
WSDL attacks. As a novelty, this algorithm uses a specialized security component named “Intelligent Security
Engine” which can be configured to identify any kind of WSDL attacks. The proposed algorithm is
implemented and tested with real time data and results are as expected in terms of performance.
References
[1]. WSDL 2.0 Specifications: http://www.w3.org/TR/wsdl20/
[2]. WSDL 1.2 Specification: http://www.w3.org/TR/wsdl
[3]. Danish Jamil and Hassan Zaki, “Security Implication of SOAP and Web-Service Interface to the Cloud Computing System,”
International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4, 2011
[4]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “Enhancing Security of Web Service against WSDL Threats,” 2nd IEEE
International Conference on Emergency Management and Management Sciences (ICEMMS), pp. 920-923, IEEE, 2011.
[5]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “A new Security Framework for Protecting WSDL File of Web Service,”
Internatinal Journal of Computer Science and Network Security (IJCSNS), Vol. 12, No. 9 , pp. 84-90, 2012.
[6]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New SOA Security Framework Defending
Web Services Against WSDL Attacks,” IEEE 3rd Inernational Conference on Privacy, Security, Risk and Trust (PASSAT), pp.
1259-1262, IEEE, 2011.
[7]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New Security Framework against Web
Services' XML attacks in SOA,” The 7th International Conference on Next Generation Web Services Practices, pp. 314-319, IEEE,
2011.
[8]. Singh Preeti, and Praveen Shende, “Symmetric Key Cryptography: Current Trends,” International Journal of Computer Science and
Mobile Computing, Vol. 3, Issue 12, pp. 410-415, 2014.
[9]. Chan, Dan TF, and Lucas CK Hui, “Towards a unified PKI Framework,” International Symposium on Technology Management
and Emerging Technologies (ISTMET), pp. 113-118. IEEE, 2014.
[10]. XML Key Management Specification: http://www.w3.org/TR/xkms2/
[11]. Cash, David, Rafael Dowsley, and Eike Kiltz, “Digital Signatures from Strong RSA without Prime Generation,” Public-Key
Cryptography (PKC 2015), pp. 217-235, Springer Berlin Heidelberg, 2015.

More Related Content

What's hot

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security frameworkijsc
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEcscpconf
 
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET Journal
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingRahul Roshan
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
76 s201923
76 s20192376 s201923
76 s201923IJRAT
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceAmin Saqi
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 

What's hot (18)

iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security framework
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
IRJET- Highlighting Document Streams using Multi-Regional Input Output (MRIO)
 
SOA Security
SOA Security SOA Security
SOA Security
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
76 s201923
76 s20192376 s201923
76 s201923
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Introducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and PerformanceIntroducing OpenID 1.0 Protocol: Security and Performance
Introducing OpenID 1.0 Protocol: Security and Performance
 
Research paper
Research paperResearch paper
Research paper
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 

Viewers also liked

CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...IOSR Journals
 
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
 
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...IOSR Journals
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living System Effects of EM Radiation on Living System
Effects of EM Radiation on Living System IOSR Journals
 
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...Perception of Economic and Environmental Impact of Christmas Festival/Calabar...
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...IOSR Journals
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsIOSR Journals
 

Viewers also liked (20)

T01821125128
T01821125128T01821125128
T01821125128
 
D1103023339
D1103023339D1103023339
D1103023339
 
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
 
D010111822
D010111822D010111822
D010111822
 
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
 
E017652024
E017652024E017652024
E017652024
 
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...
“Study The Different Parameters of Sewage Treatment With UASB & SBR Technolog...
 
D011112432
D011112432D011112432
D011112432
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living System Effects of EM Radiation on Living System
Effects of EM Radiation on Living System
 
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...Perception of Economic and Environmental Impact of Christmas Festival/Calabar...
Perception of Economic and Environmental Impact of Christmas Festival/Calabar...
 
N010226872
N010226872N010226872
N010226872
 
A017440109
A017440109A017440109
A017440109
 
B1103040715
B1103040715B1103040715
B1103040715
 
D018112429
D018112429D018112429
D018112429
 
J017356875
J017356875J017356875
J017356875
 
K017317175
K017317175K017317175
K017317175
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slots
 
G012273041
G012273041G012273041
G012273041
 
H012225053
H012225053H012225053
H012225053
 
G017354046
G017354046G017354046
G017354046
 

Similar to F017353539

XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesAIRCC Publishing Corporation
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applicationsiosrjce
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoveryIDES Editor
 
Performance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticorePerformance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticoreCSCJournals
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web ServicesSiva Tharun Kola
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA ijsc
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]Subin Sugunan
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAIvivekjv
 
A Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsA Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsTony Lisko
 

Similar to F017353539 (20)

W4502140150
W4502140150W4502140150
W4502140150
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
Presentation1REVIEW
Presentation1REVIEWPresentation1REVIEW
Presentation1REVIEW
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Secure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service DiscoverySecure Architecture Evaluation for Agent Based Web Service Discovery
Secure Architecture Evaluation for Agent Based Web Service Discovery
 
Performance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On MulticorePerformance Evaluation of Web Services In Linux On Multicore
Performance Evaluation of Web Services In Linux On Multicore
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
 
Saas security
Saas securitySaas security
Saas security
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
SOA Security Model For EAI
SOA Security Model For EAISOA Security Model For EAI
SOA Security Model For EAI
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
A Study Of Web Services And Its Implications
A Study Of Web Services And Its ImplicationsA Study Of Web Services And Its Implications
A Study Of Web Services And Its Implications
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

F017353539

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 35-39 www.iosrjournals.org DOI: 10.9790/0661-17353539 www.iosrjournals.org 35 | Page Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks Mohamed Ibrahim B1 , Mohamed Shanavas A R2 1 Software Solution Architect & Research Scholar 2 Associate Professor, Jamal Mohamed College, Tiruchirappalli, India Abstract: The Web Services are the emerging paradigm of Service Oriented Architecture (SOA) in the modern enterprise computing to achieve interconnection of related applications in an organization in terms of services. A service is a Software component which fulfills a defined functionality and does not depend on the context of other services. In programming terms, the service is called as web method which is a function that accepts input parameters and returns the output. The data types of input/output parameters may be simple or complex. In SOA architecture, the list of web methods that a web service offers and the data types of their input/output parameters are described using Web Services Description Language (WSDL) standard and published to Universal Description, Discovery and Integration (UDDI) service registry where the web services clients search the service registry for obtaining the required WSDL and start binding to the web server. The WSDL is prone for SOA attacks as the WSDL is represented in XML format which is a plain text. Even though few researchers proposed solutions for WSDL, those solutions are inadequate concerning to the modern communication technologies and they are not able to achieve any landmark in providing security for WSDL attacks. This paper proposes a new algorithm for preventing WSDL attacks which uses the existing security standards such as Public Key Infrastructure (PKI), Digital Signatures, and XML Encryption/Decryption standards. Keywords - SOA, Web Services, Security, WSDL, PKI, Computer Networks I. Introduction In order to integrate the related applications in an enterprise, several standards such as RMI, CORBA and DCOM are used earlier. These standards adhere to the Service Oriented Architecture (SOA) where a service is a component in an application which fulfills the defined functionality where it does not depend on the context of other services. However, these standards belong to specific vendors and depend on the languages, platforms and machine architectures. The Web Services are the emerging model in SOA which uses standard Internet protocols for communication between web server and its clients. The Internet protocols are supported by majority of machine architectures and platforms and the web services use simple XML format for data exchange. As all the modern programming languages are comfortable to parsing XML formats, web services can be developed and maintained in any language, thus provides language independent. The list of available services, their input/output parameters and data types are described using Web Services Description Language (WSDL). The WSDL is a standard recommended by World Wide Web Consortium (W3C). The latest version of WSDL is 2.0 [1] and its previous standard version is 1.2 [2], where the structures of both versions are different. The web service descriptions are published in Service Registry using Universal Description, Discovery and Integration (UDDI) standard where the web service clients will look into this registry for the required service description and start communicating with service provider. Thus the standard SOA architecture contains three important components: (i) Service Provider, (ii) Service Registry and (iii) Client. The three different basic operations that can be performed in SOA architecture are: (i) Publish by Service Provider to Service Registry, (ii) Find by Client from Service Registry and (iii) Bind by Client to Service Provider [3]. In this paper, we concentrate on providing security for “publish” and “find” part of SOA architecture, i.e. protecting WSDL operations in order to prevent attackers to attack web services by gaining advantage of interpreting WSDL content which is in plain text format. This paper is organized as: Section 2 reviews the available literature for WSDL attack prevention, the proposed algorithm for protecting SOAP web services from WSDL attacks is explained along with proof-of- concept and result analysis in Section 3, and Section 4 concludes the paper. II. Literature Review Reviewing literature, we can see many researchers shown interest in protecting message level attacks, which may occur during web service request and response between web service client and web service provider. Only very less researchers are provided solutions for WSDL attacks. In fact, the WSDL attacks are severe which
  • 2. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 36 | Page may halt the entire web services down and provides opportunity for attackers to retrieve sensitive information of the organization. Mirtalebi et al. [4, 5] and Narges et al. [6, 7] proposed security solutions in the form of framework for defending WSDL attacks. Both the researchers use the symmetric key cryptography for securing the WSDL content before publishing it to service registry. However the key maintenance methods and key exchange mechanisms in order to receive the symmetric from the service provider are not clearly defined in their papers. The security solutions that are provided by vendors only work as part of their products and they have few implementation constraints. At present, there is no comprehensive security solution defined for preventing WSDL attacks. III. Proposed Algorithm for Preventing WSDL attacks The proposed algorithm uses the XML encryption standard to protect the WSDL scanning attacks on the SOAP based web services. It does not aim to encrypt the entire WSDL which is represented XML format, but only the critical portion through which the attacks can interpret the important information of the defined services such as the exposed service names along with their input/output parameters. The custom security elements are added with WSDL segment in order to notify the clients the retrieved WSDL from the service registry is encrypted and the clients are needed to descript before they bind to the web server. The security algorithm use symmetric key cryptography for encrypting the content of the WSDL and asymmetric key cryptography for validating service provider/service requester of web service. The hashing algorithm such as MD5/SH-1 is applied to ensure the message integrity of the WSDL content transmission. It is assumed that the service provider and requester trust on the same Certificate Authority (CA) in order to create and validate digital signatures. To maintain the digital certificates, the existing PKI and XMKS standards are used. The proposed algorithm uses the existing security standards as stated below.  Symmetric Key Cryptography for encrypting the WSDL content at Service Provider [8].  Hashing Algorithm for generating digest for ensuring message integrity to check whether the received message at the web service client is not altered by the intermediate nodes passed through from service registry.  Public Key Infrastructure (PKI) and XML Key Management System (XKMS) are used for maintaining private/public keys of using asymmetric key cryptography. Private Key is used for encryption and Public Key is used for decryption, and vice versa [9, 10]  Digital Signatures for ensuring the request/response is from right resource [11].  Certificate Authority (CA) for maintaining digital certificates used for digital signatures.  A new Software component named “Intelligent Security Engine (ISE)” is introduced at Service Provider end which is the implementation of the proposed security algorithm at server side.  The ISE can be placed in a proxy server so that it can serve for many web servers in which different web services are running. Even it can be attached to Enterprise Service Bus (ESB) network, through which security can be applied to the entire Enterprise Application Integration (EAI) components. The proposed security algorithm for protecting SOAP web services from WSDL attacks are given in Figure 1 and Figure 2 respectively for service provider and service requester side. The flow chart representation of the proposed algorithm is outlined in Figure 3. As proof-of-concept (POC), the proposed algorithm is implemented using Java technologies and tested in web service environment with real time banking data. From the preliminary analysis of the result, we can see that the extra time taken by web services after the implementation of this security concept is minimal and acceptable.
  • 3. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 37 | Page Algorithm: WSDL_Attack_Prevention_At_Server_Side Input: WSDL file Variable: wsdl: WSDL file; PriKSP: Private Key of Service Provider; DSignSP: Digital Sign of SP; Digest: Hash of WSDL content; SymK: Symmetric key; encWSDL: Encrypted WSDL file Output: Encrypted WSDL Begin Step I: /* Service Provider sends WSDL to ISE */ wsdl = WSDL(SP) Step II: /* Generates values for Keys and Hash; Assign to variables */ Call XKMS, KeyGen, Hash modules Step III: /* Encrypt WSDL */ encWSDL = [wsdl + [Digest]PriKSP + DSignSP]SymK + Custom_Security_Elements Step IV: /* Publish encWSDL */ Call UDDI Directory Service API Service Registry  encWSDL End Figure 1: WSDL Attack Prevention (at Server Side) Algorithm: WSDL_Attack_Prevention_At_Client_Side Input: Encrypted WSDL file Variable: wsdl: WSDL file; digest: Hash; SymK: Symmetric key; encWSDL: Encrypted WSDL file Output: WSDL Begin Step I: /* Service Requester gets WSDL from Service Registry*/ Call UDDI Directory Service API; Service Requester  ServiceRegistry[WSDL] Step II: /* Check whether received WSDL is encrypted */ If Custom_Security_Elements found Then encWSDL = Received WSDL Else Display “WSDL is not encrypted”; End If Step III: /* Get Symmetric Key from Service Provider using PKI and Decrypt WSDL */ wsdl = [encWSDL]SymK Step IV: /* Calculate Digest of the decrypted WSDL & Compare it against received Digest */ If Calculated_Digest = Received_Digest Then WSDL is not altered; Initiate binding process with Service Provider Else WSDL content is altered; Report to ISE; End If End Figure 2: WSDL Attack Prevention (at Client Side)
  • 4. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 38 | Page Figure 3: Flow chart representation of the proposed security algorithm
  • 5. Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks DOI: 10.9790/0661-17353539 www.iosrjournals.org 39 | Page IV. Conclusion The earlier technologies for SOA such as RMI and CORBA are already sunset by the industry, and the web services are preferred choice of enterprises for the implementation of SOA. The web services use XML as data exchange format for its communication with service provider, service registry and service requester. As the XML format is in a simple text, it is prone for attacks. From scanning the WSDL, an attacker can become to know the list of available services along with their input/output parameters and their data types. It became vulnerability for web service where the attackers can use these retrieved information in order to make attacks on SOAP web services. A new security algorithm is proposed in this paper to protect the web services from the WSDL attacks. As a novelty, this algorithm uses a specialized security component named “Intelligent Security Engine” which can be configured to identify any kind of WSDL attacks. The proposed algorithm is implemented and tested with real time data and results are as expected in terms of performance. References [1]. WSDL 2.0 Specifications: http://www.w3.org/TR/wsdl20/ [2]. WSDL 1.2 Specification: http://www.w3.org/TR/wsdl [3]. Danish Jamil and Hassan Zaki, “Security Implication of SOAP and Web-Service Interface to the Cloud Computing System,” International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 4, 2011 [4]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “Enhancing Security of Web Service against WSDL Threats,” 2nd IEEE International Conference on Emergency Management and Management Sciences (ICEMMS), pp. 920-923, IEEE, 2011. [5]. Mirtalebi, Arezoo, and Mohammad Reza Khayyambashi, “A new Security Framework for Protecting WSDL File of Web Service,” Internatinal Journal of Computer Science and Network Security (IJCSNS), Vol. 12, No. 9 , pp. 84-90, 2012. [6]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New SOA Security Framework Defending Web Services Against WSDL Attacks,” IEEE 3rd Inernational Conference on Privacy, Security, Risk and Trust (PASSAT), pp. 1259-1262, IEEE, 2011. [7]. Shahgholi, Narges, Mehran Mohsenzadeh, Mir Ali Seyyedi, and Saleh Hafez Qorani, “A New Security Framework against Web Services' XML attacks in SOA,” The 7th International Conference on Next Generation Web Services Practices, pp. 314-319, IEEE, 2011. [8]. Singh Preeti, and Praveen Shende, “Symmetric Key Cryptography: Current Trends,” International Journal of Computer Science and Mobile Computing, Vol. 3, Issue 12, pp. 410-415, 2014. [9]. Chan, Dan TF, and Lucas CK Hui, “Towards a unified PKI Framework,” International Symposium on Technology Management and Emerging Technologies (ISTMET), pp. 113-118. IEEE, 2014. [10]. XML Key Management Specification: http://www.w3.org/TR/xkms2/ [11]. Cash, David, Rafael Dowsley, and Eike Kiltz, “Digital Signatures from Strong RSA without Prime Generation,” Public-Key Cryptography (PKC 2015), pp. 217-235, Springer Berlin Heidelberg, 2015.