Today, the Business Process Execution Language (BPEL) is the most emerging specification for Web Service Composition, which is an important part of the SOA paradigm. Defining a stateful communication protocol, BPEL en...
详细信息
Today, the Business Process Execution Language (BPEL) is the most emerging specification for Web Service Composition, which is an important part of the SOA paradigm. Defining a stateful communication protocol, BPEL enables potential for new security vulnerabilities. In this paper, we present a severe Denial-of-Service attack on a leading BPEL engine, illustrating new threats on availability in the context of BPEL. Derived from our observations, we developed a protection concept and implemented an application level firewall fending these types of attacks.
Being regarded as the new paradigm for Internet communication, Web Services have introduced a large number of new standards and technologies. Though founding on decades of networking experience, Web Services are not m...
详细信息
Being regarded as the new paradigm for Internet communication, Web Services have introduced a large number of new standards and technologies. Though founding on decades of networking experience, Web Services are not more resistant to security attacks than other open network systems. Quite the opposite is true: Web Services are exposed to attacks well-known from common Internet protocols and additionally to new kinds of attacks targeting Web Services in particular. Along with their severe impact, most of these attacks can be performed with minimum effort from the attacker's side. In this paper we present a list of vulnerabilities in the context of Web Services. To proof the practical relevance of the threats, we performed exemplary attacks on widespread Web Service implementations. Further, general countermeasures for prevention and mitigation of such attacks are discussed.
Access control and ensuring availability are important tasks for securing Web Services. Both requirements are not well studied on Web Services and especially not their interactions. However, considering this interacti...
详细信息
Access control and ensuring availability are important tasks for securing Web Services. Both requirements are not well studied on Web Services and especially not their interactions. However, considering this interaction is crucial. On one hand, access control is an established mechanism for protecting services from attacks targeting the service's availability. On the other hand, enforcing access control on Web Services is a complex task and therefore access control implementations potentially offer new possibilities for attacks. In this paper a solution for Web Service access control enforcement is presented using an event-based processing model focusing on ensuring Web Service availability.
Traffic visualisation is important in several areas e.g. network planning and monitoring, network traffic analysis and intrusion detection. A novelty in the work we present in this paper is the use of texture analysis...
详细信息
Traffic visualisation is important in several areas e.g. network planning and monitoring, network traffic analysis and intrusion detection. A novelty in the work we present in this paper is the use of texture analysis methods from the domain of digital image processing for network traffic visualisation. We use strategies based on co-occurrence matrices to derive statistical properties for network traffic visualisation and anomalous traffic detection. Based on the fact that some of the statistical properties are related to a certain kind of traffic, which is also reflected in the allocation of the dynamic co-occurrence matrix, we are able to display the global status of our network and show periods, where the traffic behaviour is unusual. Further, we introduce a new parameter, network traffic homogeneity (NTH) as a measure of the local roughness of the network traffic.
Finding appropriate features is one of the key problems in the increasing applications of rough set theory, which is also one of the bottlenecks of the rough set methodology. Particle Swarm Optimization (PSO) is parti...
详细信息
The success of modern VoIP-based applications has demonstrated how VoIP technologies are rather mature for replacing current telephony systems and for creating new and flexible modes of communication. Currently there ...
详细信息
The success of modern VoIP-based applications has demonstrated how VoIP technologies are rather mature for replacing current telephony systems and for creating new and flexible modes of communication. Currently there are many open-source libraries, tools, and applications available. Starting from some of them, we have designed and built a complete IP telephony platform including several functionalities such registration, call proxying, authentication, PSTN interworking, conferencing, voice mail and other centrex functions. The core of our platform is based on our java-based SIP proxy implementation named mj Proxy that is also described in the paper.
A method of increasing the capacity of synchronous DS-CDMA beyond the signal space dimension is called oversaturation. When the number of users exceeds the signal space dimension, it does not in principle prohibit the...
详细信息
A method of increasing the capacity of synchronous DS-CDMA beyond the signal space dimension is called oversaturation. When the number of users exceeds the signal space dimension, it does not in principle prohibit the maximization of minimum Euclidean distance between the points of a group signal constellation up to the optimum achieved with orthogonal users' signatures. Previously reported construction of distance-optimal signature ensembles was limited to only signal space dimensions equal to the natural power of four. This paper presents a generalization of such a method to arbitrary signal space dimensions. Necessary condition of presenting binary antipodal alphabet in the oversaturated ensembles of this kind is also discussed.
This paper proposes a first step into a common solution, where combined and extended interests will hopefully allow us to surpass this threshold. While there are still some open issues, we hope to not only propose a b...
详细信息
This paper proposes a first step into a common solution, where combined and extended interests will hopefully allow us to surpass this threshold. While there are still some open issues, we hope to not only propose a basic working mechanism but also provide fresh ideas to start thinking off the beaten path. Our main contribution is to create a lightweight, end-to-end binding between path and service, which is then used as a basis to associate further attributes and mechanisms to this binding.
Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymme...
详细信息
Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric data rates, higher bit error rate (The raw BERs are in the order of 10 -2 ), very high free space losses (around 250-300 dB) and power constraints that may severely compromise the effectiveness of standard transport protocols. Transmissions protocols must also relieve applications and other upper-layer protocols (like the bundle protocol from the Delay Tolerant Network architecture) from the need to deal with the characteristics of intervening communications networks and services. In this paper we analyse the impacts of parameters such as loss probability and propagation delay on Licklider Transmission Protocol (LTP) [1], [2] and the newly proposed Licklider Transmission Protocol-(LTP-T) [3] following a comparative study of both the protocols.
In the Service Oriented Grid, a grid application can be composed of diverse Grid Services which may be already deployed on grid sites, and dependencies between these Grid Services can be described as the workflow grap...
详细信息
In the Service Oriented Grid, a grid application can be composed of diverse Grid Services which may be already deployed on grid sites, and dependencies between these Grid Services can be described as the workflow graph. Though many grid scheduling methods have been developed, they have been studied based on static heterogeneous computing environment. For this reason, these heuristics cannot be directly applied to Grid, which is more dynamic computing environment. Therefore, we develop the dynamic service scheduling method, which support that the workflow applications can be performed effectively in spite of dynamic Grid nature. Lastly, we show that our proposed scheduling method outperforms than other conventional scheduling methods through the various experiments.
暂无评论