Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks

被引:0
|
作者
Saudi, Madihah Mohd [1 ,2 ]
Zaizi, Nurzi Juana Mohd [2 ]
Sweese, Khaled Juma Ahmed [2 ]
Abu Bakar, Azreena [2 ]
机构
[1] Univ Sains Islam Malaysia, ISI, CSS, Nilai 71800, Negeri Sembilan, Malaysia
[2] Univ Sains Islam Malaysia, FST, Nilai 71800, Negeri Sembilan, Malaysia
关键词
D O I
10.1051/matecconf/201925502016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Living in cyber world with revolutionizes of Industrial 4.0, most of the users and organisations prefer to sell and buy products or services via website online transaction. This online transaction is done through a messaging protocol (SOAP) and signing entire SOAP (SESOAP) using Extensible Markup Language (XML). XML is implemented to secure the SOAP contents by applying the signing method called as XML Digital signature. However, the XML digital signature has issues related to XML signature wrapping (XSW) attacks specifically on Sibling Value Context and Sibling Order Context attacks. Therefore, this paper proposes an enhanced method called as Spatial Signature Method (SSM) which aims to resolve the limitation of SESOAP from the aspect of XSW attacks. It proposes new parameters for XML digital signature inspired by the concept of ratio and space in biotechnology to detect the XSW attacks. The experiment was conducted in a controlled lab by using the Ubuntu Linux system and PHP programming. Based on the comparison made with SESOAP and ID Referencing method (IDR), SSM has proven to defend against the XSW attacks. For the future work, the spatial signature method can be forged with more extensive spatial information for the digital signature and to integrate it with web services.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Making XML Signatures Immune to XML Signature Wrapping Attacks
    Mainka, Christian
    Jensen, Meiko
    Lo Iacono, Luigi
    Schwenk, Joerg
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 151 - 167
  • [2] New Countermeasure Approach on XML Digital Signature Against Wrapping Attack
    Sawesi, Khaled Giuma A.
    Saudi, Madihah Mohd
    Azman, Norhidayah Bt
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5168 - 5172
  • [3] Analysis of Signature Wrapping Attacks and Countermeasures
    Gajek, Sebastian
    Jensen, Meiko
    Liao, Lijun
    Schwenk, Joerg
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 575 - 582
  • [4] XML Signature Wrapping Angriffe wirksam unterbinden
    Meiko Jensen
    Holger Junker
    Luigi Lo Iacono
    Christian Mainka
    Jörg Schwenk
    [J]. Datenschutz und Datensicherheit - DuD, 2012, 36 (4) : 236 - 240
  • [5] Detection of XML Signature Wrapping Attack Using Node Counting
    Gupta, Abhinav Nath
    Thilagam, P. Santhi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON BIG DATA AND CLOUD COMPUTING CHALLENGES (ISBCC - 16'), 2016, 49 : 57 - 63
  • [6] New XML Signature Scheme That is Resistant to Some Attacks
    Wawrzyniak, Gerard
    El Fray, Imed
    [J]. IEEE ACCESS, 2020, 8 : 35815 - 35831
  • [7] XML Signature Wrapping AngriffeWhat you process is not always what you verify
    Nils Gruschka
    Meiko Jensen
    Luigi Lo Iacono
    Jörg Schwenk
    [J]. Datenschutz und Datensicherheit - DuD, 2009, 33 (9) : 553 - 560
  • [8] A short certificateless aggregate signature against coalition attacks
    Yang, Xiaodong
    Wang, Jinli
    Ma, Tingchun
    Li, Yutong
    Wang, Caifen
    [J]. PLOS ONE, 2018, 13 (12):
  • [9] A Note on Fault Attacks Against Deterministic Signature Schemes
    Barenghi, Alessandro
    Pelosi, Gerardo
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 182 - 192
  • [10] POSTER: Mimicry Attacks against Wireless Link Signature
    Liu, Yao
    Ning, Peng
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 801 - 803