Security Testing of Orchestrated Business Processes in SOA

被引:0
|
作者
Hariharan, C. [1 ]
Babu, Chitra [1 ]
机构
[1] SSN Coll Engn, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Vulnerability; Security; SOA; Orchestrated Business Process;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Service Oriented Architecture (SOA) has been widely used during the past decade due to its ability to seamlessly integrate various applications developed using different technologies. Web services based on open standards are the most commonly used technology to realize an SOA. Business processes are executed by appropriate orchestration of various services from different departments that belong to a single organization or from multiple organizations. Security is an important quality attribute that has to be built into any application that is developed using SOA. XML is the underlying technology for Web Service Description Language (WSDL), SOAP protocol and Business Process Execution Language (BPEL). It is highly probable that an attacker could inject malicious information into these XML files to modify the flow of the business process. Further, SOAP was not designed with security in mind, it is possible to tamper the SOAP messages while they are in transit. There exist a number of such potential vulnerabilities which lead to possible security breach in the individual services. In an orchestrated business process, there are possibilities of more vulnerabilities. One of the existing tools namely WS-Attacker is only capable of testing the security of individual web services alone. In spite of the widespread usage of SOA, currently there is limited automatic tool support for testing the security provided by an entire SOA application involving service orchestration. In this context, this paper focuses on designing and implementing a plug-in for WS-Attacker to analyze a few security vulnerabilities present in SOA business processes.
引用
收藏
页码:1426 / 1430
页数:5
相关论文
共 50 条
  • [1] Guest Editorial: Security and Dependability in SOA and Business Processes
    Damiani, Ernesto
    Proctor, Seth
    Singhal, Anoop
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (04) : 255 - 256
  • [2] From Adaptive Business Processes to Orchestrated Microflows
    Sinnhofer, Andreas Daniel
    Oberhauser, Roy
    Steger, Christian
    [J]. BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2020, 2020, 391 : 152 - 168
  • [3] Business processes in the context of Grid and SOA
    Dimitrov, V.
    [J]. NUCLEAR ELECTRONICS & COMPUTING (NEC'2011), 2011, : 115 - 121
  • [4] Building orchestrated microservice systems using declarative business processes
    Davi Monteiro
    Paulo Henrique M. Maia
    Lincoln S. Rocha
    Nabor C. Mendonça
    [J]. Service Oriented Computing and Applications, 2020, 14 : 243 - 268
  • [5] Building orchestrated microservice systems using declarative business processes
    Monteiro, Davi
    Maia, Paulo Henrique M.
    Rocha, Lincoln S.
    Mendonca, Nabor C.
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2020, 14 (04) : 243 - 268
  • [6] Evaluating the Capabilities of SOA Security Testing Tools
    Kabbani, Nawwar
    Tilley, Scott
    [J]. 2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 129 - 134
  • [7] Vulnerability Analysis in SOA-Based Business Processes
    Lowis, Lutz
    Accorsi, Rafael
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (03) : 230 - 242
  • [8] On the Risk Management and Auditing of SOA Based Business Processes
    Orriens, Bart
    van der Heuvel, Willem-Jan
    Papazoglou, Mike
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION, PROCEEDINGS, 2008, 17 : 124 - 138
  • [9] Towards an Evaluation Framework for SOA Security Testing Tools
    Kabbani, Nawwar
    Tilley, Scott
    Pearson, Lewis
    [J]. 2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 438 - 443
  • [10] Security Analysis of Electronic Business Processes
    Susanne Röhrig
    Konstantin Knorr
    [J]. Electronic Commerce Research, 2004, 4 (1-2) : 59 - 81