Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security

被引:29
|
作者
Salas, M. I. P. [1 ]
Martins, E. [1 ]
机构
[1] UNICAMP State Univ Campinas, Inst Comp, Lab Distributed Syst & Software Engn, Campinas, Brazil
关键词
web services; cross-site scripting; XSS attack; penetration testing; fault injection; WS-Security; WSS; Security Token; soapUI; WSInject;
D O I
10.1016/j.entcs.2014.01.024
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to its distributed and open nature, Web Services give rise to new security challenges. This technology is susceptible to Cross-site Scripting (XSS) attack, which takes advantage of existing vulnerabilities. The proposed approach makes use of two Security Testing techniques, namely Penetration Testing and Fault Injection, in order to emulate XSS attack against Web Services. This technology, combined with WS-Security (WSS) and Security Tokens, can identify the sender and guarantee the legitimate access control to the SOAP messages exchanged. We use the vulnerability scanner soapUI that is one of the most recognized tools of Penetration Testing. In contrast, WSInject is a new fault injection tool, which introduces faults or errors on Web Services to analyze the behavior in an environment not robust. The results show that the use of WSInject, in comparison to soapUI, improves the detection of vulnerability allows to emulate XSS attack and generates new types of them.
引用
收藏
页码:133 / 154
页数:22
相关论文
共 50 条
  • [1] Web Service security -: Vulnerabilities and threats within the context of WS-security
    Holgersson, J
    Söderström, E
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON STANDARDIZATION AND INNOVATION IN INFORMATION TECHNOLOGY, 2005, : 147 - 155
  • [2] Authenticated web services: A WS-Security based implementation
    Auletta, Vincenzo
    Blundo, Carlo
    Cimato, Stelvio
    De Cristofaro, Emiliano
    Raimato, Guerriero
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 541 - +
  • [3] Evaluating WS-Security and XACML in Web Services-Based Network Management
    Zanette Rohr, Estevao Miguel
    Granville, Lisandro Zambenedetti
    Tarouco, Liane Margarida R.
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 188 - 194
  • [4] Apply the technology of RBAC and WS-Security for secure Web services environment in campus
    He, Feng
    Le, Jia-Jin
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4406 - +
  • [5] Comparison of performance of Web services, WS-Security, RMI and RMI-SSL
    Juric, Matjaz B.
    Rozman, Ivan
    Brumen, Bostjan
    Colnaric, Matjaz
    Hericko, Marjan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (05) : 689 - 700
  • [6] Automatic Web Security Unit Testing: XSS Vulnerability Detection
    Mohammadi, Mahmoud
    Chu, Bill
    Lipford, Heather Richter
    Murphy-Hill, Emerson
    [J]. 2016 IEEE/ACM 11TH INTERNATIONAL WORKSHOP IN AUTOMATION OF SOFTWARE TEST (AST), 2016, : 78 - 84
  • [7] 基于WS-Security的Web服务安全
    林沐
    [J]. 中国科技信息, 2005, (14) : 20 - 25
  • [8] Generic security policy transformation framework for WS-Security
    Satoh, Fumiko
    Yamaguchi, Yumi
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 513 - +
  • [9] Attack-Tolerant Security Model for WS-Security
    Jesudoss, A.
    Subramaniam, N. P.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1536 - 1540
  • [10] Validating Security Policy Conformance with WS-Security Requirements
    Satoh, Fumiko
    Uramoto, Naohiko
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 133 - 148