Defending Against XML-Based Attacks Using State-Based XML Firewall

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Against XML-Based Attacks Using State-Based XML Firewall

With the proliferation of service-oriented systems and cloud computing, web services security has gained much attention in recent years. Web service attacks, called XML-based attacks, typically occur at the SOAP message level, thus they are not readily handled by existing security mechanisms such as a conventional firewall. In order to provide effective security mechanisms for service-oriented ...

متن کامل

Securing Service-oriented Systems Using State-Based XML Firewall

Web services security has been a challenging issue in recent years because current security mechanisms, such as conventional firewalls, are not sufficient for protecting service-oriented systems from XML-based attacks. In order to provide effective security mechanisms for service-oriented systems, XML firewalls were recently introduced as an extension to conventional firewalls for web services ...

متن کامل

XML-Based Applications Using XML Schema

Xml Schemas provide a generalization of Document Type Definitions for describing the validity of a set of Xml documents. There is a growing number of applications that deal with Xml documents in various respects. One area of programs is concerned with analyzing Xml documents arriving, for example, over the internet. Another rapidly expanding area is best described by the term Xml generators. Xm...

متن کامل

Defending Against the Wily Surfer-Web-based Attacks and Defenses

Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...

متن کامل

Defending Against DDoS Attacks in Bloom Filter based Multicasting

Bloom filter (BF) based forwarding is an effective approach to implement scalable multicasting in distributed systems. The forwarding BF carried by each packet can encode either multicast tree or destination IP addresses, which are termed as tree oriented approach (TOA) and destination oriented approach (DOA), respectively. Recent studies have indicated that TOA based protocols have serious vul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computers

سال: 2011

ISSN: 1796-203X

DOI: 10.4304/jcp.6.11.2395-2407