|本期目录/Table of Contents|

[1]吴长勤,王传安.面向SOAP消息的Web服务注入攻击检测方法[J].武汉工程大学学报,2015,37(07):60-64.[doi:10. 3969/j. issn. 1674-2869. 2015. 07. 013]
 WU Chang-qin,WANG Chuan-an.Detection of SOAP message-oriented injection attacks on Web services[J].Journal of Wuhan Institute of Technology,2015,37(07):60-64.[doi:10. 3969/j. issn. 1674-2869. 2015. 07. 013]
点击复制

面向SOAP消息的Web服务注入攻击检测方法(/HTML)
分享到:

《武汉工程大学学报》[ISSN:1674-2869/CN:42-1779/TQ]

卷:
37
期数:
2015年07期
页码:
60-64
栏目:
机电与信息工程
出版日期:
2015-07-31

文章信息/Info

Title:
Detection of SOAP message-oriented injection attacks on Web services
文章编号:
1674-2869(2015)07-0060-05
作者:
吴长勤王传安
安徽科技学院数学与信息学院,安徽 凤阳 233100
Author(s):
WU Chang-qin WANG Chuan-an
College of Mathematical and Information, Anhui Science and Technology University, Fengyang 233100, China
关键词:
注入攻击SOAP消息Web服务行为模式
Keywords:
injection attacks SOAP messages Web services behavior profiles
分类号:
TB35
DOI:
10. 3969/j. issn. 1674-2869. 2015. 07. 013
文献标志码:
A
摘要:
面向 SOAP 消息的注入攻击对 Web 服务的发展前景和应用产生重要的影响,而目前尚缺乏有效的检测方法,为此我们提出了一种基于行为模式的注入攻击检测方法.该方法在Web服务访问日志行为建模阶段采用长度不同的特征子串来表示行为模式,并通过序列模式的支持度来建立正常消息行为模式轮廓;针对注入攻击复杂多变的特点,进一步提出基于矩阵相似匹配结合相似判决阈值的注入攻击检测模型.实验结果表明,与多种其他经典检测方法相比,该检测方法在检测率和误报率等方面检测效果好,可有效地检测出注入攻击.
Abstract:
SOAP message-oriented injection attacks have great impacts on prospects and applications of Web services; however, there is not an effective injection attacks detection method now. We proposed a method to detect injection attacks based on behavior patterns. In this method, the behavioral patterns of the legal behavior were characterized by characteristic substring sequences of different lengths, and the sequence supports were used to construct the normal behavior profiles in modeling stage of Web-access log message behavior. According to the complex and volatile features of injection attacks, a detection model based on matrix similarity matching and decision threshold was proposed. Compared with other classical detection models in experiments, the proposed method has better detection rate and false positive rate, showing good detection effects on injection attacks.

参考文献/References:

[1] 刘玲霞,王东霞,黄敏桓. 一个Web服务可信体系结构[J].计算机科学,2014,12(41):30-32.LIU ling?鄄xia,Wang Dong?鄄xia,Huang Min?鄄heng.Trustworthy Architecture for Web Services[J]. Computer science,2014,12(41):30-32.(in Chinese)[2] SABBARI M,ALIPOUR H S.A security model and its strategies for web services[J]. International Journal of computer Applications,2011,36(10):24-31.[3] JENSEN M, GRUSCHKA N, HERKENHONER R, et al. Soa And Web Services: New Technologies, New Standards - New Attacks[C]//2007. ECOWS '07. Fifth European Conference on. Web Services, 2007:35-44. [4] NILS Gruschka, Norbert Luttenberger.Protecting Web Services from DoS attacks by SOAP Message Validation [J].IFIP International Federation for Information processing 2006, 9(201):171-182,[5] DIEGO Z G,MARIA B F.Ontology-based Security Ploicies for supporting the management of Web Service Business Processes[C]//The IEEE international Conference on Semanitic computing.2008.[6] 杨晓晖. 一种基于信任度量的 Web 服务跨域访问控制模型[J].山东大学学报(理学版),2014,9(49):115-122.YANG Xiao-hui. A cross-domain access control model of Web service based on trust measurement[J].Journal of Shandong University(Natural Science),2014,9(49):115-122.(in Chinese)[7] 王传安. SCADA系统通信网中的高级持续性攻击检测方法[J].计算机科学与探索,2015,3(9):352-259.Wang Chuan?鄄an. Detection of Advanced Persistent Threats in SCADA Communication Network[J]. Journal of Frontiers of computer science and technology,2015,9(27):352-359.(in Chinese)[8] 翟东海.基于矩阵相似度的最佳样本块匹配算法及其在图像修复中的应用[J].计算机科学,2014,1(41):307-310.ZHAI Dong?鄄hai. Optimal Exemplar Matching Algorithm Based on Matrix Similarity and its Application in Image Inpainting[J]. Computer science,2014,1(41):307-310.(in Chinese)[9] 田新广.基于shell命令和多重行为模式挖掘的用户伪装攻击检测[J].计算机学报,2010,33(4):697-705.TIAN Xin?鄄guang. Masquerade detection based on shell commands and multiple behavior patter mining[J].Chinese Journal of computer,2010,33(4):697-705.(in Chinese)[10] 孙义,胡雨霁,黄皓. 基于序列比对的 SQL 注入攻击检测方法[J].计算机应用研究,2010,9(27):3525-3528.SUN YI,HU YU-JI,HUANG Hao. Method of defense SQL injection attacks based on sequence alignment [J]. Application Research of Computers,2010,9(27):3525:3528.(in Chinese)[11] 陈军.基于本体的 Web 服务攻击检测技术研究[J].计算机应用,2011,6(31):1515-1520.CHEN Jun. Research of Web Services attack detection based on ontology[J]. Journal of Computer Applications,2011,6(31):1515:1520.(in Chinese)[12] 杨晓峰. 基于文本聚类的网络攻击检测方法[J].智能系统学院,2014,1(9):1-7.YANG Xiaofeng. Text clustering based Web attack detection method[J]. CAAI Transactions on Intelligent Systems,2014,1(9):1-7.(in Chinese)

相似文献/References:

备注/Memo

备注/Memo:
收稿日期:2015-06-10基金项目:安徽科技学院青年科研研究项目(ZRC2014426);安徽省自然科学研究项目(KJ2013Z048).作者简介:吴长勤(1962-),男,安徽肥东人,副教授.研究方向:计算机应用技术.
更新日期/Last Update: 2015-08-28