scholarly journals A New Approach towards DoS Penetration Testing on Web Services

Author(s):  
Andreas Falkenberg ◽  
Christian Mainka ◽  
Juraj Somorovsky ◽  
Jorg Schwenk
2009 ◽  
pp. 897-918
Author(s):  
Peter Bertok ◽  
Xinjian Xu

In a rapidly changing world, continuous adoption of new practices is crucial for survival; organizations embracing the latest technologies have a competitive edge. Smart organizations readily take on board new organizational forms and practices, those in particular that offer agility and responsiveness. The Internet and the World Wide Web offer a new way of collaboration via Web services, but heterogeneity of different service components make cooperation difficult. This chapter describes a new approach to combine Web services by employing a layered structure, in which composition of a value-added service can be built from individual components, and each service component can have semantically equivalent but syntactically different alternatives.


Author(s):  
Abdelghani Benharref ◽  
M. Adel Serhani ◽  
Salah Bouktif ◽  
Jamal Bentahar

2009 ◽  
Vol 52 (9) ◽  
pp. 1534-1549 ◽  
Author(s):  
JinPeng Huai ◽  
Ting Deng ◽  
XianXian Li ◽  
ZongXia Du ◽  
HuiPeng Guo

Author(s):  
Geetanjali sao ◽  
Sakshi Kumar ◽  
Dr. Suman Madan

Information is more susciptible than ever, and each technology advancement creates a new security issue that necessitates a new approach to solving the problem. Penetration testing is used to assess the security of an IT infrastructure by exposing its vulnerabilities in a safe manner. It also aids in acquiring access to the effectiveness of existing defense systems, tactics, and policies. The Penetration testing is carried out on a regular basis in order to detect and control risks to achieve ethics to be possessed by the testing crew involved in penetration test. This research uses a qualitative research methodology for investigating manual testing and automated testing. It further aims at critically investigation penetration testing and its importance with tools available for it. KEYWORDS: IT Security, Penetration test, IT governance, Vulnerability assessment.


Author(s):  
Yanzhen Zou ◽  
Lu Zhang ◽  
Yan Li ◽  
Bing Xie ◽  
Hong Mei

Web services retrieval is a critical step for reusing existing services in the SOA paradigm. In the UDDI registry, traditional category-based approaches have been used to locate candidate services. However, these approaches usually achieve relatively low precision because some candidate Web Services in the result set cannot provide actually suitable operations for users. In this article, we present a new approach to improve this kind of category-based Web Services retrieval process that can refine the coarse matching results step by step. The refinement is based on the idea that operation specification is very important to service reuse. Therefore, a Web Service is investigated via multiple instances view in our approach, which indicates that a service is labeled as positive if and only if at least one operation provided by this service is usable to the user. Otherwise, it is labeled as negative. Experimental results demonstrate that our approach can increase the retrieval precision to a certain extent after one or two rounds of refinement.


Sign in / Sign up

Export Citation Format

Share Document