scholarly journals Severe SOA Security Threats on SOAP Web Services– A Critical Analysis

2014 ◽  
Vol 16 (2) ◽  
pp. 135-141 ◽  
Author(s):  
Mohamed Ibrahim B ◽  
◽  
Dr. Mohamed Shanavas A R
2019 ◽  
Vol 214 ◽  
pp. 07016 ◽  
Author(s):  
Tian Yan ◽  
Shan Zeng ◽  
Mengyao Qi ◽  
Qingbao Hu ◽  
Fazhi Qi

To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.


Author(s):  
Anne V.D.M. Kayem

Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable architectures on the web with the most common implementation of this concept being in the form of web services. Information exchange is an integral part of SOAs, so designing effective security architectures that ensure data confidentiality and integrity is important. However, selecting a security standard for the architecture is challenging because existing solutions are geared toward access control in relatively static scenarios rather than dynamic scenarios where some form of adaptability is needed. Moreover, when services interact across different domains interoperability becomes a problem because of the lack a consistent security model to handle service interactions. This chapter presents a comparative analysis of SOA security standards. The authors discuss the challenges SOA security architecture designers face, in relation to an example travel agent web services scenario, and outline potential mitigation strategies.


2013 ◽  
pp. 50-73
Author(s):  
Anne V.D.M. Kayem

Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable architectures on the web with the most common implementation of this concept being in the form of web services. Information exchange is an integral part of SOAs, so designing effective security architectures that ensure data confidentiality and integrity is important. However, selecting a security standard for the architecture is challenging because existing solutions are geared toward access control in relatively static scenarios rather than dynamic scenarios where some form of adaptability is needed. Moreover, when services interact across different domains interoperability becomes a problem because of the lack a consistent security model to handle service interactions. This chapter presents a comparative analysis of SOA security standards. The authors discuss the challenges SOA security architecture designers face, in relation to an example travel agent web services scenario, and outline potential mitigation strategies.


2021 ◽  
Vol 4 (2) ◽  
pp. 1-29
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society. This paper presents an analysis of mobile malware evolution between 2000-2020. The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices. Accordingly, factors that restricted the fast spread of early malware and those that enhance the fast propagation of recent malware are identified. Moreover, the paper discusses and classifies mobile malware based on privilege escalation and attack goals. Based on the reviewed survey papers, our research presents recommendations in the form of measures to cope with emerging security threats posed by malware and thus decrease threats and malware infection rates. Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection standpoint. The survey results facilitate the understanding of mobile malware evolution and the infection trend. They also help mobile malware analysts to understand the current evasion techniques mobile malware deploys


2015 ◽  
Vol 2 (4) ◽  
pp. 581-595
Author(s):  
Lisa A. Rich

This special Symposium Edition of the Texas A&M Law Review contains selected articles from presenters at the Fall Symposium entitled New Technology and Old Law: Rethinking National Security held at the Texas A&M School of Law on October 17, 2014. The symposium brought together some of the country’s leading scholars and practitioners on issues related to national security. Symposium participants specifically examined the challenges presented to existing domestic and international-legal frameworks to adapt to emerging national security threats. Panelists provided critical analysis of major issues including the use of Unmanned Aerial Vehicles (UAVs)/drones, big data and mass surveillance, cyber security and issues of privacy, the growth of asymmetric warfare, and challenges from new coalitions such as ISIS/ISIL.


Author(s):  
Srinivas Padmanabhuni ◽  
Hemant Adarkar

This chapter covers the different facets of security as applicable to Service-Oriented Architecture (SOA) implementations. First, it examines the security requirements in SOA implementations, highlighting the differences as compared to the requirements of generic online systems. Later, it discusses the different solution mechanisms to address these requirements in SOA implementations. In the context of Web services, the predominant SOA implementation standards have a crucial role to play. This chapter critically examines the crucial Web services security standards in different stages of adoption and standardization. Later, this chapter examines the present-day common nonstandard security mechanisms of SOA implementations. Towards the end, it discusses the future trends in security for SOA implementations with special bearing on the role of standards. The authors believe that the pragmatic analysis of the multiple facets of security in SOA implementations provided here will serve as a guide for SOA security practitioners.


2008 ◽  
pp. 1-21
Author(s):  
Srinivas Padmanabhuni ◽  
Hemant Adarkar

This chapter covers the different facets of security as applicable to Service-Oriented Architecture (SOA) implementations. First, it examines the security equirements in SOA implementations, highlighting the differences as compared to the requirements of generic online systems. Later, it discusses the different solution mechanisms to address these requirements in SOA implementations. In the context of Web services, the predominant SOA implementation standards have a crucial role to play. This chapter critically examines the crucial Web services security standards in different stages of adoption and standardization. Later, this chapter examines the present-day common nonstandard security mechanisms of SOA implementations. Towards the end, it discusses the future trends in security for SOA implementations with special bearing on the role of standards. The authors believe that the pragmatic analysis of the multiple facets of security in SOA implementations provided here will serve as a guide for SOA security practitioners.


Sign in / Sign up

Export Citation Format

Share Document