DocumentCode :
665592
Title :
Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial services
Author :
Masood, A.
fYear :
2013
fDate :
12-14 Nov. 2013
Firstpage :
1
Lastpage :
6
Abstract :
Service oriented architecture is fast becoming ubiquitous enterprise software architecture standard in public and private sector alike. Study of literature and current attacks suggests that with the proliferation of Web API and RESTFul services, the attack vectors prioritized by OWASP top 10, including but not limited to cross site scripting (XSS), cross site request forgery (CSRF), injection, direct object reference, broken authentication and session management now equally apply to web services. In addition service oriented architecture relies heavily on XML/RESTFul web services which are vulnerable to XML Signature Wrapping Attack, Oversize Payload, Coercive parsing, SOAP Action Spoofing, XML Injection, WSDL Scanning, Metadata Spoofing, Oversized Cryptography, BPEL State Deviation, Instantiation Flooding, Indirect Flooding, WS-Addressing spoofing and Middleware Hijacking to name a few. In this paper, we review various such security issues pertaining to service oriented architecture. These and similar techniques, have been employed by Anonymous and other hacktivists, resulting in denial of service attacks on financial applications. While discussing the national security perils of hacktivism, there is an excessive focus on network layer security, and the application layer perspective is not always part of the discussion. In this research, we provide background information and rationale for securing application layer vulnerabilities to facilitate true defense in depth approach for cyber security.
Keywords :
Web services; application program interfaces; financial data processing; security of data; service-oriented architecture; ubiquitous computing; BPEL state deviation; CSRF; OWASP; RESTFul Web service; RESTFul services; SOA vulnerability; SOAP action spoofing; WS-addressing spoofing; WSDL scanning; Web 2.0; Web API; Web services; XML Web service; XML injection; XML signature wrapping attack; XSS; application layer perspective; application layer vulnerability; background information; broken authentication; coercive parsing; cross site request forgery; cross site scripting; cyber security; denial of service attacks; direct object reference; financial applications; financial services; hacktivism; indirect flooding; instantiation flooding; metadata spoofing; middleware hijacking; national security perils; network layer security; oversize payload; oversized cryptography; public and private sector; service oriented architectures; session management; ubiquitous enterprise software architecture; Computer crime; Service-oriented architecture; Simple object access protocol; Vectors; XML; Availability; Data security; Information security; Information systems; SOA; Service oriented architecture; Web services; cyber security; secure design; secure software development; security assessment; security awareness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2013 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-3963-3
Type :
conf
DOI :
10.1109/THS.2013.6698966
Filename :
6698966
Link To Document :
بازگشت