Research Article
Online detection of web choreography misuses
@INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8346, author={Murat Gunestas and Duminda Wijesekera }, title={Online detection of web choreography misuses}, proceedings={5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing}, proceedings_a={COLLABORATECOM}, year={2009}, month={12}, keywords={Service oriented architecture web service choreography service misuse business misuse detection alert sense and response}, doi={10.4108/ICST.COLLABORATECOM2009.8346} }
- Murat Gunestas
Duminda Wijesekera
Year: 2009
Online detection of web choreography misuses
COLLABORATECOM
ICST
DOI: 10.4108/ICST.COLLABORATECOM2009.8346
Abstract
Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.
Copyright © 2009–2024 ICST