ridm@nrct.go.th   ระบบคลังข้อมูลงานวิจัยไทย   รายการโปรดที่คุณเลือกไว้

Protecting web services from DDoS attacks by SOTA

หน่วยงาน Central Queensland University, Australia

รายละเอียด

ชื่อเรื่อง : Protecting web services from DDoS attacks by SOTA
นักวิจัย : Chonka, Ashley. , Zhou, Wanlei. , Xiang, Yang.
คำค้น : Applied research. , 890199 Communication Networks and Services not elsewhere classified. , 890201 Application Software Packages (excl. Computer Games) , 890202 Application Tools and System Utilities. , 080503 Networking and Communications. , Internet , Computer networks , Computer networks , Traceback -- Service-Oriented Architecture -- Service-Oriented Computing (SOC) -- Distributed Denial of Service
หน่วยงาน : Central Queensland University, Australia
ผู้ร่วมงาน : -
ปีพิมพ์ : 2551
อ้างอิง : http://hdl.cqu.edu.au/10018/28820 , cqu:4436
ที่มา : Chonka, A, Zhou, W and Xiang, Y 2008, 'Protecting Web Services from DDoS attacks by SOTA', Proceedings of 5th International Conference on Information Technology and Applications, Macquarie Scientific Publishing, Bathurst, N.S.W.
ความเชี่ยวชาญ : -
ความสัมพันธ์ : Proceedings of 5th International conference on information technology and applicationsm (ICITA 2008), 23-26 June, Cairns, Queensland, Australia / editors, David Tien ; Dr Manolya Kavakli. Bathurst, N.S.W. : Macquarie Scientific Publishing, 2008. p. 1-6 6 pages Refereed 9780980326727 , ACQUIRE [electronic resource] : Central Queensland University Institutional Repository.
ขอบเขตของเนื้อหา : -
บทคัดย่อ/คำอธิบาย :

In the area of SOA and Web Service Security,many well defined security dimensions have been established. However, current Web Security Systems (WS-Security for example) are not equipped to handle Distributed Denial of Service (DDoS) attacks. In this paper we extend upon our previous work on, Service Oriented Traceback Architecture (SOTA), in order to defend WebServices against such attacks. SOTA’s main objective is to identify the true identity of forged messages, since an attacker tries to hide their identity, in which to avoid current defence systems and escape prosecution. To accomplish the main objective, SOTA should be attached as close to the source of the attack. When an incoming SOAP message comes into the router, it is tagged with our own SOAP header. The header can be used to traverse the network back to the true source of the attack. According to our experimental evaluations we find that SOTA is simple and effective to use against DDoS attacks.

บรรณานุกรม :
Chonka, Ashley. , Zhou, Wanlei. , Xiang, Yang. . (2551). Protecting web services from DDoS attacks by SOTA.
    กรุงเทพมหานคร : Central Queensland University, Australia.
Chonka, Ashley. , Zhou, Wanlei. , Xiang, Yang. . 2551. "Protecting web services from DDoS attacks by SOTA".
    กรุงเทพมหานคร : Central Queensland University, Australia.
Chonka, Ashley. , Zhou, Wanlei. , Xiang, Yang. . "Protecting web services from DDoS attacks by SOTA."
    กรุงเทพมหานคร : Central Queensland University, Australia, 2551. Print.
Chonka, Ashley. , Zhou, Wanlei. , Xiang, Yang. . Protecting web services from DDoS attacks by SOTA. กรุงเทพมหานคร : Central Queensland University, Australia; 2551.