郑梁须, 张迎周, 符炜. 一种基于操作请求图的Web服务入侵检测方法[J]. 微电子学与计算机, 2012, 29(11): 9-12.
引用本文: 郑梁须, 张迎周, 符炜. 一种基于操作请求图的Web服务入侵检测方法[J]. 微电子学与计算机, 2012, 29(11): 9-12.
ZHENG Liang-xu, ZHANG Ying-zhou, FU Wei. A Method of Web Service Intrusion Detection Based on Operation Request Graph[J]. Microelectronics & Computer, 2012, 29(11): 9-12.
Citation: ZHENG Liang-xu, ZHANG Ying-zhou, FU Wei. A Method of Web Service Intrusion Detection Based on Operation Request Graph[J]. Microelectronics & Computer, 2012, 29(11): 9-12.

一种基于操作请求图的Web服务入侵检测方法

A Method of Web Service Intrusion Detection Based on Operation Request Graph

  • 摘要: 为了解决松散耦合性导致的Web服务易遭受攻击的问题,提出一种针对Web服务调用的异常检测方法.通过对BPEL文件的控制流程图进行分析,提取出服务编排中涉及的所有服务操作,以结构性活动为逻辑关系,以操作间传递的参数为有向边权值构造操作请求图,将该操作请求图作为异常检测模型的“活动简档”,对于不符合异常检测模型的行为判定为入侵.这种方法约束用户按照BPEL的编排执行业务流程,从而保证了Web服务调用的安全性.

     

    Abstract: The loosely-coupled property makes web service vulnerable.A method focused on web service invoking is proposed to solve the problem.Firstly, we analyze the control-flow graph of the BPEL document and extract all the operations it involved.Then an operation request graph is created based on the structure activities and the parameter which the operations pass among each other.The operation request graph is regarded as the profile of the anomaly detection model.If user behavior goes against the model, it will be judged as illegal.This method regulates the user behavior by forcing the users to execute the business process according to the BPEL document, so it guarantee the safety of the web service.

     

/

返回文章
返回