Download presentation
Presentation is loading. Please wait.
1
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007
2
Feb 13 2007WS-Denial_of_Service2 The Point The Internet is fault tolerant because its functionality is distributed; Web Services (WS) are not. WS emulate enterprise architecture. Servers on the Internet are susceptible to Denials of Service; WS are doubly (2x) sensistive. Clients of WS are victimised as well; inherent to Service oriented architecture. We need performance evaluations, secured connections, and limited exposure of WS functionality to protect from DoS.
3
Feb 13 2007WS-Denial_of_Service3 The Outline The Internet and Distributed Risk What is Denials of Service (DoS) Web Services and their Clients DoS Sensitivity WS are Resource Intensive Protecting WS from DoS
4
Feb 13 2007WS-Denial_of_Service4 The Internet High availability of core services Internet Protocol (IP) addressing, Domain Name services (DNS), content serving over web (HTTP) and email (SMTP), etc. Functionality distributed, runs on each node of the Internet If one node fails, rest of Internet still has functionality Many Linux distros have all necessary software Unlike Web Services, where functionality is specialized at each node
5
Feb 13 2007WS-Denial_of_Service5 The Internet Internet nodes have exposed functionality (web servers, mail servers, etc.) Publicly accessible – trade off availability for susceptibility to attacks Many types of attacks Denial of Service (DoS) Distributed Denial of Service (DDoS) Spoofing – falsifying identity Man-in-the-Middle – intercepting messages
6
Feb 13 2007WS-Denial_of_Service6 Denial of Service Overwhelm a system with requests Sum of minimally processing requests overwhelms system resources Cannot respond to legitimate requests for service Requests can be: Malformed, Incomplete Properly formed, and induce resource-intensive functionality Formed to take advantage of vulnerability Single attacker, or multiple simultaneous attackers (DDoS) Combined with Spoofing and Man-in-the-Middle
7
Feb 13 2007WS-Denial_of_Service7 Web Services Before service oriented architecture (SOA): software interfaces to enterprise-critical functionality hidden away from Internet Done for safety, stability Software services often localized at client location Web Services expose critical functionality by design Architecture different than the distributed Internet WS emulate enterprise – specialised functionality at each node Functionality dependent on availability of other nodes
8
Feb 13 2007WS-Denial_of_Service8 Web Service Clients Clients rely on the availability of the Web Service – WS enterprises are in the business of network uptime Must develop expertise to protect from attacks Clients of WS are affected by a DoS at the host or publisher of the service DoS affects internal functionality at the client site!! Internet congestion, routing problems, etc. Client more susceptible than with localized or distributed model of software services
9
Feb 13 2007WS-Denial_of_Service9 Double Sensitivity WS can experience DoS in two forms The transport protocol host: HTTP, SMTP, etc. The Web Service itself To help attackers, the WSDL file provides functionality specification … though no more than public documentation Web Services are resource intensive Industry evidence suggests large gaps: 60% bulkier, 6 times slower than competing technolgy
10
Feb 13 2007WS-Denial_of_Service10 Protecting from DoS Transport protocol is probably OK Much research into protecting HTTP servers from DoS: avoid or stop attacks Very little research in DoS protection for WS Several methods Secured and dedicated connections Performance evaluations of platform Limit exposure of resource intensive functionality Establish trust between client and service provider
11
Feb 13 2007WS-Denial_of_Service11 Protecting from DoS Connections Dedicated connections for WS traffic between enterprises, hidden from general Internet traffic Secured connections: Virtual Private Network (VPN), encrypted tunnels Identity of parties known, can avoid spoofing and man-in-the-middle Auditing security policies to avoid DoS within the shared, secured environment
12
Feb 13 2007WS-Denial_of_Service12 Protecting from DoS Performance Evaluation Not all WS platforms created equal Determine threshold for DoS Is a WS the best choice for implementing your service oriented architecture? Limit Exposed Functionality Initial contact should require authentication, authorization Resource-light dismissal of requests Authentication token for resource-heavy functionality
13
Feb 13 2007WS-Denial_of_Service13 Conclusion WS architecture is doubly susceptible to DoS: transport protocol, and WS itself Clients of WS are at risk when service provider is at risk Steps must be taken to minimize DoS risk Dedicated connections Security, policy, authentication, authorization Limited exposure of functionality Performance evaluation: load-test those heavyweight platforms!
14
Feb 13 2007WS-Denial_of_Service14 Thank You for your attention!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.