LATIN-AMERICAN JOURNAL OF COMPUTING (LAJC), Vol XI, Issue 1, January – June 2024
The server would process the request and authenticate the
user based on the session cookie containing the fixed session
ID provided by the attacker.
There are several countermeasures that you can use to
mitigate a Session Fixation attack. Since this attack
undermines the properties of integrity (I) and access control
(AC), Fig. 7 of security mechanisms suggests the use of a
combination of techniques to reduce the impact of said attack,
made up of XML Encryption, XML Signature, Security
Tokens, use of SSL, and HTTPS. We can also establish a
session expiration policy, implement anti-CSRF tokens, and
monitor and log suspicious activities, both on the server and
on the compromised computer.
V. C
ONCLUSIONS
The attack taxonomy methodology contributed to the
development of security research in web services by
describing the security properties affected, the level at which
they develop, and other features.
This methodology can be used to explore many types of
vulnerabilities and use specific features of each attack, like
Session Attack. The objective is to analyze how an attack can
affect web services, in addition to creating new attacks and
selecting possible countermeasures.
In this way, this research described five categories of web
services attacks (brute force, spoofing, flooding, denial-of-
services, and injection attack types) along with thirty-three
(33) attacks to provide a state of the art.
As shown in Table I, this taxonomy allows researchers to
classify new attacks based on properties (integrity,
availability, confidentiality, and access control), level of
attack (WSDL or SOAP), amount of exchange of messages,
or level of impact according to the OWASP Top Ten.
Furthermore, a correct classification or grouping of an
attack will allow researchers to more easily determine which
potential countermeasures to employ.
In the future, it is proposed to apply this systematic
methodology to different technologies. Furthermore, it is
possible to combine this methodology with malware attacks
like botnets.
A
CKNOWLEDGMENT
The author would like to thank Eliana Martins (LSD
Laboratory), and Paulo Lício de Geus (LASCA Laboratory)
from the Computing Institute of University of Campinas
(UNICAMP).
R
EFERENCES
[1] R. Derbyshire, B. Green, D. Prince, A. Mauthe, and D. Hutchison, “An
analysis of cyber security attack taxonomies,” in 2018 IEEE European
Symposium on Security and Privacy Workshops (EuroS&PW), pp.
153– 161, IEEE, 2018.
[2] C. Ferris and J. Farrell, “What are web services?,” Communications of
the ACM, vol. 46, no. 6, p. 31, 2003.
[3] “Web services tutorial.” https://www.tutorialspoint.com/
webservices/what_are_web_services.htm, 2022.
[4] I. siddavatam and J. Gadge, “Comprehensive test mechanism to detect
attack on web services,” in 2008 16th IEEE International Conference
on Networks, pp. 1–6, 2008.
[5] D. Wichers and J. Williams, “Owasp top-10 2021.” https://owasp.org/
Top10/.
[6] C. Top and M. Dangerous, “2021 cwe top 25 most dangerous software
weaknesses, 2021.” https://cwe.mitre.org/top25/archive/2021/
2021_cwe_top25.html.
[7] H. Yuan, L. Zheng, L. Dong, X. Peng, Y. Zhuang, and G. Deng,
“Research and implementation of web application firewall based on
feature matching,” in International Conference on Application of
Intelligent Systems in Multi-modal Information Analytics, pp. 1223–
1231, Springer, 2019.
[8] B. Jagruti, P. Nidhi, and D. Pandya, “A survey on webservice security
techniques,” in 2018 4th International Conference on Computing
Communication and Automation (ICCCA), pp. 1–5, 2018.
[9] O. B. Fredj, O. Cheikhrouhou, M. Krichen, H. Hamam, and A. Derhab,
“An owasp top ten driven survey on web application protection
methods,” in Risks and Security of Internet and Systems (J. Garcia-
Alfaro, J. Leneutre, N. Cuppens, and R. Yaich, eds.), (Cham), pp. 235–
252, Springer International Publishing, 2021.
[10] W. Ahmad, Z. Hayat, B. Zafar, F. A. Khan, F. Din, and I. Shah, “A
survey on taxonomies of attacks and vulnerabilities in computer
systems,” International Journal of Computer Science and
Telecommunications, vol. 3, no. 5, pp. 93–97, 2012.
[11] S. L. Hansman, “A taxonomy of network and computer attack
methodologies,” 2003.
[12] A. C. Panchal, V. M. Khadse, and P. N. Mahalle, “Security issues in
iiot: A comprehensive survey of attacks on iiot and its
countermeasures,” in 2018 IEEE Global Conference on Wireless
Computing and Networking (GCWCN), pp. 124–130, 2018.
[13] C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, “Avoidit: A
cyber attack taxonomy,” in 9th Annual Symposium on Information
Assurance (ASIA’14), pp. 2–12, 2014.
[14] K. F. P. Chan, M. Olivier, and R. P. van Heerden, “A taxonomy of web
service attacks,” in Proceedings of the 8th International Conference on
Information Warfare and Security: ICIW, p. 34, 2013.
[15] M. I. Ladan, “Web services: Security challenges,” in 2011 World
Congress on Internet Security (WorldCIS-2011), pp. 160–163, IEEE,
2011.
[16] R. K. K. Meduri, “Webservice security,” in Webservices, pp. 119–172,
Springer, 2019.
[17] P. Nandan, Mastering SoapUI. Packt Publishing Ltd, 2016.
[18] G. A. Jaafar, S. M. Abdullah, and S. Ismail, “Review of recent detection
methods for http ddos attack,” Journal of Computer Networks and
Communications, vol. 2019, 2019.
[19] M. Jensen, N. Gruschka, and R. Herkenhöner, “A survey of attacks on
web services,” Computer Science-Research and Development, vol. 24,
no. 4, pp. 185–197, 2009.
[20] V. Patel, R. Mohandas, and A. R. Pais, “Attacks on web services and
mitigation schemes,” in 2010 International Conference on Security and
Cryptography (SECRYPT), pp. 1–6, IEEE, 2010.
[21] A. Singh, A. Sharma, N. Sharma, I. Kaushik, and B. Bhushan,
“Taxonomy of attacks on web based applications,” in 2019 2nd
International Conference on Intelligent Computing, Instrumentation
and Control Technologies (ICICICT), vol. 1, pp. 1231–1235, 2019.
[22] A. Boudi, I. Farris, M. Bagaa, and T. Taleb, “Assessing lightweight
virtualization for security-as-a-service at the network edge,” IEICE
Transactions on Communications, vol. 102, no. 5, pp. 970–977, 2019.
[23] A. T. Limited, “Attack tree modeling.” https://www.amenaza.com/,
2022.
[24] S. Mehta, G. Raj, and D. Singh, “Penetration testing as a test phase in
web service testing a black box pen testing approach,” in Smart
Computing and Informatics, pp. 623–635, Springer, 2018.
[25] S. Abidi, M. Essafi, C. G. Guegan, M. Fakhri, H. Witti, and H. H. B.
Ghezala, “A web service security governance approach based on
dedicated micro-services,” Procedia Computer Science, vol. 159, pp.
372– 386, 2019.
[26] “Web application firewall.” https://owasp.org/www-
community/Web_ Application_Firewall, 2018.
[27] S. Akshaya, M., and G. Padmavathi. "Taxonomy of security attacks and
risk assessment of cloud computing." Advances in Big Data and Cloud
Computing: Proceedings of ICBDCC18. Springer Singapore, 2019.
[28] S. Yassine, and Y. Maleh. "A systematic review and taxonomy of web
applications threats." Information Security Journal: A Global
Perspective 31.1 (2022): 1-27.
[29] P. Prinetto, and G. Roascio. "Hardware Security, Vulnerabilities, and
Attacks: A Comprehensive Taxonomy." ITASEC. 2020.