Attack Taxonomy Methodology Applied to Web Services

Authors

Keywords:

Attack taxonomy methodology, web services, brute force, spoofing, flooding, denial-of-services, injection

Abstract

With the rapid evolution of attack techniques and attacker targets, companies and researchers question the applicability and effectiveness of security taxonomies. Although the attack taxonomies allow us to propose a classification scheme, they are easily rendered useless by the generation of new attacks. Due to its distributed and open nature, web services give rise to new security challenges. The purpose of this study is to apply a methodology for categorizing and updating attacks prior to the continuous creation and evolution of new attack schemes on web services. Also, in this research, we collected thirty-three (33) types of attacks classified into five (5) categories, such as brute force, spoofing, flooding, denial-of-services, and injection attacks, in order to obtain the state of the art of vulnerabilities against web services. Finally, the attack taxonomy is applied to a web service, modeling through attack trees. The use of this methodology allows us to prevent future attacks applied to many technologies, not only web services.

DOI

Downloads

Download data is not yet available.

Published

2024-01-08

Issue

Section

Research Articles for the Regular Issue

How to Cite

[1]
“Attack Taxonomy Methodology Applied to Web Services”, LAJC, vol. 11, no. 1, pp. 66–79, Jan. 2024, Accessed: Oct. 08, 2025. [Online]. Available: https://lajc.epn.edu.ec/index.php/LAJC/article/view/351