{"title":"Online detection of web choreography misuses","authors":"Murat Gunestas, D. Wijesekera","doi":"10.4108/ICST.COLLABORATECOM2009.8346","DOIUrl":null,"url":null,"abstract":"Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.