{"title":"网络编排误用在线检测","authors":"Murat Gunestas, D. Wijesekera","doi":"10.4108/ICST.COLLABORATECOM2009.8346","DOIUrl":null,"url":null,"abstract":"Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Online detection of web choreography misuses\",\"authors\":\"Murat Gunestas, D. Wijesekera\",\"doi\":\"10.4108/ICST.COLLABORATECOM2009.8346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.\",\"PeriodicalId\":232795,\"journal\":{\"name\":\"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Web service choreographies can be misused or abused in two different ways. The first is to exploit the underlying choreography to attack web services, that we call service misuses. Instantiation flooding is one such attack. The second is using web service choreographies to conduct illegal businesses, that we call business misuses. Ponzi and Pyramidal schemes belong in this second category. Due to the web service interdependencies created in choreographed web services both these kinds are difficult to detect. We show an online detection system that would generate alerts of both these kinds of misuses.