Attack Taxonomy Methodology Applied to Web Services

With the rapid evolution of attack techniques and attacker targets, companies Goalie - Goalie Mask - Senior and researchers question the applicability and effectiveness of security taxonomies.Although the attack taxonomies allow us to propose a classification scheme, they are easily rendered useless by the generation of new attacks.Due to its distributed and open nature, web services give rise to new security challenges.The purpose of this study is to apply a methodology for categorizing and updating attacks prior to the continuous creation and evolution of new attack schemes on web services.Also, in this research, we collected thirty-three (33) types of attacks classified into five (5) categories, such as brute force, spoofing, flooding, denial-of-services, and injection attacks, in order to obtain the state of the art of vulnerabilities against web services.

Finally, the attack taxonomy is applied to a web service, modeling through attack trees.The use of this methodology allows us to prevent future Seeds attacks applied to many technologies, not only web services.

Leave a Reply

Your email address will not be published. Required fields are marked *