A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

Web services attacks and security-a systematic literature review

VR Mouli, KP Jevitha - Procedia Computer Science, 2016 - Elsevier
Web Services allow applications to communicate with each other independent of platform
and/or language. They are prone to attacks in the form of Denial-Of-Service, XML, XPath …

Application-layer denial of service attacks: taxonomy and survey

G Mantas, N Stakhanova, H Gonzalez… - … of Information and …, 2015 - inderscienceonline.com
The recent escalation of application-layer denial of service (DoS) attacks has attracted a
significant interest of the security research community. Since application-layer DoS attacks …

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …

Known xml vulnerabilities are still a threat to popular parsers and open source systems

S Jan, CD Nguyen, L Briand - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The Extensible Markup Language (XML) is extensively used in software systems and
services. Various XML-based attacks, which may result in sensitive information leakage or …

Distributed attack deployment capability for modern automated penetration testing

J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …

Automated and effective testing of web services for XML injection attacks

S Jan, CD Nguyen, LC Briand - … of the 25th International Symposium on …, 2016 - dl.acm.org
XML is extensively used in web services for integration and data exchange. Its popularity
and wide adoption make it an attractive target for attackers and a number of XML-based …

A survey and classification of XML based attacks on web applications

C Gupta, RK Singh, AK Mohapatra - Information Security Journal …, 2020 - Taylor & Francis
ABSTRACT XML based attacks are executed in web applications through crafted XML
document that forces XML parser to process un-validated documents. This leads to …

Your software at my service: Security analysis of saas single sign-on solutions in the cloud

C Mainka, V Mladenov, F Feldmann… - … of the 6th Edition of the …, 2014 - dl.acm.org
Software-as-a-Service (SaaS) is typically defined as a rental model for using a complex
software product, running on a centralized computing platform, using a thin client (most …

A search-based testing approach for XML injection vulnerabilities in web applications

S Jan, CD Nguyen, A Arcuri… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In most cases, web applications communicate with web services (SOAP and RESTful). The
former act as a front-end to the latter, which contain the business logic. A hacker might not …