Skip to main content

Secure XML Aware Network Design and Performance Analysis

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3480))

Included in the following conference series:

Abstract

Currently, XML as a traffic type on the Internet is widely appeared one-commerce applications rather than HTML. XML based Denial of Service (XDOS) attacks are growing up tremendously. This paper presents a novel approach to manage XML attacks at the network layer efficiently and improves service performance on server side, while XML data is visible at the application layer. Thus it is clear that the server overhead becomes significant if a number of encrypted, signed, and malformed XML data are requested to the server. The proposed approach handles these issues efficiently and securely. The experiments show that the proposed XML Aware Network (XAN) platform is a necessarycomponent for efficient Web Services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The World Wide Web Consortium(W3C)’s XML web page, http://www.w3.org/XML/

  2. McGuir, R.: XML Acceleration Appliances. Emerging Internet Technologies, IBM Software Group (November 5, 2003)

    Google Scholar 

  3. DataPower web page, http://www.datapower.com

  4. XML Security Gateway web page, http://www.datapower.com/products/xs40.html

  5. IBM AlphaWorks Homepage, http://www.alphaworks.ibm.com/tech/xmlsecuritysuite

  6. Baltimore, X/Secure White Paper, http://www.baltimoreinc.com/library/whitepapers/xsecure.html

  7. Baltimore, X/Secure Developer’s Guide (1999)

    Google Scholar 

  8. IETF/W3C, XML-SignatureRequirements (WorkingDraft) (October 1999), http://www.w3.org/TR/1999/WD-xmldsig-requirements-19991014.html

  9. W3C XML Encryption WG, XML Encryption Charter (2001), http://www.w3.org

  10. IETF/W3C, XML-Signature Syntax and Processing(Working Draft) (October 2000), http://www.w3.org/TR/2000/WD-xmldsig-core-20001012/

  11. xml-encryption@w3.org Mail Archives, http://lists.w3.org/Archives/Public/xmlencryption/1

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huh, EN., Jeong, JY., Kim, YS., Mun, KY. (2005). Secure XML Aware Network Design and Performance Analysis. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_33

Download citation

  • DOI: https://doi.org/10.1007/11424758_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25860-5

  • Online ISBN: 978-3-540-32043-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics