This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP WS Amplification DoS Project"

From OWASP
Jump to: navigation, search
(Created page with "{{Template:Project About | project_name =OWASP WS Amplification DoS Project | project_home_page =OWASP WS Amplification DoS Project | project_description =The project aims to ...")
 
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
 
| project_home_page =OWASP WS Amplification DoS Project
 
| project_home_page =OWASP WS Amplification DoS Project
 
| project_description =The project aims to explore the threat of an Amplification DoS attack that utilises webservices.
 
| project_description =The project aims to explore the threat of an Amplification DoS attack that utilises webservices.
Currently, DNS servers are widely misused to amplify DoS traffic. This is called a DNS Amplification or Reflective attack. Read more about it in this article: http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack.
+
Currently, DNS servers are widely misused to amplify DoS traffic. This is called a [http://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack DNS Amplification or Reflective attack].  
It appears that SOAP webservices that implement WS-Addressing might be vulnerable to similar abuse. (http://www.fim.uni-passau.de/fileadmin/files/lehrstuhl/meer/publications/pdf/Jensen2009a.pdf)
+
It appears that SOAP webservices that implement WS-Addressing might be vulnerable to similar abuse, as stated in this [http://www.fim.uni-passau.de/fileadmin/files/lehrstuhl/meer/publications/pdf/Jensen2009a.pdf paper]
 
The aim of the project is to develop tools to test this vulnerability and determine the threat magnitude on a global scale.
 
The aim of the project is to develop tools to test this vulnerability and determine the threat magnitude on a global scale.
 
If necessary, a publication involving awareness and countermeasures will follow.
 
If necessary, a publication involving awareness and countermeasures will follow.
Line 11: Line 11:
 
| leader_name1 =Thomas Vissers
 
| leader_name1 =Thomas Vissers
 
| leader_email1 [email protected]  
 
| leader_email1 [email protected]  
 +
| leader_username1 = Thomas Vissers
 
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_ws_amplification_dos_project
 
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_ws_amplification_dos_project
 
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_WS_Amplification_DoS_Project/Roadmap
 
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_WS_Amplification_DoS_Project/Roadmap
 
}}
 
}}

Latest revision as of 15:09, 23 May 2013

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP WS Amplification DoS Project (home page)
Purpose: The project aims to explore the threat of an Amplification DoS attack that utilises webservices.

Currently, DNS servers are widely misused to amplify DoS traffic. This is called a DNS Amplification or Reflective attack. It appears that SOAP webservices that implement WS-Addressing might be vulnerable to similar abuse, as stated in this paper The aim of the project is to develop tools to test this vulnerability and determine the threat magnitude on a global scale. If necessary, a publication involving awareness and countermeasures will follow.

License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases