Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 6. SOA Security > Vulnerability Scanning and Intrusion Detection

Vulnerability Scanning and Intrusion Detection

SOA increases the number of access points for enterprise systems, and many of these access points are exposed to the public Internet. XML technology provides a common target for identification of vulnerabilities by potential intruders. The widespread use of popular middleware products, XML appliances, and XML processing algorithms all increase the risk of exposure by enabling intruders to exploit vulnerabilities in those products. Of course, critical business transactions provide a very appealing target to intruders.

For requests from known requesters, strong authentication and accountability mechanisms provide a deterrent. In addition, a new class of product has emerged: XML hardware in the form of a firewall or appliance. These are hardware products that scan XML messages for known problems essentially equivalent to the scanning of email messages for viruses. The XML firewall extends traditional firewall capabilities to address these XML concerns. By implementing these capabilities in hardware, the performance impact can be minimized.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint