Open Access Open Access  Restricted Access Subscription or Fee Access

A Multi-Layer Architecture for Intrusion Tolerant Web Services

P. C. Shende


Web services as basic building blocks for next generation distributed systems, play a crucial role in these days enterprise application architectures. The flexibleness and openness of the net services computing model will expose company information and business processes to security risks. To support vital applications, the present net service models got to be extended to assure survivability. During this paper we have a tendency to gift a multi-layer design for intrusion tolerant net services. The precise goal of the design is to use single version code fault tolerance ideas just in case of malicious failures. We are going to additionally gift a colored Petri internet model that is employed for the formal analysis of the planned design.

Keywords: Web services, intrusion tolerant, multi-layer design

Cite this Article
Shende PC. A Multi-layer Architecture for Intrusion Tolerant Web Services. Journal of Advancements in Robotics. 2015; 2(2): 33–39p.

Full Text:



Stavridou V, et al. Intrusion Tolerant Software Architectures. DARPA Information Survivability Conference and Exposition (DISCEX II'01). 2001; II: 230–241p.

Reynolds J, et al. The Design and Implementation of an Intrusion Tolerant System. Proceedings of the 2002 International Conference on Dependable Systems and Networks. 2001; 285–290p.

Cerami E. Web Service Essentials. O'Reilly. 2002.

Liu P. Architectures for Intrusion Tolerant Database Systems. 18th Annual Computer Security Applications Conference. 2002; 311–320p.

Ferraz R, et al. An Intrusion-Tolerant Web Server based on the DISTRACT Architecture. Workshop on Dependable Distributed Data Management, Brazil. 2004; 45–50p.

Herder JN, et al. Construction of a Highly Dependable Operating System. Sixth European Dependable Computing Conference (EDCC). 2006; 3–12p.

Huang Y, Sood A. Incorruptible System Self-Cleansing for Intrusion Tolerance. Performance, Computing, and Communications Conference. 2006; 4p.

Dubrova E. Fault-Tolerant Design: An Introduction. Kluwer Academic Publishers. 2008. (Draft)

Gruschka N, Luttenberger N. Protecting Web Services From DoS Attacks by SOAP Message Validation. IFIP International Federation for Information Processing, Springer Boston. 2006; 201: 171–182p.

Veríssimo P, Neves N, Pupo Correia M. Intrusion-Tolerant Architectures: Concepts and Design. Lect Notes Comput Sci. 2003; 2677: 3–36p.

Xu J, Lee W. Sustaining Availability of Web Services under Distributed Denial of Service Attacks. IEEE Trans Comput. 2003; 52(2): 195–208p.

Wang J. Defending Against Denial of Web Services Using Sessions. IEEE/IST Workshop on Monitoring, Attacking Detection and Mitigation. 2006; 32–37p.

Wu YS, et al. Automated Adaptive Intrusion Containment in Systems of Interacting Services. Computer Networks. 2007; 1334–1360p.

Jensen K. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, Basic Concepts. EATCS Monographs in Theoretical Computer Science, Springer. 1992.

Jensen K. An Introduction to the Theoretical Aspects of Coloured Petri Nets. Lect Notes Comput Sci., No. 803, Springer. 1994; 230–272p.

CPN Tools. CPN Group, University of Aarhus, Denmark. URL:

Shi Y, Zhang L, Shi B. Exception Handling of Workflow for Web Services. Proceeding of the Fourth International Conference on Computer and Information Technology. 2004; 273–277p.


  • There are currently no refbacks.

This site has been shifted to