A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation

  • Authors:
  • Jinfu Chen;Qing Li;Chengying Mao;Dave Towey;Yongzhao Zhan;Huanhuan Wang

  • Affiliations:
  • School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, China 212013;School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, China 212013;School of Software and Communication Engineering, Jiangxi University of Finance and Economics, Nanchang, China 330013;BNU-HKBU: United International College, Zhuhai, China 519085;School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, China 212013;School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, China 212013

  • Venue:
  • Service Oriented Computing and Applications
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

The testing of Web services is an essential aspect of their quality assurance, however, because this testing often involves injecting only one mutant at one time, some vulnerability faults cannot be detected. To address this, the current paper presents a set of mutation operators that can be combined and defines the corresponding combinatorial strategies based on data perturbation and combinatorial testing. Based on this, multiple mutants can be injected at one time to help uncover interactive faults. To improve testing efficiency and effectiveness, a combinatorial testing approach focusing on Web service vulnerability is proposed: Firstly, initial test data are generated with perturbation techniques based on Web Services Description Language documents and Simple Object Access Protocol messages. Then, a combinatorial testing cases generation (CTCG) algorithm is used to generate the final combinatorial test data according to the proposed strategies. Furthermore, for some special Web services in which there is only one parameter or one method in service interface, a fuzzy mutation approach algorithm, as a complementary approach to CTCG, is also proposed. Finally, some testing experiments are conducted to verify the effectiveness of the proposed approaches in an integrated testing platform. The experiments show that proposed approaches are both feasible and effective: They can find more vulnerability faults than the traditional approaches.