II
§ 4.3.3 SOAP 消息过度加密分析 ..................................................................... 29
§ 4.3.4 创建服务端检测算法 ............................................................................31
§ 4.3.5 配置服务端策略 ....................................................................................32
§ 4.3.6 实验结果及分析 ....................................................................................33
§ 4.4 用UsernameToken 实现对 Body 过度加密过程 ...........................................34
§ 4.4.1 实现自定义的用户名令牌管理器 ........................................................34
§ 4.4.2 客户端过度加密攻击的实现 ................................................................34
§ 4.4.3 配置客户端策略 ....................................................................................35
§ 4.4.4 SOAP 消息过度加密分析 ..................................................................... 35
§ 4.4.5 创建服务端检测算法 ............................................................................37
§ 4.4.6 配置服务器端策略 ................................................................................37
§ 4.4.7 实验结果及分析 ....................................................................................37
第五章 SOAP Header 过度加密攻击预防检测的设计与实现 ................................... 39
§ 5.1 基于 Header 的过度加密攻击场景 ................................................................ 39
§ 5.2 实验准备 ..........................................................................................................40
§ 5.3 用X.509 证书实现对 Header 过度加密 ........................................................ 41
§ 5.3.1 客户端过度加密攻击的实现 ................................................................41
§ 5.3.2 配置客户端策略 ....................................................................................43
§ 5.3.3 SOAP 消息过度加密分析 ..................................................................... 43
§ 5.3.4 创建服务器端检测算法 ........................................................................45
§ 5.3.5 配置服务器端策略 ................................................................................45
§ 5.3.6 实验结果及分析 .....................................................................................45
§ 5.4 用UsernameToken 实现对 Header 过度加密 ................................................46
§ 5.4.1 实现自定义的用户名令牌管理器 .........................................................46
§ 5.4.2 客户端过度加密攻击的实现 ................................................................46
§ 5.4.3 配置客户端策略 ....................................................................................47
§ 5.4.4 SOAP 消息过度加密分析 ..................................................................... 47
§ 5.4.5 创建服务端检测算法 ............................................................................49
§ 5.4.6 配置服务端策略 ....................................................................................49
§ 5.4.7 实验结果及分析 ....................................................................................50
第六章 总结与展望 .......................................................................................................51
§ 6.1 总结 .................................................................................................................51
§ 6.2 展望 .................................................................................................................52