Web API Security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study

被引:3
|
作者
Alejandro Diaz-Rojas, Josue [1 ]
Octavio Ocharan-Hernandez, Jorge [1 ]
Carlos Perez-Arriaga, Juan [1 ]
Limon, Xavier [1 ]
机构
[1] Univ Veracruzana, Sch Stat & Informat, Xalapa, Veracruz, Mexico
关键词
Web API design; Security; Web API; API security; Systematic mapping study;
D O I
10.1109/CONISOFT52520.2021.00036
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The growth of the web over the last couple of decades opened the door for the creation of an increasing number of web-based software systems. This change brought the need for new software solutions to establish communication between distributed software entities. One of the adopted solutions was web APIs; however, their appearance brought with itself new challenges that need to be solved. Among these new challenges, we find the necessity to protect the API at a design level from attacks by malicious users, in other words, making the API secure by design. This task is not trivial, and to be able to perform it effectively, it is necessary to know the vulnerabilities which APIs are commonly exposed to, alongside the mechanisms which exist to defend against them. The objective of this systematic mapping study is to gather the existing scientific knowledge about security threats that a web API faces, alongside design-level mechanisms for detecting, resisting, reacting, and recovering from attacks. Our results discovered 66 threats described in the literature. We observed that the most reported threats are those related to Spoofing and Tampering, both mostly related to the network traffic the API interacts with. In contrast, the least reported threats are those related to repudiation. We identified 21 techniques, 11 patterns and 34 methods that can be employed at a design level to detect, resist, react to or recover from these threats.
引用
收藏
页码:207 / 218
页数:12
相关论文
共 50 条
  • [1] Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study
    Rafique, Sajjad
    Humayun, Mamoona
    Hamid, Bushra
    Abbas, Ansar
    Akhtar, Muhammad
    Iqbal, Kamil
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 469 - 474
  • [2] Web API Usability: A Systematic Mapping Study
    Machini, Ariel
    Casas, Sandra
    INTERACTING WITH COMPUTERS, 2024,
  • [3] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [4] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Mamoona Humayun
    Mahmood Niazi
    NZ Jhanjhi
    Mohammad Alshayeb
    Sajjad Mahmood
    Arabian Journal for Science and Engineering, 2020, 45 : 3171 - 3189
  • [5] Advances in Web API testing: A Systematic Mapping Study
    Capistran Garcia, Josue
    Ocharan Hernandez, Jorge Octavio
    Perez Arriaga, Juan Carlos
    Limon Riano, Hector Javier
    2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [6] Mapping Software Faults with Web Security Vulnerabilities
    Fonseca, Jose
    Vieira, Marco
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 257 - +
  • [7] A STUDY OF THE LANDSCAPE OF SECURITY ISSUES, VULNERABILITIES, AND DEFENSE MECHANISMS IN WEB BASED APPLICATIONS
    Rahimi, Nick
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 806 - 811
  • [8] LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
    Hessel, Frank
    Almon, Lars
    Hollick, Matthias
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [9] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [10] A Taxonomy of Web Security Vulnerabilities
    Al-Kahla, Wafaa
    Shatnawi, Ahmed S.
    Taqieddin, Eyad
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 424 - 429