Web API安全漏洞和缓解机制:系统映射研究

Josué Alejandro Díaz-Rojas, J. O. Ocharán-Hernández, J. C. Pérez-Arriaga, X. Limón
{"title":"Web API安全漏洞和缓解机制:系统映射研究","authors":"Josué Alejandro Díaz-Rojas, J. O. Ocharán-Hernández, J. C. Pérez-Arriaga, X. Limón","doi":"10.1109/CONISOFT52520.2021.00036","DOIUrl":null,"url":null,"abstract":"The growth of the web over the last couple of decades opened the door for the creation of an increasing number of web-based software systems. This change brought the need for new software solutions to establish communication between distributed software entities. One of the adopted solutions was web APIs; however, their appearance brought with itself new challenges that need to be solved. Among these new challenges, we find the necessity to protect the API at a design level from attacks by malicious users, in other words, making the API secure by design. This task is not trivial, and to be able to perform it effectively, it is necessary to know the vulnerabilities which APIs are commonly exposed to, alongside the mechanisms which exist to defend against them. The objective of this systematic mapping study is to gather the existing scientific knowledge about security threats that a web API faces, alongside design-level mechanisms for detecting, resisting, reacting, and recovering from attacks. Our results discovered 66 threats described in the literature. We observed that the most reported threats are those related to Spoofing and Tampering, both mostly related to the network traffic the API interacts with. In contrast, the least reported threats are those related to repudiation. We identified 21 techniques, 11 patterns and 34 methods that can be employed at a design level to detect, resist, react to or recover from these threats.","PeriodicalId":380632,"journal":{"name":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Web API Security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study\",\"authors\":\"Josué Alejandro Díaz-Rojas, J. O. Ocharán-Hernández, J. C. Pérez-Arriaga, X. Limón\",\"doi\":\"10.1109/CONISOFT52520.2021.00036\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The growth of the web over the last couple of decades opened the door for the creation of an increasing number of web-based software systems. This change brought the need for new software solutions to establish communication between distributed software entities. One of the adopted solutions was web APIs; however, their appearance brought with itself new challenges that need to be solved. Among these new challenges, we find the necessity to protect the API at a design level from attacks by malicious users, in other words, making the API secure by design. This task is not trivial, and to be able to perform it effectively, it is necessary to know the vulnerabilities which APIs are commonly exposed to, alongside the mechanisms which exist to defend against them. The objective of this systematic mapping study is to gather the existing scientific knowledge about security threats that a web API faces, alongside design-level mechanisms for detecting, resisting, reacting, and recovering from attacks. Our results discovered 66 threats described in the literature. We observed that the most reported threats are those related to Spoofing and Tampering, both mostly related to the network traffic the API interacts with. In contrast, the least reported threats are those related to repudiation. We identified 21 techniques, 11 patterns and 34 methods that can be employed at a design level to detect, resist, react to or recover from these threats.\",\"PeriodicalId\":380632,\"journal\":{\"name\":\"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONISOFT52520.2021.00036\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONISOFT52520.2021.00036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的几十年里,网络的发展为创建越来越多的基于网络的软件系统打开了大门。这种变化需要新的软件解决方案来建立分布式软件实体之间的通信。采用的解决方案之一是web api;然而,它们的出现也带来了需要解决的新挑战。在这些新的挑战中,我们发现有必要在设计级别保护API免受恶意用户的攻击,换句话说,通过设计使API安全。这项任务不是微不足道的,为了能够有效地执行它,有必要了解api通常暴露的漏洞,以及现有的防御机制。这个系统映射研究的目的是收集现有的关于web API面临的安全威胁的科学知识,以及用于检测、抵抗、反应和从攻击中恢复的设计级机制。我们的结果发现了文献中描述的66种威胁。我们观察到,报告最多的威胁是与欺骗和篡改有关的威胁,这两种威胁主要与API交互的网络流量有关。相比之下,报道最少的威胁是那些与拒绝有关的威胁。我们确定了21种技术、11种模式和34种方法,可以在设计层面上用于检测、抵抗、应对或从这些威胁中恢复。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Web API Security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study
The growth of the web over the last couple of decades opened the door for the creation of an increasing number of web-based software systems. This change brought the need for new software solutions to establish communication between distributed software entities. One of the adopted solutions was web APIs; however, their appearance brought with itself new challenges that need to be solved. Among these new challenges, we find the necessity to protect the API at a design level from attacks by malicious users, in other words, making the API secure by design. This task is not trivial, and to be able to perform it effectively, it is necessary to know the vulnerabilities which APIs are commonly exposed to, alongside the mechanisms which exist to defend against them. The objective of this systematic mapping study is to gather the existing scientific knowledge about security threats that a web API faces, alongside design-level mechanisms for detecting, resisting, reacting, and recovering from attacks. Our results discovered 66 threats described in the literature. We observed that the most reported threats are those related to Spoofing and Tampering, both mostly related to the network traffic the API interacts with. In contrast, the least reported threats are those related to repudiation. We identified 21 techniques, 11 patterns and 34 methods that can be employed at a design level to detect, resist, react to or recover from these threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Scrumlity: An Agile Framework Based on Quality Assurance Information Visualization In Adaptable Dashboards For Smart Cities: A Systematic Review Microservices Deployment: A Systematic Mapping Study Automatic Grading of Programming Assignments in Moodle Software Design and Artificial Intelligence: A Systematic Mapping Study
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1