API Common Security Threats and Security Protection Strategies
DOI:
https://doi.org/10.54097/k5djs164Keywords:
API Security, Security Protection Strategy, OAuth/JWT Authentication, HTTPS/TLS ProtocolsAbstract
This study analyzes the core role of APIs in modern digital ecology and the security threats they face, such as information leakage and overstepping access, and explores their security risks for technologies such as RESTful and GraphQL. It proposes to use OAuth/JWT authentication mechanism to strengthen access control, adopt HTTPS/TLS to secure data transmission, and combine with API gateway to defend against DDoS attacks. It also emphasizes the importance of fine-grained privilege management and log auditing. The study provides strategic guidance for improving API security protection and looks forward to the trend of intelligent protection.
Downloads
References
[1] Hu Hongyu. Application of cloud WAF in hospital critical web service and API protection[J]. Network Security Technology and Application, 2024, (09):137-139.
[2] Huang Jian. Implementation and research of API application security in software development environment[J]. Post and Telecommunications Design Technology, 2024, (08):39-43.
[3] YAN Jiwei, HUANG Jinhao, YANG Hengqin,et al. Anomaly-sensitive framework API lifecycle model construction [J/OL]. Journal of Computing,1-21[2024-09-18].http://kns. cnki. net/ kcms/ detail/11.1826. TP.20240626.0922.002.html.
[4] B. Luo, C. Guo,G. W. Shen,et al. A ransomware early detection method based on API latent semantics[J]. Electronic Journal, 2024, 52(04):1288-1295.
[5] Wang Lei. Design and realization of enterprise application integration system based on API gateway[D]. Guangzhou University, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Frontiers in Computing and Intelligent Systems
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.