Author:
Idris Muhammad,Syarif Iwan,Winarno Idris
Abstract
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple application innovations. However, this trend also comes with a different surface of security problems that can harm not only web applications, but also mobile and IoT applications. This research proposed a web application security education platform which is focused on the OWASP API security project. This platform provides different security risks such as excessive data exposure, lack of resources and rate-limiting, mass assignment, and improper asset management which cannot be found in monolithic security learning application like DVWA, WebGoat, and Multillidae II. The development also applies several methodologies such as Capture-The-Flag (CTF) learning model, vulnerability assessment, and container virtualization. Based on our experiment, we are successfully providing 10 API vulnerability challenges to the platform with 3 different levels of severity risk rating which can be exploited using tools like Burp Suite, SQLMap, and JWTCat. In the end, based on our performance experiment, all of the containers on the platform can be deployed in approximately 16 seconds with minimum storage resource and able to serve up to 1000 concurrent users with the average throughput of 50.58 requests per second, 96.35% successful requests, and 15.94s response time.
Publisher
EMITTER International Journal of Engineering Technology
Reference26 articles.
1. 2021 State of the API Report [Internet], Postman, 2021 [cited 23 March 2022], Available from: https://www.postman.com/state-of-api/.
2. API Security Trends [Internet], Salt.security, 2021 [cited 23 November 2021], Available from: https://salt.security/api-security-trends.
3. Hussain F, Hussain R, Noye B, Sharieh S. Enterprise API Security, and GDPR Compliance: Design and Implementation Perspective. IT Professional, vol. 22, no. 5, pp. 81-89, 2020.
4. UU No. 19 Tahun 2016 [Internet], Kominfo, 2022 [cited 23 March 2022], Available from: https://web.kominfo.go.id.
5. Conte de Leon D, Goes CE, Haney MA, Krings AW. Adles: Specifying, deploying, and sharing hands-on cyber-exercises. Computers & Security, vol. 74, pp. 12–40, 2018.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献