Vulnerability Testing of RESTful APIs Against Application Layer DDoS Attacks
Đã lưu trong:
| Xuất bản năm: | International Journal of Advanced Computer Science and Applications vol. 16, no. 3 (2025) |
|---|---|
| Tác giả chính: | |
| Được phát hành: |
Science and Information (SAI) Organization Limited
|
| Những chủ đề: | |
| Truy cập trực tuyến: | Citation/Abstract Full Text - PDF |
| Các nhãn: |
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3192357878 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2158-107X | ||
| 022 | |a 2156-5570 | ||
| 024 | 7 | |a 10.14569/IJACSA.2025.01603110 |2 doi | |
| 035 | |a 3192357878 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 100 | 1 | |a PDF | |
| 245 | 1 | |a Vulnerability Testing of RESTful APIs Against Application Layer DDoS Attacks | |
| 260 | |b Science and Information (SAI) Organization Limited |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a In recent years, modern mobile, web applications are shifting from monolithic application to microservice based application because of the issues such as scalability and ease of maintenance.These services are exposed to the clients through Application programming interface (API). APIs are built, integrated and deployed quickly.The very nature of APIs directly interact with backend server, the security is paramount important for CAP. Denial of service attacks are more serious attack which denies service to legitimate request. Rate limiting policies are used to stop the API DoS attacks. But by passing rate limit or flooding attack overload the backend server. Even sophisticated attack using http/2 multiplexing with multiple clients leads severe disruptions of service. This research shows that how sophisticated multi client attack on high workload end point leads to a dos attack. | |
| 653 | |a Multiplexing | ||
| 653 | |a Application programming interface | ||
| 653 | |a Denial of service attacks | ||
| 653 | |a Clients | ||
| 653 | |a Servers | ||
| 653 | |a Applications programs | ||
| 653 | |a Customer services | ||
| 653 | |a Software | ||
| 653 | |a Data integrity | ||
| 653 | |a Consumers | ||
| 653 | |a Computer science | ||
| 653 | |a Public safety | ||
| 653 | |a Intellectual property | ||
| 653 | |a Ratings & rankings | ||
| 653 | |a Internet service providers | ||
| 653 | |a Access control | ||
| 773 | 0 | |t International Journal of Advanced Computer Science and Applications |g vol. 16, no. 3 (2025) | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3192357878/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3192357878/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |