US20180324208A1 - System and method for identifying and preventing malicious api attacks - Google Patents
System and method for identifying and preventing malicious api attacks Download PDFInfo
- Publication number
- US20180324208A1 US20180324208A1 US15/821,124 US201715821124A US2018324208A1 US 20180324208 A1 US20180324208 A1 US 20180324208A1 US 201715821124 A US201715821124 A US 201715821124A US 2018324208 A1 US2018324208 A1 US 2018324208A1
- Authority
- US
- United States
- Prior art keywords
- api
- characteristic data
- processor
- server
- data points
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H04L67/36—
-
- H04L67/42—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/75—Indicating network or usage conditions on the user display
Definitions
- the present invention is in the field of cyber-security.
- the present invention is directed to systems and methods for identifying and preventing malicious application programming interface (API) attacks.
- API application programming interface
- API application programming interface
- client a client device
- server a server device
- API calls are typically sent back and forth between a client and a server in the form of requests (from the client device) and responses (from the server devices).
- API architectures e.g., RESTful, SOAP, XML-RPC, etc.
- Public APIs available to developers
- Private APIs unavailable to developers
- Internal APIs third party APIs
- third party APIs may relate to any number of specific applications such as, for example, mobile applications, web application, internet-of-things (IOT) applications and technologies, etc.
- APIs may also be configured for a variety of common data protocols (e.g., (JSON, XML, YAML, etc.), over a variety of communication protocols (Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, WebSocket, etc.). With so many variables, each unique API will have its own unique vulnerabilities to attack by hackers, etc.
- APIs are vulnerable to advanced persistent threat (APT) attacks, zero day attacks, and other similar attacks which look to exploit the vulnerabilities of a company's API.
- APIT advanced persistent threat
- developers put limited attention to security, and continued development of an API requires careful review of implemented legacy security systems and either updates for security assurance or using the developer's own code for security assurance and validity.
- the current state of the art creates opportunities for exploiting vulnerabilities and enhances security challenges.
- An embodiment of the invention includes a method for identifying and preventing malicious application programming interface (API) attacks in a client-server architecture.
- the method may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor.
- the method may include, during a learning stage: monitoring all requests sent to a server API, and all responses sent from the server API; identifying one or more first characteristic data points of each request and response sent during the learning stage; and determining, based at least in part on the identified one or more first characteristic data points, one or more characteristic data models, wherein a characteristic data model represents at least one of an expected input to the API and an expected output of the API; and, during a protection stage, monitoring all requests sent to the server API, and all responses sent from the server API, identifying one or more second characteristic data points of each request and response sent during the protection stage, and one of validating and invalidating, by the processor, the identified one or more second characteristic data points against the one or more characteristic data models.
- the method may further include passing to the server requests having no invalidated one or more second characteristic data points; and passing from the server responses having no invalidated one or more second characteristic data points. In some embodiments, the method may further include blocking to the server requests having invalidated one or more second characteristic data points; and blocking from the server responses having invalidated one or more second characteristic data points.
- the method may further include generating an alert for each request having invalidated one or more second characteristic data points; and generating and alert for each response having invalidated one or more second characteristic data points.
- the method may further include generating an alert timeline, wherein the alert timeline represents a selection of one or more aggregations of alerts, the alerts in each of the one or more aggregations having a predefined similarity, the one or more aggregations being organized in a predefined order; and displaying the alert timeline on a visual display.
- the method may further include generating one or more attacker profiles based at least in part on the validating step; determining one or more suspicion scores for each attacker profile; and identifying one or more suspicious profiles based at least in part on respective suspicion scores, wherein all future requests and responses related to an identified suspicious profile are flagged with an alert irrespective of validity.
- the method may further include updating the one or more characteristic data models based at least in part on the identified one or more second characteristic data points of each request and response sent during the protection stage.
- the server API is one of a RESTful API, a SOAP API, an XML-RPC API, and a WSDL API.
- the method may further include generating documentation comprising information reflecting a complete structure of the server API.
- a system may be provided which may implement the methods described herein according to embodiments of the invention.
- FIG. 1 is a high level diagram illustrating an example configuration of a system for identifying and preventing malicious API attacks according to at least one embodiment of the invention
- FIG. 2 is a block diagram illustrating a data flow between key components of a first part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention
- FIG. 3 is a flow diagram of a first part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention
- FIG. 4 is a block diagram illustrating a data flow between key components of a second part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention
- FIG. 5 is a flow diagram of a second part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention
- FIG. 6 is an example API endpoint configuration illustrated according to at least one embodiment of the invention.
- FIG. 7 is an example API overview configuration illustrated according to at least one embodiment of the invention.
- FIG. 8 is an example attacker/alert timeline generated according to at least one embodiment of the invention.
- FIG. 9 is an example visual attacker list generated according to at least one embodiment of the invention.
- FIG. 10 is an example visual API call tracker generated according to at least one embodiment of the invention.
- the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”.
- the terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like.
- the term set when used herein may include one or more items.
- the method embodiments described herein are not constrained to a particular order or sequence. Additionally, some of the described method embodiments or elements thereof may occur or be performed simultaneously, at the same point in time, or concurrently.
- Some embodiments of the invention offer end to end optimizing security for APIs, i.e., from development to production and communication. Some embodiments of the invention are based on protecting applications through building a standard de facto API Secured Development Process (SDP) that inspects all communications (e.g., requests/responses) to and from the server from all client devices, via an API, and utilizes machine learning algorithms to generate approval models (application customized) of all client-server communication including fields, structures, flow, etc.
- SDP Secured Development Process
- Some embodiments of the invention offer Application Template Specific Analysis, which, in some embodiments, may lead to alerts and/or blocking of requests/responses which may contain unauthorized variations of template generated in each application.
- FIG. 1 shows a high level diagram illustrating an example configuration of a system 100 for identifying and preventing malicious API attacks, according to at least one embodiment of the invention.
- System 100 includes network 105 , which may include the Internet, one or more telephony networks, one or more network segments including local area networks (LAN) and wide area networks (WAN), one or more wireless networks, or a combination thereof.
- System 100 also includes a system server 110 constructed in accordance with one or more embodiments of the invention.
- system server 110 may be a stand-alone computer system.
- system server 110 may include a network of operatively connected computing devices, which communicate over network 105 .
- system server 110 may include multiple other processing machines such as computers, and more specifically, stationary devices, mobile devices, terminals, and/or computer servers (collectively, “computing devices”). Communication with these computing devices may be, for example, direct or indirect through further machines that are accessible to the network 105 .
- System server 110 may be any suitable computing device and/or data processing apparatus capable of communicating with computing devices, other remote devices or computing networks, receiving, transmitting and storing electronic information and processing requests as further described herein.
- System server 110 is, therefore, intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers and/or networked or cloud based computing systems capable of employing the systems and methods described herein.
- System server 110 may include a server processor 115 which is operatively connected to various hardware and software components that serve to enable operation of the system 100 .
- Server processor 115 serves to execute instructions to perform various operations relating to API security, and other functions of embodiments of the invention as will be described in greater detail below.
- Server processor 115 may be one or a number of processors, a central processing unit (CPU), a graphics processing unit (GPU), a multi-processor core, or any other type of processor, depending on the particular implementation.
- System server 110 may be configured to communicate via communication interface 120 with various other devices connected to network 105 .
- communication interface 120 may include but is not limited to, a modem, a Network Interface Card (NIC), an integrated network interface, a radio frequency transmitter/receiver (e.g., Bluetooth wireless connection, cellular, Near-Field Communication (NFC) protocol, a satellite communication transmitter/receiver, an infrared port, a USB connection, and/or any other such interfaces for connecting the system server 110 to other computing devices and/or communication networks such as private networks and the Internet.
- NIC Network Interface Card
- NFC Near-Field Communication
- a server memory 125 is accessible by server processor 115 , thereby enabling server processor 115 to receive and execute instructions such a code, stored in the memory and/or storage in the form of one or more software modules 130 , each module representing one or more code sets.
- the software modules 130 may include one or more software programs or applications (collectively referred to as the “server application”) having computer program code or a set of instructions executed partially or entirely in server processor 115 for carrying out operations for aspects of the systems and methods disclosed herein, and may be written in any combination of one or more programming languages.
- Server processor 115 may be configured to carry out embodiments of the present invention by for example executing code or software, and may be or may execute the functionality of the modules as described herein.
- the exemplary software modules may include a communication module 135 , an API module 140 , a parser module 141 , a real-time learner module 142 , a learning models engine module 143 , a validator module 144 , and an attacker profile module 145 .
- Communication module 135 may be executed by server processor 115 to facilitate communication between system server 110 and the various software and hardware components of system 100 , such as, for example, server database 150 and/or client device 155 as described herein.
- API module 140 as described in detail herein, may be executed by server processor 115 to implement the various functions of the API.
- the API may reside on and/or be implemented by a remote or otherwise separate server entirely.
- Parser module 141 may be executed by server processor 115 to parse large amounts and/or strings of data from API calls (e.g., requests from a client device and/or responses from a server device) into manageable data elements.
- Real-time learner module 142 may be executed by server processor 115 to identify characteristic data points or features within the data of individual requests/responses, as described herein.
- Learning models engine module 143 may be executed by server processor 115 to determine (and update) characteristic data models, as described herein.
- Validator module 144 may be executed by server processor 115 to validate/invalidate API requests/responses, as described herein.
- attacker profiling module 145 may be executed by server processor 115 to identify suspicious/malicious profiles attempting to communicate with the API, as described herein.
- server modules 130 may be executed entirely on system server 110 as a stand-alone software package, partly on system server 110 and partly on client device 155 , entirely on client device 155 , partly on system server 110 and partly on third-party server 190 , or entirely on third-party server 190 .
- Server memory 125 may be, for example, a random access memory (RAM) or any other suitable volatile or non-volatile computer readable storage medium. Server memory 125 may also include storage which may take various forms, depending on the particular implementation. For example, the storage may contain one or more components or devices such as a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above. In addition, the memory and/or storage may be fixed or removable. In addition, memory and/or storage may be local to the system server 110 or located remotely.
- RAM random access memory
- Server memory 125 may also include storage which may take various forms, depending on the particular implementation.
- the storage may contain one or more components or devices such as a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above.
- the memory and/or storage may be fixed or removable.
- memory and/or storage may be local to the system server 110
- system server 110 may be connected to one or more database(s) 150 , for example, directly or remotely via network 105 .
- Database 150 may include any of the memory configurations as described above, and may be in direct or indirect communication with system server 110 .
- database 150 stores the results/outputs of various modules, as described herein, and can represent a plurality of separate databases and/or partitions in a single database.
- Client device 155 may be any standard computing device.
- a computing device may be a stationary computing device, such as a desktop computer, kiosk and/or other machine, each of which generally has one or more processors, such as client processor 160 , configured to execute code to implement a variety of functions, a computer-readable memory, such as client memory 165 , a client communication interface 170 , for connecting to the network 105 , one or more client modules, such as integration client module 175 , one or more input devices, such as input devices 180 , and one or more output devices, such as output devices 185 .
- Typical input devices such as, for example, input devices 185 , may include a keyboard, pointing device (e.g., mouse or digitized stylus), a web-camera, and/or a touch-sensitive display, etc.
- Typical output devices such as, for example output device 185 may include one or more of a monitor, display, speaker, printer, etc.
- integration client module 175 may be executed by client processor 160 to provide the various functionalities of client device 155 .
- integration client module 175 may provide a client-side interface with which a user of client device 155 can interact, to, among other things, send requests to the API and receive results, etc.
- a computing device may be a mobile electronic device (“MED”), which is generally understood in the art as having hardware components as in the stationary device described above, and being capable of embodying the systems and/or methods described herein, but which may further include componentry such as wireless communications circuitry, gyroscopes, inertia detection circuits, geolocation circuitry, touch sensitivity, among other sensors.
- MED mobile electronic device
- Non-limiting examples of typical MEDs are smartphones, personal digital assistants, tablet computers, and the like, which may communicate over cellular and/or Wi-Fi networks or using a Bluetooth or other communication protocol.
- Typical input devices associated with conventional MEDs include, keyboards, microphones, accelerometers, touch screens, light meters, digital cameras, and the input jacks that enable attachment of further devices, etc.
- client device 155 may be a “dummy” terminal, by which processing and computing may be performed on system server 110 , and information may then be provided to client device 155 via server communication interface 120 for display and/or basic data manipulation.
- modules depicted as existing on and/or executing on one device may additionally or alternatively exist on and/or execute on another device.
- API module 140 which is depicted in FIG. 1 as existing and executing on system server 110 , may additionally or alternatively exist and/or execute on third-party server 190 .
- third-party server 190 may provide the same or similar structure and functionality as system server 110 , but may be owned, possessed, and/or operated by a third-party.
- FIG. 2 is a block diagram illustrating a data flow 200 between key components of a first part of the system for identifying and preventing malicious API attacks, according to at least one embodiment of the invention.
- FIG. 2 illustrates a data flow between parser module 141 , real-time learner 142 , learning models engine module 143 , and database 150 of FIG. 1 during a learning stage, according to some embodiments of the invention.
- Some embodiments of system 100 ( FIG. 1 ) are configured to receive all API calls (requests from clients and responses from the server), e.g., by diverting the calls through the system or otherwise providing a copy of each API call to the system.
- the type of data protocol e.g., JSON, XML, YAML, etc.
- the type of communication protocol e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, WebSocket, etc.
- the type of application mobile application, web application, internet of things (IOT) application, etc.
- the network architecture e.g., Public API, Private API, Internal API, third-party API, etc., the data transmitted in an API call can take a variety of different forms, and can have a variety of different types of information.
- the API is typically structured using a plurality of Uniform Resource Locators (URLs) in which the objects are endpoints, including the URL parameters or “methods” allowed per end point, e.g., GET, PUT, POST, AND/OR DELETE.
- URLs Uniform Resource Locators
- GET is used to retrieve data
- PUT is commonly used to update/replace an object
- POST is used to create a new instance of an object
- DELETE is used to delete and object.
- API endpoint configuration 600 includes API call 605 , URL parameters 610 , and endpoints 615 .
- FIG. 6 also shows the expected inputs (and/or outputs) 620 for each object (also referred to herein as characteristic data models) as determined according to some embodiments of the invention.
- FIG. 7 shows an overview visual in which a plurality of API URL endpoints 705 , each with their associated URL parameters 710 , is displayed.
- system 100 may include parser module 141 , which is configured to parse the data strings representing the requests/responses into consumable segments of information.
- parser module 141 may further include communication protocol parser 205 , data protocol parser 210 , and fields parser 215 .
- communication protocol parser 205 may further include communication protocol parser 205 , data protocol parser 210 , and fields parser 215 .
- additional/other parsers may also/alternatively be implemented depending on the particular API and data being communicated.
- communication protocol parser 205 may parse or otherwise identify the particular communication protocol (e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.), data protocol parser 210 may parse or otherwise identify the particular data protocol (e.g., JSON, XML, YAML, etc.), and fields parser 215 may parse or otherwise identify particular fields, attributes, property names, and/or values, etc.
- the particular communication protocol e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.
- data protocol parser 210 may parse or otherwise identify the particular data protocol (e.g., JSON, XML, YAML, etc.)
- fields parser 215 may parse or otherwise identify particular fields, attributes, property names, and/or values, etc.
- System 100 may further include real-time learner module 142 , which in some embodiments may be configured to receive data that has been parsed by parser module 141 .
- Information can be passed from parser module 141 to real-time learner module 142 which is configured to analyze each individual request/response and learn or otherwise identify the composition of that request/response.
- real-time learner module 142 may be configured to save the raw learned data about each request or response, e.g., to a raw learned data database 220 of database 150 .
- call 605 FIG. 6
- the real-time learner module 142 may, for example, identify and record that for this call the response was a two-digit integer. This same data point may be parsed from tens of thousands of calls and then the results can be analyzed, e.g., by learning models engine module 143 , along with many other relevant data points, in order to determine one or more characteristic data models (expected input/output) for a given request and/or response.
- system 100 may include learning models engine module 143 , which may contain one or more sub-modules for implementing various types of learning functions and analyses, in order to determine one or more characteristic data models (e.g., expected input/output/structure, etc.) for a given request and/or response.
- learning models engine module 143 may contain flow learning 225 , structure learning 230 , fields learning 235 , wisdom of crowds 240 , behavior learning 245 , and/or relation learning 250 .
- flow learning 225 may be configured to recognize the order and/or sequence in which data is expected to be provided to the API.
- the expected sequence may be, for example, as follows: 1. user's first name (e.g., between three and twenty characters, alphabetic characters only, with a capital first letter); 2. user's last name (e.g., between three and twenty characters, alphabetic characters only, with a capital first letter); 3. e-mail address (standard e-mail format, e.g., john.doe@domain.com); 4.
- flow learning 225 can learn the expected sequence by seeing the same sequence/pattern repeated again and again, and determine a characteristic data model representing this flow to be used in evaluating future data.
- structure learning 230 may be configured to recognize various specific and/or unique data structures which are expected to be seen in given API call. For example, in embodiments where RESTful architecture communication is implemented, structure learning 230 may be configured to analyze and inspect Uniform Resource Identifier (URI) structure, MIME type covering all types, method (post, get, put, delete, etc.), resources (objects), a resource's representation, etc. In some embodiments, structure learning 230 may be further configured to analyze and inspect a RESTful API's modeling, such as WADL (Web Application Description Language), RAML (RESTful API Modeling Language), and RSDL (RESTful Service Description Language), etc.
- WADL Web Application Description Language
- RAML Rasterful API Modeling Language
- RSDL RESTful Service Description Language
- fields learning 235 may be configured to execute content related analysis of each field/attribute/property to identify specific data types, e.g., ID , email, phone number, name, credit card, address, website URL, file URL, media (e.g., pictures, sound, video, etc.), message content, message subject, username, password, etc.) and generic data types (text, integer, decimal, binary, enumeration types, html, css, code (JavaScript, php, asp, C, C++, python, ruby, java, etc.), files, date, time, date-time, location, SQL, byte, bit, boolean, Yes/No, currency, list, dictionary, objects, URL, URI, etc.), length, size, unique structure, encoding, encryption, order, etc.
- specific data types e.g., ID , email, phone number, name, credit card, address, website URL, file URL, media (e.g., pictures, sound, video,
- wisdom of crowds 240 may be configured to perform analysis across APIs to identify relevant characteristic data models, e.g., based on the type of API, etc.
- behavior learning 245 may be configured to perform behavior analysis, e.g., accumulated Big Data analysis based on multiple customers in real time and/or offline, etc. This may include, for example, identifying standard behaviors and protocols, in order to facilitate detection of abnormal behavior which diverts from the standard specification and/or unreasonable/malicious usage of standard specification, such as, e.g., header modification (illegal values, constants, optional/unused, length, checksum, order, etc.), illegal length range violation, timing violation, version violation, keys violation, encryption violation, source violation, handshake violation, session violation, etc.
- header modification illegal values, constants, optional/unused, length, checksum, order, etc.
- relation learning 250 may be configured to provide related analysis of time (time gaps, intervals, schedule, timing, etc.), patterns of traffic, i.e., in bandwidth, volume, size, flow, etc.
- learning models engine module 143 may analyze and inspect elements (envelope, header, body, fault and related), sender, receiver, message path, initial SOAP sender (aka originator), SOAP intermediary, ultimate SOAP receiver, etc.
- learning models engine module 143 may be configured to analyze and/or inspect any/all of the following: any structure/template/knowledge of the protocols, such as BEEP (Blocks Extensible Exchange Protocol), E-Business XML (Electronic Business using eXtensible Markup Language), Hessian, JSON-RPC, JSON-WSP, REST (Representational State Transfer), SOAP (outgrowth of XML-RPC, originally an acronym for Simple Object Access Protocol), UDDI (Universal Description, Discovery, and Integration), WPS (Web Processing Service), WSFL (Web Services Flow Language), WSCL (Web Services Conversation Language), XINS(XML Interface for Network Services), XLANG, XML-RPC, SOAP (Simple Object Access Protocol), SOAP-over-UDP, SOAP Mes sage Transmission Optimization Mechanism, WS -Notification, WS-BaseNotification, WS-Topics, WS-BrokeredNotification,
- BEEP Blocks Extensible Exchange Protocol
- learning models engine module 143 may be configured to determine and/or generate one or more characteristic data models (e.g., identified frameworks, structures, templates, profiles, rules, etc.), which may be used to detect even the slightest deviation from the expected input/output, etc. These characteristic data models may be saved, for example, in a learning models database 255 of database 150 .
- characteristic data models e.g., identified frameworks, structures, templates, profiles, rules, etc.
- FIG. 3 is a flow diagram of a first part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention.
- FIG. 3 depicts a flow diagram of a method 300 for identify API attacks during a learning stage or process, according to embodiments of the invention.
- FIG. 3 shows a learning method or process in which characteristic data models are generate from both requests and responses.
- these two learning processes may be implemented simultaneously, consecutively, randomly, periodically, in tandem, separately, etc.
- models generated from either/both processes may be stored together, separately, etc., and may inform one another and analysis of the API in general.
- one process/method may be performed to the exclusion of the other, and/or one may be given more or less weight than the other, etc.
- both processes are described simultaneously.
- method 300 may be configured to implement one or more of the elements/features/functions of system 100 , e.g., as described in detail in data flow 200 herein.
- method 300 may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor.
- method 300 begins at steps 310 A/ 310 B when the processor monitors all requests sent to a server API, and all responses sent from the server API. When a request/response is sent to/from the API, the data is provided to the processor.
- the processor may parse the data, e.g., by implementing parser module 141 .
- the processor may identify one or more characteristic data points of each request and response sent, e.g., by implementing Real-time learner module 142 .
- the processor may save the one or more characteristic data points in a database, such as, for example, raw learned data database 220 .
- the processor may then expose or provide the one or more characteristic data points to a machine learning engine for analysis such as, for example, learning models engine module 143 .
- the processor may determine/generate/build, based at least in part on the identified one or more characteristic data points, one or more characteristic data models, in which a characteristic data model may represent an expected input to the API and/or an expected output of the API. In doing so, the processor may implement, e.g., learning models engine module 143 .
- the processor may save the one or more characteristic data models in a database, such as, for example, learning models database 255 .
- steps 380 A/ 380 B if the request/response was not already passed to its destination (e.g., depending on whether or not data is held for analysis before being passed to its destination in the particular embodiment), the request/response is passed to its destination at this point (e.g., requests to the server and responses to the client), and the learning method ends.
- characteristic data models may be generated, determined, built, and/or modified in an automated process as described herein.
- the systems/methods described herein may enable a user to manually build structures/templates/profiles/models of common data protocols (JSON, XML, YAML, etc.) over communication protocols (e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.) in a variety of architecture designs (e.g., RESTful, etc.) and different protocols and/or web services such as SOAP, XML-RPC and related for validation, verification, authentication, etc.
- communication protocols e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.
- SOAP SOAP
- XML-RPC XML-RPC
- automatic approval and/or modification of existing structures/templates/profiles may be implemented.
- semi-automatic (and/or partially manual) approval and/or modification of existing structures/templates/profiles may be implemented.
- these features may be implemented for validation, verification, authentication, etc., as well.
- FIG. 4 is a block diagram illustrating a data flow 400 between key components of a second part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention.
- FIG. 4 illustrates a data flow between parser module 141 , real-time learner 142 , validator module 144 , attacker profiling module 145 , and database 150 of FIG. 1 during a protection stage, according to some embodiments of the invention.
- some embodiments of system 100 ( FIG. 1 ) are configured to receive all API calls (requests from clients and responses from the server), e.g., by diverting the calls through the system or otherwise providing a copy of each API call to the system.
- all API calls may be routed through the system so as to enable blocking of malicious call if necessary, as described herein.
- system 100 may include parser module 141 , which is configured to parse the data strings representing the requests/responses into consumable segments of information.
- System 100 may further include real-time learner module 142 , which in some embodiments may be configured to receive data that has been parsed by parser module 141 .
- Information can be passed from parser module 141 to real-time learner module 142 , which is configured to analyze each individual request/response and learn or otherwise identify the composition of that request/response.
- real-time learner module 142 may be configured to be executed both in the learning stage and in the protection stage, during specific intervals, etc.
- characteristic data points identified by the real-time learner module 142 while evaluating individual requests/response during the protection stage (as with the learning stage) may be provided to the raw learned data database 220 , and included in any/all analyses performed by learning models engine module 143 in the course of generating, determining, building, and/or updating characteristic data models, as described herein.
- new and/or updated characteristic data models can be constantly and/or periodically fed back into the system, as described herein, to be used during validation of API requests/responses.
- system 100 may further include validator module 144 , which in some embodiments may be configured to receive raw learned data from sent requests/responses (e.g., parsed data from each request and/or response) and either validate or invalidate the sent requests/responses by comparing the characteristic data points to previously determined/generated characteristic data models.
- validator module 144 may be configured to perform validation and/or protection, by employing characteristic data models, protocols, specifications, and/or standards, to detect abnormal behavior which diverts from the standard, model, etc., and/or unreasonable/malicious usage of standard specifications.
- the validator module 144 may be further configured to score the severity of the invalidity/abnormality of each request/response according to the learning models of the API. For example, in some embodiments, the validator module 144 may provide a first score on a “per field” level, a second score on a “per header” level, and/or an overall call score which may combine all scores in the same request, and output the scores to the validator module 144 . The validator module 144 may then use the scores in determining how to treat an invalid API call.
- a characteristic data model indicates that an input for a given field, e.g., a “first name” field, should start with an uppercase letter, e.g., “N”, detection of even a lowercase “n” would invalidate the API call.
- the system may be configured to view this as a minor infraction and allow the API call to pass (while logging the discrepancy nonetheless).
- detection of a “/” where an uppercase letter is expected based on the characteristic data model might, in this example, cause the system to block the API call entirely, and/or send out an alert to a server manager, as this is often a character used when attempting to insert malicious code, etc.
- the validator module 144 may include one or more sub-modules for implementing various types of validating functions and analyses, in order to determine the validity or invalidity of an API call (request and/or response).
- validator module 144 may contain flow validate 405 , structure validate 410 , fields validate 415 , validate source entity/wisdom of crowds 420 , behavior validate 425 , and/or relation validate 430 .
- these (and/or other) sub-modules may be implemented in order to validate received characteristic data points against results of various corresponding analyses performed by learning models engine module 143 ( FIG. 2 ) during the learning stage and manifested as characteristic data models.
- results of these validations/invalidations may be stored and/or used for additional analysis and protection measures.
- validator module 144 may be configured to store all in individual alerts generated from invalid API calls, e.g., in an individual alerts database 465 of database 150 .
- an attacker profiling module 145 may be configured to analyze accumulated data from the individual alerts database 465 , and identify suspicious (and/or verified) attacker profiles.
- attacker profiling module 145 may be configured to determine and/or generate a suspicion score (or profile score) by accumulating and/or scoring all the steps (e.g., invalid/abnormal/suspicious requests over time) together to prioritize the worst profiles.
- the attacker profiling module 145 may include one or more sub-modules for implementing various types of profiling functions and analyses, in order to determine the relative trustworthiness or untrustworthiness of the user associated with a particular profile, and of the profile itself.
- attacker profiling module 145 may include a correlation in same API module 435 , to enable correlating numerous alerts within the same API; timeline generation/highlight module 440 for generating e.g., a visual timeline; DDos detection module 445 for detecting DDos based on the learned API; profile scoring module 450 ; correlation across (multiple) APIs 455 ; and aggregating similar steps module 460 .
- Attacker profiling module 145 may use any/all of these (and/or other) modules to generate an attacker profile (and associated suspicion/profile score) for each client identifier associated with an invalid request/response, and/or may correlate between invalid attempts to find attackers by IP address, user ID, token etc. Furthermore, in some embodiments, attacker profiling module 145 may be configured to identify same attackers across APIs—same DNS and not same DNS; same identifier, e.g., IP address, personal e-mail address, phone number, fake SSN, etc.; same IOC (Indicators Of Compromise) and/or behavior; and/or same pattern of attack.
- timeline generation/highlight module 440 may be configured to generate a visual timeline. Representation of invalid alerts/attacks in a timeline can be an important tool in being able to respond to threats and take corrective measures. As such, the timeline generation/highlight module 440 may also be configured to highlight important sections in the timeline, aggregate similar steps (invalid/abnormal/suspicious requests over time) to one in timeline, etc.
- the attacker profiling module 145 may be configured to store these profiles and/or associated profile scores in an attacker profile database 470 of database 150 . Such profiles and their associated scores may be used in future validation processes. For example, in some embodiments, all profiles may be fed back to the validator module 144 regardless of the relative weight of the associated score, enabling tracking of each step associated with a profile after the finding first suspicious activity of a sender. In other embodiments, only profiles having a predefined threshold score may be monitored for.
- FIG. 5 is a flow diagram of a second part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention.
- FIG. 5 depicts a flow diagram of a method 500 for preventing API attacks during a protection stage or process, according to embodiments of the invention.
- FIG. 5 shows a protection method or process in which characteristic data points of both requests and responses are validated against previously defined characteristic data models, while also continuing to learn from newly arriving data.
- these two protection processes may be implemented simultaneously, consecutively, randomly, periodically, in tandem, separately, etc.
- models may be updated based on data from either/both processes, resulting alerts from invalid requests/responses may be stored together, separately, etc., and/or may inform one another, and analysis of the API in general.
- one process/method may be performed to the exclusion of the other, and/or one may be given more or less weight than the other, etc.
- method 500 may be configured to implement one or more of the elements/features/functions of system 100 , e.g., as described in detail in data flow 400 herein.
- method 500 may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor.
- method 500 begins at steps 510 A/ 510 B when the processor monitors all requests sent to a server API, and all responses sent from the server API.
- the data is provided to the processor.
- the processor may parse the data, e.g., by implementing parser module 141 .
- the processor may identify one or more characteristic data points of each request and response sent, e.g., by implementing Real-time learner module 142 .
- the processor may save the one or more characteristic data points in a database, such as, for example, raw learned data database 220 , and the processor may then expose or provide the one or more characteristic data points to a machine learning engine for analysis such as, for example, learning models engine module 143 , in order to continually learn from the incoming data (e.g., adding new characteristic data models and/or updating existing ones).
- a machine learning engine for analysis such as, for example, learning models engine module 143
- the processor may either validate or invalidate the sent request/response by comparing associated characteristic data points of the request/response to previously determined/generated characteristic data models. In doing so, the processor may implement, e.g., validator module 144 .
- the processor may validate the request/response, in which case it may be passed on to its intended destination (e.g., the server or the client device) at steps 594 A/ 594 B. However, if at steps 570 A/ 570 B the API call is invalidated (when compared, matched, or otherwise validated against the relevant characteristic data models), depending on, e.g., the severity of the invalidity, the processor may either block the API call (steps 580 A/ 580 B) and activate an alert protocol (steps 590 A/ 590 B) (e.g., recording an alert and/or generating an alert on a visual alert timeline), or simply activate an alert protocol without blocking the API call (e.g., if the invalidity is not considered severe or threatening.
- an alert protocol e.g., if the invalidity is not considered severe or threatening.
- an error may be sent to the client device, e.g., notifying about the blocked request/response, and/or providing a warning regarding such actions.
- the API call may be passed on to its intended destination (e.g., the server or the client device), and the protection method ends.
- the analytics may include. For example: 1. statistics of API calls per URL, per URL+method, per field inside every API call. 1. Automated documentation generation of APIs based on the specialized learning: the documentation may include the entire structure of the API—URLs, methods per URL, all the fields of every resource (URL) per method, etc. 3. Automated performance and monitoring based on the specialized learning: Monitoring including API endpoints (URL) availability, response time, latency, API calls rate; and 4. Rate limiting of API calls based on the specialized learning.
- the analytics may include. For example: 1. statistics of API calls per URL, per URL+method, per field inside every API call. 1. Automated documentation generation of APIs based on the specialized learning: the documentation may include the entire structure of the API—URLs, methods per URL, all the fields of every resource (URL) per method, etc. 3. Automated performance and monitoring based on the specialized learning: Monitoring including API endpoints (URL) availability, response time, latency, API calls rate; and 4. Rate limiting of API calls based
- a visual attacker list may be generated, e.g., using gathered data analytics, and/or displayed, which may further aid a server manager, etc., in addressing the various security issues identified in the various alerts.
- a visual API call tracker generated, e.g., using gathered data analytics, which may provide additional visual information to assist the manager or owner of the server/API in managing the health and security of its server/API.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- This patent application claims the benefit of and from U.S. patent application Ser. No. 15/098,263, filed on Apr. 13, 2016 and U.S. Provisional Patent Application No. 62/146,470, filed on Apr. 13, 2015, entitled “End to End Application Specific Certification Security (EACS),” which are all hereby incorporated by reference in their entireties.
- The present invention is in the field of cyber-security. In particular, the present invention is directed to systems and methods for identifying and preventing malicious application programming interface (API) attacks.
- Typically, an application programming interface (API) is understood as a particular set of rules and specifications that a software program can follow in order to access and make use of the services and resources provided by another particular software program that implements that API. The API serves as an interface between different software programs and facilitates their interaction, similar to the way that the user interface facilitates interaction between humans and computers. APIs are often used in a client-server architecture, to enable direct interfacing between a client device (or “client”) and a server device (or “server”), e.g., over a network such as the Internet. In such architecture, API calls are typically sent back and forth between a client and a server in the form of requests (from the client device) and responses (from the server devices).
- As a matter of course, different companies, which provide various different services, functionalities, and/or information, design and deploy their own unique APIs having their own unique data structures, etc. Furthermore, there are many different types of API architectures (e.g., RESTful, SOAP, XML-RPC, etc.), which may be implemented in a variety of different situations, such as Public APIs (available to developers), Private APIs (unavailable to developers), Internal APIs, third party APIs, and may relate to any number of specific applications such as, for example, mobile applications, web application, internet-of-things (IOT) applications and technologies, etc. APIs may also be configured for a variety of common data protocols (e.g., (JSON, XML, YAML, etc.), over a variety of communication protocols (Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, WebSocket, etc.). With so many variables, each unique API will have its own unique vulnerabilities to attack by hackers, etc.
- Most APIs are vulnerable to advanced persistent threat (APT) attacks, zero day attacks, and other similar attacks which look to exploit the vulnerabilities of a company's API. Moreover, developers put limited attention to security, and continued development of an API requires careful review of implemented legacy security systems and either updates for security assurance or using the developer's own code for security assurance and validity. The current state of the art creates opportunities for exploiting vulnerabilities and enhances security challenges.
- Generally, when an attacker wants to attack an API and details regarding that API are not publically available, there are a number of steps/processes often taken to learn about the API: (1) Reconnaissance—“sniffing” or otherwise listening to the traffic back and forth between the client and the server in order to document the structure, communication protocols, etc., of the API and reverse-engineering the information to get a complete picture of the API; (2) Generate illegal requests—once all the API details are known, the attacker can begin sending illegal requests directly to the backend of the server (rather than following the set API protocols, which typically only allow forward-facing communication, e.g., via a mobile application). These calls can include malicious code which can change parameters, add invalid inputs, etc., and may eventually expose a vulnerability of the API; and (3) Attack—upon find a vulnerability, implementing an attack on the server via the API.
- Presently available cyber-security systems do not resolve these fundamental flaws, as they account only for “known attacks”, e.g., attacks that have identifiable signatures that can be monitored for and blocked, for example monitoring calls for a specific term, etc. However, unknown vulnerabilities, which are specific to each API, cannot be accounted for using these methods. Instead, a customized solution that is tailored to each unique API is required.
- An embodiment of the invention includes a method for identifying and preventing malicious application programming interface (API) attacks in a client-server architecture. In some embodiments, the method may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor. The method may include, during a learning stage: monitoring all requests sent to a server API, and all responses sent from the server API; identifying one or more first characteristic data points of each request and response sent during the learning stage; and determining, based at least in part on the identified one or more first characteristic data points, one or more characteristic data models, wherein a characteristic data model represents at least one of an expected input to the API and an expected output of the API; and, during a protection stage, monitoring all requests sent to the server API, and all responses sent from the server API, identifying one or more second characteristic data points of each request and response sent during the protection stage, and one of validating and invalidating, by the processor, the identified one or more second characteristic data points against the one or more characteristic data models.
- In some embodiments, the method may further include passing to the server requests having no invalidated one or more second characteristic data points; and passing from the server responses having no invalidated one or more second characteristic data points. In some embodiments, the method may further include blocking to the server requests having invalidated one or more second characteristic data points; and blocking from the server responses having invalidated one or more second characteristic data points.
- In some embodiments, the method may further include generating an alert for each request having invalidated one or more second characteristic data points; and generating and alert for each response having invalidated one or more second characteristic data points. In some embodiments, the method may further include generating an alert timeline, wherein the alert timeline represents a selection of one or more aggregations of alerts, the alerts in each of the one or more aggregations having a predefined similarity, the one or more aggregations being organized in a predefined order; and displaying the alert timeline on a visual display.
- In some embodiments, the method may further include generating one or more attacker profiles based at least in part on the validating step; determining one or more suspicion scores for each attacker profile; and identifying one or more suspicious profiles based at least in part on respective suspicion scores, wherein all future requests and responses related to an identified suspicious profile are flagged with an alert irrespective of validity. In some embodiments, the method may further include updating the one or more characteristic data models based at least in part on the identified one or more second characteristic data points of each request and response sent during the protection stage. In some embodiments, the server API is one of a RESTful API, a SOAP API, an XML-RPC API, and a WSDL API. In some embodiments, the method may further include generating documentation comprising information reflecting a complete structure of the server API.
- In accordance with further embodiments of the invention, a system may be provided which may implement the methods described herein according to embodiments of the invention.
- These and other aspects, features and advantages will be understood with reference to the following description of certain embodiments of the invention.
- The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanied drawings. Embodiments of the invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like reference numerals indicate corresponding, analogous or similar elements, and in which:
-
FIG. 1 is a high level diagram illustrating an example configuration of a system for identifying and preventing malicious API attacks according to at least one embodiment of the invention; -
FIG. 2 is a block diagram illustrating a data flow between key components of a first part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention; -
FIG. 3 is a flow diagram of a first part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention; -
FIG. 4 is a block diagram illustrating a data flow between key components of a second part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention; -
FIG. 5 is a flow diagram of a second part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention; -
FIG. 6 is an example API endpoint configuration illustrated according to at least one embodiment of the invention; -
FIG. 7 is an example API overview configuration illustrated according to at least one embodiment of the invention; -
FIG. 8 is an example attacker/alert timeline generated according to at least one embodiment of the invention; -
FIG. 9 is an example visual attacker list generated according to at least one embodiment of the invention; and -
FIG. 10 is an example visual API call tracker generated according to at least one embodiment of the invention. - It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn accurately or to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity, or several physical components may be included in one functional block or element. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
- In the following description, various aspects of the present invention will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the present invention. However, it will also be apparent to one skilled in the art that the present invention may be practiced without the specific details presented herein. Furthermore, well known features may be omitted or simplified in order not to obscure the present invention.
- Although embodiments of the invention are not limited in this regard, discussions utilizing terms such as, for example, “processing,” “computing,” “calculating,” “determining,” “establishing”, “analyzing”, “checking”, or the like, may refer to operation(s) and/or process(es) of a computer, a computing platform, a computing system, or other electronic computing device, that manipulates and/or transforms data represented as physical (e.g., electronic) quantities within the computer's registers and/or memories into other data similarly represented as physical quantities within the computer's registers and/or memories or other information non-transitory processor-readable storage medium that may store instructions, which when executed by the processor, cause the processor to perform operations and/or processes. Although embodiments of the invention are not limited in this regard, the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”. The terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like. The term set when used herein may include one or more items. Unless explicitly stated, the method embodiments described herein are not constrained to a particular order or sequence. Additionally, some of the described method embodiments or elements thereof may occur or be performed simultaneously, at the same point in time, or concurrently.
- Some embodiments of the invention offer end to end optimizing security for APIs, i.e., from development to production and communication. Some embodiments of the invention are based on protecting applications through building a standard de facto API Secured Development Process (SDP) that inspects all communications (e.g., requests/responses) to and from the server from all client devices, via an API, and utilizes machine learning algorithms to generate approval models (application customized) of all client-server communication including fields, structures, flow, etc. Some embodiments of the invention offer Application Template Specific Analysis, which, in some embodiments, may lead to alerts and/or blocking of requests/responses which may contain unauthorized variations of template generated in each application.
-
FIG. 1 shows a high level diagram illustrating an example configuration of asystem 100 for identifying and preventing malicious API attacks, according to at least one embodiment of the invention.System 100 includesnetwork 105, which may include the Internet, one or more telephony networks, one or more network segments including local area networks (LAN) and wide area networks (WAN), one or more wireless networks, or a combination thereof.System 100 also includes asystem server 110 constructed in accordance with one or more embodiments of the invention. In some embodiments,system server 110 may be a stand-alone computer system. In other embodiments,system server 110 may include a network of operatively connected computing devices, which communicate overnetwork 105. Therefore,system server 110 may include multiple other processing machines such as computers, and more specifically, stationary devices, mobile devices, terminals, and/or computer servers (collectively, “computing devices”). Communication with these computing devices may be, for example, direct or indirect through further machines that are accessible to thenetwork 105. -
System server 110 may be any suitable computing device and/or data processing apparatus capable of communicating with computing devices, other remote devices or computing networks, receiving, transmitting and storing electronic information and processing requests as further described herein.System server 110 is, therefore, intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers and/or networked or cloud based computing systems capable of employing the systems and methods described herein. -
System server 110 may include aserver processor 115 which is operatively connected to various hardware and software components that serve to enable operation of thesystem 100.Server processor 115 serves to execute instructions to perform various operations relating to API security, and other functions of embodiments of the invention as will be described in greater detail below.Server processor 115 may be one or a number of processors, a central processing unit (CPU), a graphics processing unit (GPU), a multi-processor core, or any other type of processor, depending on the particular implementation.System server 110 may be configured to communicate viacommunication interface 120 with various other devices connected tonetwork 105. For example,communication interface 120 may include but is not limited to, a modem, a Network Interface Card (NIC), an integrated network interface, a radio frequency transmitter/receiver (e.g., Bluetooth wireless connection, cellular, Near-Field Communication (NFC) protocol, a satellite communication transmitter/receiver, an infrared port, a USB connection, and/or any other such interfaces for connecting thesystem server 110 to other computing devices and/or communication networks such as private networks and the Internet. - In certain implementations, a
server memory 125 is accessible byserver processor 115, thereby enablingserver processor 115 to receive and execute instructions such a code, stored in the memory and/or storage in the form of one ormore software modules 130, each module representing one or more code sets. Thesoftware modules 130 may include one or more software programs or applications (collectively referred to as the “server application”) having computer program code or a set of instructions executed partially or entirely inserver processor 115 for carrying out operations for aspects of the systems and methods disclosed herein, and may be written in any combination of one or more programming languages.Server processor 115 may be configured to carry out embodiments of the present invention by for example executing code or software, and may be or may execute the functionality of the modules as described herein. - As shown in
FIG. 1 , the exemplary software modules may include acommunication module 135, anAPI module 140, aparser module 141, a real-time learner module 142, a learningmodels engine module 143, avalidator module 144, and anattacker profile module 145.Communication module 135 may be executed byserver processor 115 to facilitate communication betweensystem server 110 and the various software and hardware components ofsystem 100, such as, for example,server database 150 and/orclient device 155 as described herein.API module 140, as described in detail herein, may be executed byserver processor 115 to implement the various functions of the API. Of course, in some embodiments, the API may reside on and/or be implemented by a remote or otherwise separate server entirely. -
Parser module 141 may be executed byserver processor 115 to parse large amounts and/or strings of data from API calls (e.g., requests from a client device and/or responses from a server device) into manageable data elements. Real-time learner module 142 may be executed byserver processor 115 to identify characteristic data points or features within the data of individual requests/responses, as described herein. Learningmodels engine module 143 may be executed byserver processor 115 to determine (and update) characteristic data models, as described herein.Validator module 144 may be executed byserver processor 115 to validate/invalidate API requests/responses, as described herein. Andattacker profiling module 145 may be executed byserver processor 115 to identify suspicious/malicious profiles attempting to communicate with the API, as described herein. - It should be noted that, in accordance with various embodiments of the invention,
server modules 130 may be executed entirely onsystem server 110 as a stand-alone software package, partly onsystem server 110 and partly onclient device 155, entirely onclient device 155, partly onsystem server 110 and partly on third-party server 190, or entirely on third-party server 190. -
Server memory 125 may be, for example, a random access memory (RAM) or any other suitable volatile or non-volatile computer readable storage medium.Server memory 125 may also include storage which may take various forms, depending on the particular implementation. For example, the storage may contain one or more components or devices such as a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above. In addition, the memory and/or storage may be fixed or removable. In addition, memory and/or storage may be local to thesystem server 110 or located remotely. - In accordance with further embodiments of the invention,
system server 110 may be connected to one or more database(s) 150, for example, directly or remotely vianetwork 105.Database 150 may include any of the memory configurations as described above, and may be in direct or indirect communication withsystem server 110. In some embodiments,database 150 stores the results/outputs of various modules, as described herein, and can represent a plurality of separate databases and/or partitions in a single database. - As described herein, among the computing devices on or connected to the
network 105 may be one ormore client devices 155.Client device 155 may be any standard computing device. As understood herein, in accordance with one or more embodiments, a computing device may be a stationary computing device, such as a desktop computer, kiosk and/or other machine, each of which generally has one or more processors, such asclient processor 160, configured to execute code to implement a variety of functions, a computer-readable memory, such asclient memory 165, aclient communication interface 170, for connecting to thenetwork 105, one or more client modules, such asintegration client module 175, one or more input devices, such as input devices 180, and one or more output devices, such asoutput devices 185. Typical input devices, such as, for example,input devices 185, may include a keyboard, pointing device (e.g., mouse or digitized stylus), a web-camera, and/or a touch-sensitive display, etc. Typical output devices, such as, forexample output device 185 may include one or more of a monitor, display, speaker, printer, etc. - In some embodiments,
integration client module 175 may be executed byclient processor 160 to provide the various functionalities ofclient device 155. In particular, in some embodiments,integration client module 175 may provide a client-side interface with which a user ofclient device 155 can interact, to, among other things, send requests to the API and receive results, etc. - Additionally or alternatively, a computing device may be a mobile electronic device (“MED”), which is generally understood in the art as having hardware components as in the stationary device described above, and being capable of embodying the systems and/or methods described herein, but which may further include componentry such as wireless communications circuitry, gyroscopes, inertia detection circuits, geolocation circuitry, touch sensitivity, among other sensors. Non-limiting examples of typical MEDs are smartphones, personal digital assistants, tablet computers, and the like, which may communicate over cellular and/or Wi-Fi networks or using a Bluetooth or other communication protocol. Typical input devices associated with conventional MEDs include, keyboards, microphones, accelerometers, touch screens, light meters, digital cameras, and the input jacks that enable attachment of further devices, etc.
- In some embodiments,
client device 155 may be a “dummy” terminal, by which processing and computing may be performed onsystem server 110, and information may then be provided toclient device 155 viaserver communication interface 120 for display and/or basic data manipulation. In some embodiments, modules depicted as existing on and/or executing on one device may additionally or alternatively exist on and/or execute on another device. For example, in some embodiments,API module 140, which is depicted inFIG. 1 as existing and executing onsystem server 110, may additionally or alternatively exist and/or execute on third-party server 190. In some embodiments, third-party server 190 may provide the same or similar structure and functionality assystem server 110, but may be owned, possessed, and/or operated by a third-party. -
FIG. 2 is a block diagram illustrating adata flow 200 between key components of a first part of the system for identifying and preventing malicious API attacks, according to at least one embodiment of the invention. In particular,FIG. 2 illustrates a data flow betweenparser module 141, real-time learner 142, learningmodels engine module 143, anddatabase 150 ofFIG. 1 during a learning stage, according to some embodiments of the invention. Some embodiments of system 100 (FIG. 1 ) are configured to receive all API calls (requests from clients and responses from the server), e.g., by diverting the calls through the system or otherwise providing a copy of each API call to the system. Depending on the API architecture (e.g., RESTful, SOAP, XML-RPC, WSDL, etc.), the type of data protocol (e.g., JSON, XML, YAML, etc.), the type of communication protocol (e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, WebSocket, etc.), the type of application (mobile application, web application, internet of things (IOT) application, etc.), the network architecture (e.g., Public API, Private API, Internal API, third-party API, etc., the data transmitted in an API call can take a variety of different forms, and can have a variety of different types of information. - For example, in RESTful API architecture, the API is typically structured using a plurality of Uniform Resource Locators (URLs) in which the objects are endpoints, including the URL parameters or “methods” allowed per end point, e.g., GET, PUT, POST, AND/OR DELETE. (In this configuration, GET is used to retrieve data, PUT is commonly used to update/replace an object, POST is used to create a new instance of an object, and DELETE is used to delete and object.)
- Turning briefly to
FIG. 6 , an exampleAPI endpoint configuration 600 is illustrated according to at least one embodiment of the invention.API endpoint configuration 600 includesAPI call 605,URL parameters 610, andendpoints 615. As explained in further detail herein,FIG. 6 also shows the expected inputs (and/or outputs) 620 for each object (also referred to herein as characteristic data models) as determined according to some embodiments of the invention. - Turning now briefly to
FIG. 7 , an exampleAPI overview configuration 700 is illustrated according to at least one embodiment of the invention.FIG. 7 shows an overview visual in which a plurality of API URL endpoints 705, each with their associatedURL parameters 710, is displayed. - Turning back to
FIG. 2 , in some embodiments,system 100 may includeparser module 141, which is configured to parse the data strings representing the requests/responses into consumable segments of information. For example, in some embodiments,parser module 141 may further includecommunication protocol parser 205,data protocol parser 210, and fieldsparser 215. Of course, additional/other parsers may also/alternatively be implemented depending on the particular API and data being communicated. In some embodiments,communication protocol parser 205, may parse or otherwise identify the particular communication protocol (e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.),data protocol parser 210 may parse or otherwise identify the particular data protocol (e.g., JSON, XML, YAML, etc.), and fields parser 215 may parse or otherwise identify particular fields, attributes, property names, and/or values, etc. -
System 100 may further include real-time learner module 142, which in some embodiments may be configured to receive data that has been parsed byparser module 141. Information can be passed fromparser module 141 to real-time learner module 142 which is configured to analyze each individual request/response and learn or otherwise identify the composition of that request/response. In some embodiments, as each request/response is analyzed, real-time learner module 142 may be configured to save the raw learned data about each request or response, e.g., to a raw learneddata database 220 ofdatabase 150. For example, call 605 (FIG. 6 ) contains a header “id”, which returned “12”. As such, in some embodiments the real-time learner module 142 may, for example, identify and record that for this call the response was a two-digit integer. This same data point may be parsed from tens of thousands of calls and then the results can be analyzed, e.g., by learningmodels engine module 143, along with many other relevant data points, in order to determine one or more characteristic data models (expected input/output) for a given request and/or response. - In some embodiments,
system 100 may include learningmodels engine module 143, which may contain one or more sub-modules for implementing various types of learning functions and analyses, in order to determine one or more characteristic data models (e.g., expected input/output/structure, etc.) for a given request and/or response. For example, learningmodels engine module 143 may contain flow learning 225, structure learning 230, fields learning 235, wisdom ofcrowds 240, behavior learning 245, and/or relation learning 250. - In some embodiments, flow learning 225 may be configured to recognize the order and/or sequence in which data is expected to be provided to the API. For example, in a typical flow for a sign-up process of a social media API, the expected sequence may be, for example, as follows: 1. user's first name (e.g., between three and twenty characters, alphabetic characters only, with a capital first letter); 2. user's last name (e.g., between three and twenty characters, alphabetic characters only, with a capital first letter); 3. e-mail address (standard e-mail format, e.g., john.doe@domain.com); 4. password (e.g., alphanumeric string containing at least one uppercase letter, one lowercase letter, one number, and at least 8 characters, etc.); and 5. password repeated identically. In this exemplary embodiment, flow learning 225 can learn the expected sequence by seeing the same sequence/pattern repeated again and again, and determine a characteristic data model representing this flow to be used in evaluating future data.
- In some embodiments, structure learning 230 may be configured to recognize various specific and/or unique data structures which are expected to be seen in given API call. For example, in embodiments where RESTful architecture communication is implemented, structure learning 230 may be configured to analyze and inspect Uniform Resource Identifier (URI) structure, MIME type covering all types, method (post, get, put, delete, etc.), resources (objects), a resource's representation, etc. In some embodiments, structure learning 230 may be further configured to analyze and inspect a RESTful API's modeling, such as WADL (Web Application Description Language), RAML (RESTful API Modeling Language), and RSDL (RESTful Service Description Language), etc.
- In some embodiments, fields learning 235, may be configured to execute content related analysis of each field/attribute/property to identify specific data types, e.g., ID , email, phone number, name, credit card, address, website URL, file URL, media (e.g., pictures, sound, video, etc.), message content, message subject, username, password, etc.) and generic data types (text, integer, decimal, binary, enumeration types, html, css, code (JavaScript, php, asp, C, C++, python, ruby, java, etc.), files, date, time, date-time, location, SQL, byte, bit, boolean, Yes/No, currency, list, dictionary, objects, URL, URI, etc.), length, size, unique structure, encoding, encryption, order, etc.
- In some embodiments, wisdom of
crowds 240 may be configured to perform analysis across APIs to identify relevant characteristic data models, e.g., based on the type of API, etc. - In some embodiments, behavior learning 245 may be configured to perform behavior analysis, e.g., accumulated Big Data analysis based on multiple customers in real time and/or offline, etc. This may include, for example, identifying standard behaviors and protocols, in order to facilitate detection of abnormal behavior which diverts from the standard specification and/or unreasonable/malicious usage of standard specification, such as, e.g., header modification (illegal values, constants, optional/unused, length, checksum, order, etc.), illegal length range violation, timing violation, version violation, keys violation, encryption violation, source violation, handshake violation, session violation, etc.
- In some embodiments, relation learning 250 may be configured to provide related analysis of time (time gaps, intervals, schedule, timing, etc.), patterns of traffic, i.e., in bandwidth, volume, size, flow, etc.
- Of course, additional and/or other sub-modules may be implemented by learning
models engine module 143 to identify additional characteristic data models, depending the specific configuration of the API. For example, in embodiments when SOAP (Simple Object Access protocol) communication is implemented, learning models engine module may analyze and inspect elements (envelope, header, body, fault and related), sender, receiver, message path, initial SOAP sender (aka originator), SOAP intermediary, ultimate SOAP receiver, etc. - In embodiments when XML-RPC communication is implemented, analysis and inspection of array, base64, boolean, date/time, double, integer, string, struct, nil, etc. may be performed. In embodiments when WSDL (Web Services Description Language) in communication is implemented, analysis and inspection of service, port/endpoint, binding, port type/interface, operation, message, types, etc., may be performed.
- Furthermore, when any kind of web service in communication is implemented, learning models engine module 143 may be configured to analyze and/or inspect any/all of the following: any structure/template/knowledge of the protocols, such as BEEP (Blocks Extensible Exchange Protocol), E-Business XML (Electronic Business using eXtensible Markup Language), Hessian, JSON-RPC, JSON-WSP, REST (Representational State Transfer), SOAP (outgrowth of XML-RPC, originally an acronym for Simple Object Access Protocol), UDDI (Universal Description, Discovery, and Integration), WPS (Web Processing Service), WSFL (Web Services Flow Language), WSCL (Web Services Conversation Language), XINS(XML Interface for Network Services), XLANG, XML-RPC, SOAP (Simple Object Access Protocol), SOAP-over-UDP, SOAP Mes sage Transmission Optimization Mechanism, WS -Notification, WS-BaseNotification, WS-Topics, WS-BrokeredNotification, WS-Addressing, WS-Transfer, WS-Eventing, WS-Enumeration, WS-MakeConnection, JSON-WSP, WS-Policy, WS-PolicyAssertions, WS-PolicyAttachment, WS-Discovery, WS-Inspection, WS-MetadataExchange, UDDI (Universal Description Discovery and Integration), WSDL 2.0 Core, WSDL 2.0 SOAP Binding, WSDL-S (Web Services Semantics), WSRF (WS-Resource Framework), WS-Security, XML Signature, XML Encryption, XKMS (XML Key Management), WS-SecureConversation, WS-SecurityPolicy, WS-Trust, WS-Federation, WS-Federation Active Requestor Profile, WS-Federation Passive Requestor Profile, Web Services Security Kerberos Binding, Web Single Sign-On Interoperability Profile, Web Single Sign-On Metadata Exchange Protocol, SAML (Security Assertion Markup Language), XACML, P3P, WS-ReliableMessaging, WS-Reliability, WS-RM Policy Assertion, Web Services Resource Framework, WS-Resource, WS-BaseFaults, WS-ServiceGroup, WS-ResourceProperties, WS-ResourceLifetime, WS-Transfer, WS-Fragment, Resource Representation SOAP Header Block, WS-I Basic Profile, WS-I Basic Security Profile, Simple Soap Binding Profile, WS-BPEL, WS-CDL, WSCI (Web Service Choreography Interface), WS-Choreography, XML Process Definition Language, WSCL (Web Services Conversation Language), WS-BusinessActivity, WS-AtomicTransaction, WS-Coordination, WS-CAF, WS-Transaction, WS-Context, WS-CF, WS-TXM, WS-Management, WS-Management Catalog, WS-ResourceTransfer, WSDM, Web Services for Remote Portlets, WS-Provisioning, DPWS (Devices Profile for Web Services), ebXML, etc.
- Based on any/all of the various raw learned data which may be provided to the learning
models engine module 143, learningmodels engine module 143 may be configured to determine and/or generate one or more characteristic data models (e.g., identified frameworks, structures, templates, profiles, rules, etc.), which may be used to detect even the slightest deviation from the expected input/output, etc. These characteristic data models may be saved, for example, in alearning models database 255 ofdatabase 150. -
FIG. 3 is a flow diagram of a first part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention. In particular,FIG. 3 depicts a flow diagram of amethod 300 for identify API attacks during a learning stage or process, according to embodiments of the invention. It should be noted thatFIG. 3 shows a learning method or process in which characteristic data models are generate from both requests and responses. In various embodiments, these two learning processes may be implemented simultaneously, consecutively, randomly, periodically, in tandem, separately, etc. Furthermore, in some embodiments, models generated from either/both processes may be stored together, separately, etc., and may inform one another and analysis of the API in general. Of course, in some embodiments, one process/method may be performed to the exclusion of the other, and/or one may be given more or less weight than the other, etc. For the purposes of this document, both processes are described simultaneously. Furthermore, in some embodiments,method 300 may be configured to implement one or more of the elements/features/functions ofsystem 100, e.g., as described in detail indata flow 200 herein. - In some embodiments,
method 300 may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor. In some embodiments,method 300 begins atsteps 310A/310B when the processor monitors all requests sent to a server API, and all responses sent from the server API. When a request/response is sent to/from the API, the data is provided to the processor. As described herein, atsteps 320A/320B, the processor may parse the data, e.g., by implementingparser module 141. Atsteps 330A/330B, the processor may identify one or more characteristic data points of each request and response sent, e.g., by implementing Real-time learner module 142. Next, atsteps 340A/340B, the processor may save the one or more characteristic data points in a database, such as, for example, raw learneddata database 220. - At
step 350A/350B, the processor may then expose or provide the one or more characteristic data points to a machine learning engine for analysis such as, for example, learningmodels engine module 143. Atstep 360A/360B, the processor may determine/generate/build, based at least in part on the identified one or more characteristic data points, one or more characteristic data models, in which a characteristic data model may represent an expected input to the API and/or an expected output of the API. In doing so, the processor may implement, e.g., learningmodels engine module 143. Next, atsteps 370A/370B, the processor may save the one or more characteristic data models in a database, such as, for example, learningmodels database 255. Finally, atsteps 380A/380B, if the request/response was not already passed to its destination (e.g., depending on whether or not data is held for analysis before being passed to its destination in the particular embodiment), the request/response is passed to its destination at this point (e.g., requests to the server and responses to the client), and the learning method ends. - It should be noted that, in various embodiments, characteristic data models may be generated, determined, built, and/or modified in an automated process as described herein. In other embodiments, the systems/methods described herein may enable a user to manually build structures/templates/profiles/models of common data protocols (JSON, XML, YAML, etc.) over communication protocols (e.g., Ethernet, IP, TCP, UDP, HTTP, HTTPS, HTTP/2, etc.) in a variety of architecture designs (e.g., RESTful, etc.) and different protocols and/or web services such as SOAP, XML-RPC and related for validation, verification, authentication, etc. In some embodiments, manual approval and/or modification of existing structures/templates/profiles may be required. In some embodiments, automatic approval and/or modification of existing structures/templates/profiles may be implemented. Finally, in some embodiments, semi-automatic (and/or partially manual) approval and/or modification of existing structures/templates/profiles may be implemented. Of course, in other embodiments these features may be implemented for validation, verification, authentication, etc., as well.
- Further examples of methods which may be implemented in the learning stage include the following:
- Learning that certain requests return certain responses.
- For example:
- request A will always return response B
- certain requests will always return a certain response or list of users and not anything else.
- For example:
- Learning of repetitive sequences of requests.
- For example:
- Requests sequence can be “request A followed by request B, followed by request C”, such as, Login request ->Request for list of products-> Requests for specific product.
- For example:
- Learning of relations between field/attribute/property names and values in a request/response.
- For example:
- In request A—Field “entity_type” with the value “company” requires the field “company_name”
- In request B—Field “entity_type” with the value “user” requires the field “first name”
- Valid requests:
- 1. {entity_type: “company”, company_name: “Secful”}
- 2. {entity_type: “company”, company_name: “Pearls”}
- 3. {entity_type: “user”, first_name: “John”}
- Invalid request:
- 1. {entity_type: “company”, first_name: “John”}
- 2. {entity_type: “user”, company_name: “Pearls”}
- In request A—Field “entity_type” with the value “company” requires the field “company_name”
- For example:
-
FIG. 4 is a block diagram illustrating adata flow 400 between key components of a second part of the system for identifying and preventing malicious API attacks according to at least one embodiment of the invention. In particular,FIG. 4 illustrates a data flow betweenparser module 141, real-time learner 142,validator module 144,attacker profiling module 145, anddatabase 150 ofFIG. 1 during a protection stage, according to some embodiments of the invention. As described in detail with reference toFIG. 2 , some embodiments of system 100 (FIG. 1 ) are configured to receive all API calls (requests from clients and responses from the server), e.g., by diverting the calls through the system or otherwise providing a copy of each API call to the system. In some embodiments, during the protection stage all API calls may be routed through the system so as to enable blocking of malicious call if necessary, as described herein. - As described in detail with reference to
FIG. 2 , in some embodiments, system 100 (ofFIG. 1 ) may includeparser module 141, which is configured to parse the data strings representing the requests/responses into consumable segments of information.System 100 may further include real-time learner module 142, which in some embodiments may be configured to receive data that has been parsed byparser module 141. Information can be passed fromparser module 141 to real-time learner module 142, which is configured to analyze each individual request/response and learn or otherwise identify the composition of that request/response. - It should be noted that, in various embodiments, real-
time learner module 142 may be configured to be executed both in the learning stage and in the protection stage, during specific intervals, etc. As such, characteristic data points identified by the real-time learner module 142 while evaluating individual requests/response during the protection stage (as with the learning stage) may be provided to the raw learneddata database 220, and included in any/all analyses performed by learningmodels engine module 143 in the course of generating, determining, building, and/or updating characteristic data models, as described herein. In turn, new and/or updated characteristic data models can be constantly and/or periodically fed back into the system, as described herein, to be used during validation of API requests/responses. - In some embodiments,
system 100 may further includevalidator module 144, which in some embodiments may be configured to receive raw learned data from sent requests/responses (e.g., parsed data from each request and/or response) and either validate or invalidate the sent requests/responses by comparing the characteristic data points to previously determined/generated characteristic data models. In some embodiments,validator module 144 may be configured to perform validation and/or protection, by employing characteristic data models, protocols, specifications, and/or standards, to detect abnormal behavior which diverts from the standard, model, etc., and/or unreasonable/malicious usage of standard specifications. - In some embodiments, the
validator module 144 may be further configured to score the severity of the invalidity/abnormality of each request/response according to the learning models of the API. For example, in some embodiments, thevalidator module 144 may provide a first score on a “per field” level, a second score on a “per header” level, and/or an overall call score which may combine all scores in the same request, and output the scores to thevalidator module 144. Thevalidator module 144 may then use the scores in determining how to treat an invalid API call. For example, if a characteristic data model indicates that an input for a given field, e.g., a “first name” field, should start with an uppercase letter, e.g., “N”, detection of even a lowercase “n” would invalidate the API call. Of course, in some embodiments, the system may be configured to view this as a minor infraction and allow the API call to pass (while logging the discrepancy nonetheless). Conversely, detection of a “/” where an uppercase letter is expected based on the characteristic data model might, in this example, cause the system to block the API call entirely, and/or send out an alert to a server manager, as this is often a character used when attempting to insert malicious code, etc. - In some embodiments, the
validator module 144 may include one or more sub-modules for implementing various types of validating functions and analyses, in order to determine the validity or invalidity of an API call (request and/or response). For example,validator module 144 may contain flow validate 405, structure validate 410, fields validate 415, validate source entity/wisdom ofcrowds 420, behavior validate 425, and/or relation validate 430. In some embodiments, these (and/or other) sub-modules may be implemented in order to validate received characteristic data points against results of various corresponding analyses performed by learning models engine module 143 (FIG. 2 ) during the learning stage and manifested as characteristic data models. - In some embodiments, results of these validations/invalidations may be stored and/or used for additional analysis and protection measures. For example,
validator module 144 may be configured to store all in individual alerts generated from invalid API calls, e.g., in anindividual alerts database 465 ofdatabase 150. Furthermore, anattacker profiling module 145 may be configured to analyze accumulated data from theindividual alerts database 465, and identify suspicious (and/or verified) attacker profiles. In some embodiments,attacker profiling module 145 may be configured to determine and/or generate a suspicion score (or profile score) by accumulating and/or scoring all the steps (e.g., invalid/abnormal/suspicious requests over time) together to prioritize the worst profiles. - In some embodiments, the
attacker profiling module 145 may include one or more sub-modules for implementing various types of profiling functions and analyses, in order to determine the relative trustworthiness or untrustworthiness of the user associated with a particular profile, and of the profile itself. For example,attacker profiling module 145 may include a correlation insame API module 435, to enable correlating numerous alerts within the same API; timeline generation/highlight module 440 for generating e.g., a visual timeline;DDos detection module 445 for detecting DDos based on the learned API;profile scoring module 450; correlation across (multiple)APIs 455; and aggregatingsimilar steps module 460.Attacker profiling module 145 may use any/all of these (and/or other) modules to generate an attacker profile (and associated suspicion/profile score) for each client identifier associated with an invalid request/response, and/or may correlate between invalid attempts to find attackers by IP address, user ID, token etc. Furthermore, in some embodiments,attacker profiling module 145 may be configured to identify same attackers across APIs—same DNS and not same DNS; same identifier, e.g., IP address, personal e-mail address, phone number, fake SSN, etc.; same IOC (Indicators Of Compromise) and/or behavior; and/or same pattern of attack. - Turning briefly to
FIG. 8 , in some embodiments, timeline generation/highlight module 440 may be configured to generate a visual timeline. Representation of invalid alerts/attacks in a timeline can be an important tool in being able to respond to threats and take corrective measures. As such, the timeline generation/highlight module 440 may also be configured to highlight important sections in the timeline, aggregate similar steps (invalid/abnormal/suspicious requests over time) to one in timeline, etc. - In some embodiments, the
attacker profiling module 145 may be configured to store these profiles and/or associated profile scores in anattacker profile database 470 ofdatabase 150. Such profiles and their associated scores may be used in future validation processes. For example, in some embodiments, all profiles may be fed back to thevalidator module 144 regardless of the relative weight of the associated score, enabling tracking of each step associated with a profile after the finding first suspicious activity of a sender. In other embodiments, only profiles having a predefined threshold score may be monitored for. -
FIG. 5 is a flow diagram of a second part of a method for identifying and preventing malicious API attacks according to at least one embodiment of the invention. In particular,FIG. 5 depicts a flow diagram of amethod 500 for preventing API attacks during a protection stage or process, according to embodiments of the invention. It should be noted thatFIG. 5 (likeFIG. 3 ) shows a protection method or process in which characteristic data points of both requests and responses are validated against previously defined characteristic data models, while also continuing to learn from newly arriving data. In various embodiments, these two protection processes may be implemented simultaneously, consecutively, randomly, periodically, in tandem, separately, etc. Furthermore, in some embodiments, models may be updated based on data from either/both processes, resulting alerts from invalid requests/responses may be stored together, separately, etc., and/or may inform one another, and analysis of the API in general. Of course, in some embodiments, one process/method may be performed to the exclusion of the other, and/or one may be given more or less weight than the other, etc. For the purposes of this document, both processes are described simultaneously. Furthermore, in some embodiments,method 500 may be configured to implement one or more of the elements/features/functions ofsystem 100, e.g., as described in detail indata flow 400 herein. - In some embodiments,
method 500 may be performed on a computer having a processor, a memory, and one or more code sets stored in the memory and executed by the processor. In some embodiments,method 500 begins atsteps 510A/510B when the processor monitors all requests sent to a server API, and all responses sent from the server API. When a request/response is sent to/from the API, the data is provided to the processor. As described herein, atsteps 520A/520B, the processor may parse the data, e.g., by implementingparser module 141. Atsteps 530A/530B, the processor may identify one or more characteristic data points of each request and response sent, e.g., by implementing Real-time learner module 142. Next, atsteps 540A/540B, the processor may save the one or more characteristic data points in a database, such as, for example, raw learneddata database 220, and the processor may then expose or provide the one or more characteristic data points to a machine learning engine for analysis such as, for example, learningmodels engine module 143, in order to continually learn from the incoming data (e.g., adding new characteristic data models and/or updating existing ones). - At
step 550A/550B, the processor may either validate or invalidate the sent request/response by comparing associated characteristic data points of the request/response to previously determined/generated characteristic data models. In doing so, the processor may implement, e.g.,validator module 144. - At
step 560A/560B, the processor may validate the request/response, in which case it may be passed on to its intended destination (e.g., the server or the client device) atsteps 594A/594B. However, if atsteps 570A/570B the API call is invalidated (when compared, matched, or otherwise validated against the relevant characteristic data models), depending on, e.g., the severity of the invalidity, the processor may either block the API call (steps 580A/580B) and activate an alert protocol (steps 590A/590B) (e.g., recording an alert and/or generating an alert on a visual alert timeline), or simply activate an alert protocol without blocking the API call (e.g., if the invalidity is not considered severe or threatening. If the API call is blocked and an alert protocol is activated, then atsteps 592A/592B, in some embodiments an error may be sent to the client device, e.g., notifying about the blocked request/response, and/or providing a warning regarding such actions. Finally, if the API call is not blocked but an alert protocol is activated, then atsteps 594A/594B the API call may be passed on to its intended destination (e.g., the server or the client device), and the protection method ends. - Other features of the systems and methods described herein may include automated analytics of APIs based on the specialized learning. The analytics may include. For example: 1. statistics of API calls per URL, per URL+method, per field inside every API call. 1. Automated documentation generation of APIs based on the specialized learning: the documentation may include the entire structure of the API—URLs, methods per URL, all the fields of every resource (URL) per method, etc. 3. Automated performance and monitoring based on the specialized learning: Monitoring including API endpoints (URL) availability, response time, latency, API calls rate; and 4. Rate limiting of API calls based on the specialized learning.
- Turning briefly to
FIG. 9 , in some embodiments a visual attacker list may be generated, e.g., using gathered data analytics, and/or displayed, which may further aid a server manager, etc., in addressing the various security issues identified in the various alerts. - Turning briefly to
FIG. 10 , in some embodiments a visual API call tracker, generated, e.g., using gathered data analytics, which may provide additional visual information to assist the manager or owner of the server/API in managing the health and security of its server/API. - Unless explicitly stated, the method embodiments described herein are not constrained to a particular order or sequence. Furthermore, all formulas described herein are intended as examples only and other or different formulas may be used. Additionally, some of the described method embodiments or elements thereof may occur or be performed at the same point in time.
- While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
- Various embodiments have been presented. Each of these embodiments may of course include features from other embodiments presented, and embodiments not specifically described may include various features described herein.
Claims (18)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/821,124 US20180324208A1 (en) | 2015-04-13 | 2017-11-22 | System and method for identifying and preventing malicious api attacks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562146470P | 2015-04-13 | 2015-04-13 | |
US15/098,263 US9853996B2 (en) | 2015-04-13 | 2016-04-13 | System and method for identifying and preventing malicious API attacks |
US15/821,124 US20180324208A1 (en) | 2015-04-13 | 2017-11-22 | System and method for identifying and preventing malicious api attacks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/098,263 Continuation US9853996B2 (en) | 2015-04-13 | 2016-04-13 | System and method for identifying and preventing malicious API attacks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180324208A1 true US20180324208A1 (en) | 2018-11-08 |
Family
ID=57126075
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/098,263 Active US9853996B2 (en) | 2015-04-13 | 2016-04-13 | System and method for identifying and preventing malicious API attacks |
US15/821,124 Abandoned US20180324208A1 (en) | 2015-04-13 | 2017-11-22 | System and method for identifying and preventing malicious api attacks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/098,263 Active US9853996B2 (en) | 2015-04-13 | 2016-04-13 | System and method for identifying and preventing malicious API attacks |
Country Status (2)
Country | Link |
---|---|
US (2) | US9853996B2 (en) |
WO (1) | WO2016168368A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887333B1 (en) * | 2017-08-03 | 2021-01-05 | Amazon Technologies, Inc. | Multi-tenant threat intelligence service |
WO2021236101A1 (en) * | 2020-05-22 | 2021-11-25 | Google Llc | Tamper-proof interaction data |
WO2022157642A1 (en) * | 2021-01-21 | 2022-07-28 | Noname Gate Ltd. | Techniques for securing computing interfaces |
US20220321530A1 (en) * | 2021-03-30 | 2022-10-06 | Hcl Technologies Limited | Method and system for enhancing computer network security |
WO2024028803A1 (en) * | 2022-08-04 | 2024-02-08 | DALVI, Suhas Ramkrishna | Method and system for preventing application programming interface attacks via channel for transmission of data |
Families Citing this family (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10701037B2 (en) | 2015-05-27 | 2020-06-30 | Ping Identity Corporation | Scalable proxy clusters |
SE542513C2 (en) * | 2015-12-15 | 2020-05-26 | Saab Ab | A method for authenticating software |
US9807104B1 (en) * | 2016-04-29 | 2017-10-31 | STEALTHbits Technologies, Inc. | Systems and methods for detecting and blocking malicious network activity |
US10116680B1 (en) * | 2016-06-21 | 2018-10-30 | Symantec Corporation | Systems and methods for evaluating infection risks based on profiled user behaviors |
US10587580B2 (en) | 2016-10-26 | 2020-03-10 | Ping Identity Corporation | Methods and systems for API deception environment and API traffic control and security |
US10839076B2 (en) * | 2016-12-21 | 2020-11-17 | 3D Signals Ltd. | Detection of cyber machinery attacks |
US10740215B2 (en) * | 2017-04-26 | 2020-08-11 | Jpmorgan Chase Bank, N.A. | System and method for implementing an API validator tool |
CN107426196B (en) * | 2017-06-30 | 2022-06-21 | 全球能源互联网研究院 | Method and system for identifying WEB invasion |
EP4020282A1 (en) | 2017-10-13 | 2022-06-29 | Ping Identity Corporation | Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions |
EP3679700A1 (en) * | 2017-10-18 | 2020-07-15 | BlackBerry Limited | Detecting remote application profiling |
US11429400B2 (en) * | 2017-10-20 | 2022-08-30 | Red Hat, Inc. | User interface metadata from an application program interface |
KR102461707B1 (en) * | 2017-12-07 | 2022-11-02 | 삼성전자주식회사 | Server and method for depending malicious code using thereof |
JP6935849B2 (en) * | 2018-05-21 | 2021-09-15 | 日本電信電話株式会社 | Learning methods, learning devices and learning programs |
LU100844B1 (en) * | 2018-06-25 | 2019-12-30 | Univ Luxembourg | Method for preventing ransomware attacks on computing systems |
US12052218B2 (en) * | 2018-06-28 | 2024-07-30 | Visa International Service Association | Systems and methods to secure API platforms |
US11474978B2 (en) | 2018-07-06 | 2022-10-18 | Capital One Services, Llc | Systems and methods for a data search engine based on data profiles |
US20200012890A1 (en) | 2018-07-06 | 2020-01-09 | Capital One Services, Llc | Systems and methods for data stream simulation |
US11030323B2 (en) * | 2018-10-29 | 2021-06-08 | Disney Enterprises, Inc. | System to manage security scanning in media environments |
US11171929B2 (en) | 2018-12-17 | 2021-11-09 | International Business Machines Corporation | Applying differential security to API message payload data elements |
US11303659B2 (en) * | 2018-12-26 | 2022-04-12 | International Business Machines Corporation | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence |
EP3678348A1 (en) | 2019-01-04 | 2020-07-08 | Ping Identity Corporation | Methods and systems for data traffic based adpative security |
CN111104670B (en) * | 2019-12-11 | 2023-09-01 | 国网甘肃省电力公司电力科学研究院 | APT attack identification and protection method |
US10917401B1 (en) | 2020-03-24 | 2021-02-09 | Imperva, Inc. | Data leakage prevention over application programming interface |
CN111400721B (en) * | 2020-03-24 | 2024-04-12 | 杭州数梦工场科技有限公司 | API interface detection method and device |
US11900074B2 (en) * | 2020-08-20 | 2024-02-13 | Jpmorgan Chase Bank, N.A. | Method and apparatus for implementing an end-to-end API design and development module integrating with firmwide tools and processes |
US12118077B2 (en) * | 2021-01-21 | 2024-10-15 | Intuit Inc. | Feature extraction and time series anomaly detection over dynamic graphs |
CN113472791B (en) * | 2021-06-30 | 2023-07-14 | 深信服科技股份有限公司 | Attack detection method and device, electronic equipment and readable storage medium |
US12034752B2 (en) | 2021-10-20 | 2024-07-09 | Noname Gate Ltd | System and method for traffic-based computing interface misconfiguration detection |
US20230199015A1 (en) * | 2021-12-20 | 2023-06-22 | Noname Gate Ltd | System and method for contextual misconfiguration detection |
US20230359924A1 (en) * | 2022-05-03 | 2023-11-09 | Noname Gate Ltd. | Techniques for actively identifying parameters of computing interfaces based on requests and for active testing using such parameters |
CN117544423B (en) * | 2024-01-09 | 2024-04-02 | 成都思维世纪科技有限责任公司 | API (application program interface) link mapping method based on data characteristics |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
US20100146291A1 (en) * | 2008-12-08 | 2010-06-10 | Oracle International Corporation | Secure framework for invoking server-side apis using ajax |
US20120213371A1 (en) * | 2011-02-23 | 2012-08-23 | General Electric Company | Systems, Methods, and Apparatus for Electrical Grid Quantum Key Distribution |
US20130097706A1 (en) * | 2011-09-16 | 2013-04-18 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US20130246944A1 (en) * | 2012-03-19 | 2013-09-19 | Mohan Kumar Pandiyan | Systems and methods for providing user interfaces for management applications |
US9171146B2 (en) * | 2011-12-14 | 2015-10-27 | Intel Corporation | Method and system for monitoring calls to an application program interface (API) function |
US20150350234A1 (en) * | 2014-05-30 | 2015-12-03 | Ca, Inc. | Manipulating api requests to indicate source computer application trustworthiness |
US20160011732A1 (en) * | 2014-07-11 | 2016-01-14 | Shape Security, Inc. | Disrupting automated attacks on client-server interactions using polymorphic application programming interfaces |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7849509B2 (en) * | 2005-10-07 | 2010-12-07 | Microsoft Corporation | Detection of security vulnerabilities in computer programs |
CN105144187B (en) * | 2013-02-10 | 2019-01-22 | 配拨股份有限公司 | The safety product of prediction and the method and product of the existing safety product of scoring are provided |
-
2016
- 2016-04-13 WO PCT/US2016/027376 patent/WO2016168368A1/en active Application Filing
- 2016-04-13 US US15/098,263 patent/US9853996B2/en active Active
-
2017
- 2017-11-22 US US15/821,124 patent/US20180324208A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
US20100146291A1 (en) * | 2008-12-08 | 2010-06-10 | Oracle International Corporation | Secure framework for invoking server-side apis using ajax |
US20120213371A1 (en) * | 2011-02-23 | 2012-08-23 | General Electric Company | Systems, Methods, and Apparatus for Electrical Grid Quantum Key Distribution |
US20130097706A1 (en) * | 2011-09-16 | 2013-04-18 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US9171146B2 (en) * | 2011-12-14 | 2015-10-27 | Intel Corporation | Method and system for monitoring calls to an application program interface (API) function |
US20130246944A1 (en) * | 2012-03-19 | 2013-09-19 | Mohan Kumar Pandiyan | Systems and methods for providing user interfaces for management applications |
US20150350234A1 (en) * | 2014-05-30 | 2015-12-03 | Ca, Inc. | Manipulating api requests to indicate source computer application trustworthiness |
US20160011732A1 (en) * | 2014-07-11 | 2016-01-14 | Shape Security, Inc. | Disrupting automated attacks on client-server interactions using polymorphic application programming interfaces |
US20160099966A1 (en) * | 2014-07-11 | 2016-04-07 | Shape Security, Inc. | Disrupting automated attacks on client-server interactions using polymorphic application programming interfaces |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887333B1 (en) * | 2017-08-03 | 2021-01-05 | Amazon Technologies, Inc. | Multi-tenant threat intelligence service |
WO2021236101A1 (en) * | 2020-05-22 | 2021-11-25 | Google Llc | Tamper-proof interaction data |
KR20210144659A (en) * | 2020-05-22 | 2021-11-30 | 구글 엘엘씨 | Tamper-proof interaction data |
KR102507826B1 (en) * | 2020-05-22 | 2023-03-07 | 구글 엘엘씨 | Tamper-proof interaction data |
US11836209B2 (en) | 2020-05-22 | 2023-12-05 | Google Llc | Tamper-proof interaction data |
WO2022157642A1 (en) * | 2021-01-21 | 2022-07-28 | Noname Gate Ltd. | Techniques for securing computing interfaces |
US20220321530A1 (en) * | 2021-03-30 | 2022-10-06 | Hcl Technologies Limited | Method and system for enhancing computer network security |
WO2024028803A1 (en) * | 2022-08-04 | 2024-02-08 | DALVI, Suhas Ramkrishna | Method and system for preventing application programming interface attacks via channel for transmission of data |
Also Published As
Publication number | Publication date |
---|---|
WO2016168368A1 (en) | 2016-10-20 |
US9853996B2 (en) | 2017-12-26 |
US20160308900A1 (en) | 2016-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9853996B2 (en) | System and method for identifying and preventing malicious API attacks | |
US11734148B2 (en) | Testing cloud application integrations, data, and protocols | |
US11025674B2 (en) | Cybersecurity profiling and rating using active and passive external reconnaissance | |
US10574698B1 (en) | Configuration and deployment of decoy content over a network | |
US11720686B1 (en) | Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal | |
US11968227B2 (en) | Detecting KERBEROS ticket attacks within a domain | |
US11777992B1 (en) | Security model utilizing multi-channel data | |
US20210297447A1 (en) | Detecting and mitigating attacks using forged authentication objects within a domain | |
US10223524B1 (en) | Compromised authentication information clearing house | |
US20220377093A1 (en) | System and method for data compliance and prevention with threat detection and response | |
US12041091B2 (en) | System and methods for automated internet- scale web application vulnerability scanning and enhanced security profiling | |
US11671448B2 (en) | Phishing detection using uniform resource locators | |
US20210360032A1 (en) | Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance | |
US12021894B2 (en) | Phishing detection based on modeling of web page content | |
US9336396B2 (en) | Method and system for generating an enforceable security policy based on application sitemap | |
US11792221B2 (en) | Rest API scanning for security testing | |
US11729145B2 (en) | User interface for web server risk awareness | |
US20210200595A1 (en) | Autonomous Determination of Characteristic(s) and/or Configuration(s) of a Remote Computing Resource to Inform Operation of an Autonomous System Used to Evaluate Preparedness of an Organization to Attacks or Reconnaissance Effort by Antagonistic Third Parties | |
US20230308459A1 (en) | Authentication attack detection and mitigation with embedded authentication and delegation | |
Mishra et al. | Intrusion detection system with snort in cloud computing: advanced IDS | |
US20240364749A1 (en) | Automated internet-scale web application vulnerability scanning and enhanced security profiling | |
Heino et al. | JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: SECFUL, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ELIYAHU, ROEY;SADIKA, OMER;SIGNING DATES FROM 20161116 TO 20161130;REEL/FRAME:048645/0074 Owner name: SALT SECURITY, INC., DELAWARE Free format text: CHANGE OF NAME;ASSIGNOR:SECFUL, INC.;REEL/FRAME:050150/0169 Effective date: 20180613 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |