SlideShare a Scribd company logo
API Security & Fraud Detection
Are you ready ?
APIsecure 2022
Amandine ELBAZE
Cybersecurity Advisor
Cybersolutions
THE KEY ROLE OF
APIS
• HTTP-based application integration
protocol
• M2M communication platform
• Provides application interoperability
• Opens doors for web/cloud services
• APIs are business enablers
• Integrates technology companies
• APIs support modern IT
infrastructure
2
According to
Verizon:
“90% of breaches
targeted Web
Applications
AND
APIs make up 90% of
the web app attack
surface area...”
According to
Gartner:
In 2022, API’s will
become
“Most Frequent
Attack Vector”
“There’s been an
increase in
vulnerabilities that
are either specific
to APIs or present a
bigger risk, which
many developers
are unaware of.”
- Erez Yalon, Project
Lead at the OWASP
Security concerns on the rise:
API SECURITY CHALLENGES
4
APIs require a different
approach at network security
APIs expose core business
data and services
Business and regulations both
create demand
• 85% of all network traffic
pass through an API
• API Management & WAF
don’t have the necessary
tools to secure APIs
• The API landscape is vast,
growing and diverse
• Malicious input must not
reach core systems
• Data leak prevention is a
top priority of modern IT
• Rising trend of attacks by
passing perimeters via use
of an internal server
• Data must be secured
both at rest- and in-transit
• Grant access to third party
providers
• Compliance demands
encryption, monitoring,
fraud prevention, and
content-based policies
API SECURITY
Agile solution for webservice protection
& control
▌ Added security layer for web
applications and services
▌ Enforce Encryption, Security, Content
and Monitoring policies
▌ Create logs straight from the API
traffic
▌ Highly customizable policies
▌ Stop API specific attacks before they
could reach your backend system…
▌ … and stop data leaks before
sensitive information could leave the
backend
5
API SECURITY
Granular Control and Monitoring
of API traffic
▌ Deep Packet Inspection of API traffic
▌ Full interpretation of SOAP and REST
protocols
▌ Schema validation based on a
Positive Security Model
▌ Custom Security Policies based on
header and body contents
▌ Custom Logging Policies for SIEM,
SOC, Big Data systems
▌ Custom TLS Encryption policies
▌ Easy deployment without the need
to alter the protected backend
system
6
▌ Public APIs are vulnerable to botnets and
malicious actors with automated exploit
scanners
▌ They can cause service slowness and
outages in business-critical systems
▌ Botnet attacks are hard to detect and
identify with standard security tools
The solution
▌ Quick response, lightweight solution to filter
out malicious sources
▌ Custom threat intelligence feed integration
▌ Added GeoIP filtering
7
THREAT INTELLIGENCE
Prevent Botnet attacks and zero-day attacks
Proxedo Security Flow
8
Filter
Deserializer
Decompressor
Insight
Enforcer Serializer Compressor
Filter
Serializer
Compressor
Insight
Enforcer Deserializer Decompressor
Request
Response
Client
Protected Backend
TLS Encyption
TLS Encyption
TLS Encyption
TLS Encyption
▌ Detecting fraud requires a specialized toolset
▌ These transactions should be stopped in
transit, or marked for review in order to
efficiently fight fraud
▌ This process must be automated, and must
provide context to make accurate decisions
The solution
▌ Fully integrated, precise and customizable
solution for fraud detection
▌ Automated data collection and aggregation
for monitored transactions
▌ Enrichment of transaction data for a wider
scope of information and context in decision
making
▌ Machine learning technology processing the
digital footprint of each transaction
9
FRAUD DETECTION
Prevent fraudulent financial transactions
Fraud Detection
10
Fraud Module
Enrichment Response
Scoring
API call
Data
▌ Basic building blocks of a
transaction
▌ Enriched by multiple data
sources to provide context
▌ Machine Learning process
▌ Include custom data
▌ Enriched data is scored
based on context, relations,
previous activity
▌ Custom scoring options
▌ Whitelist – Blacklist
▌ Machine Learning rules
▌ Block fraudulent transactions
▌ Log selected traffic contents
▌ Customizable policies
▌ SIEM integration for Alerts
▌ Big Data integration for
fighting money laundering
Score Log Alert Abort
Enrich
Thank You !
Amandine Elbaze
amandine.elbaze@cybersolutions.fr

More Related Content

PPTX
The Inconvenient Truth About API Security
PPTX
2022 APIsecure_The Real World, API Security Edition
PPTX
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
PDF
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
PDF
Cloud Security Primer - F5 Networks
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PDF
Cyber security series Application Security
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
The Inconvenient Truth About API Security
2022 APIsecure_The Real World, API Security Edition
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
Cloud Security Primer - F5 Networks
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Cyber security series Application Security
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...

Similar to 2022 APIsecure_API Security & Fraud Detection - Are you ready? (20)

PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PPTX
Application security meetup k8_s security with zero trust_29072021
PDF
EAS-SEC Project
PDF
NormShield 2018 Cyber Security Risk Brief
PDF
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
PDF
What CISOs should know about SAP security
PPTX
Cyber Security in the market place: HP CTO Day
PPTX
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
Secure Your Web Applications and Achieve Compliance
PDF
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
PDF
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
PPTX
Segurdad de red para la generacion de la nube symantec
PPTX
Emerging application and data protection for multi cloud
PPTX
Catalyst 2015: Patrick Harding
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PPTX
Zero Trust Networks
PDF
7 Best Practices for Secure API Development .pdf
DOCX
7 Best Practices for Secure API Development .docx
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
Outpost24 webinar Why API security matters and how to get it right.pdf
Application security meetup k8_s security with zero trust_29072021
EAS-SEC Project
NormShield 2018 Cyber Security Risk Brief
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
What CISOs should know about SAP security
Cyber Security in the market place: HP CTO Day
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
CyberCrime in the Cloud and How to defend Yourself
Secure Your Web Applications and Achieve Compliance
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
Segurdad de red para la generacion de la nube symantec
Emerging application and data protection for multi cloud
Catalyst 2015: Patrick Harding
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Zero Trust Networks
7 Best Practices for Secure API Development .pdf
7 Best Practices for Secure API Development .docx
Ad

More from APIsecure_ Official (20)

PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
2022 APIsecure_API Discovery: First step towards API Security
PPTX
2022 APIsecure_We’re Not in AppSec Anymore Toto
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_API Discovery: First step towards API Security
2022 APIsecure_We’re Not in AppSec Anymore Toto
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
cuic standard and advanced reporting.pdf

2022 APIsecure_API Security & Fraud Detection - Are you ready?

  • 1. API Security & Fraud Detection Are you ready ? APIsecure 2022 Amandine ELBAZE Cybersecurity Advisor Cybersolutions
  • 2. THE KEY ROLE OF APIS • HTTP-based application integration protocol • M2M communication platform • Provides application interoperability • Opens doors for web/cloud services • APIs are business enablers • Integrates technology companies • APIs support modern IT infrastructure 2
  • 3. According to Verizon: “90% of breaches targeted Web Applications AND APIs make up 90% of the web app attack surface area...” According to Gartner: In 2022, API’s will become “Most Frequent Attack Vector” “There’s been an increase in vulnerabilities that are either specific to APIs or present a bigger risk, which many developers are unaware of.” - Erez Yalon, Project Lead at the OWASP Security concerns on the rise:
  • 4. API SECURITY CHALLENGES 4 APIs require a different approach at network security APIs expose core business data and services Business and regulations both create demand • 85% of all network traffic pass through an API • API Management & WAF don’t have the necessary tools to secure APIs • The API landscape is vast, growing and diverse • Malicious input must not reach core systems • Data leak prevention is a top priority of modern IT • Rising trend of attacks by passing perimeters via use of an internal server • Data must be secured both at rest- and in-transit • Grant access to third party providers • Compliance demands encryption, monitoring, fraud prevention, and content-based policies
  • 5. API SECURITY Agile solution for webservice protection & control ▌ Added security layer for web applications and services ▌ Enforce Encryption, Security, Content and Monitoring policies ▌ Create logs straight from the API traffic ▌ Highly customizable policies ▌ Stop API specific attacks before they could reach your backend system… ▌ … and stop data leaks before sensitive information could leave the backend 5
  • 6. API SECURITY Granular Control and Monitoring of API traffic ▌ Deep Packet Inspection of API traffic ▌ Full interpretation of SOAP and REST protocols ▌ Schema validation based on a Positive Security Model ▌ Custom Security Policies based on header and body contents ▌ Custom Logging Policies for SIEM, SOC, Big Data systems ▌ Custom TLS Encryption policies ▌ Easy deployment without the need to alter the protected backend system 6
  • 7. ▌ Public APIs are vulnerable to botnets and malicious actors with automated exploit scanners ▌ They can cause service slowness and outages in business-critical systems ▌ Botnet attacks are hard to detect and identify with standard security tools The solution ▌ Quick response, lightweight solution to filter out malicious sources ▌ Custom threat intelligence feed integration ▌ Added GeoIP filtering 7 THREAT INTELLIGENCE Prevent Botnet attacks and zero-day attacks
  • 8. Proxedo Security Flow 8 Filter Deserializer Decompressor Insight Enforcer Serializer Compressor Filter Serializer Compressor Insight Enforcer Deserializer Decompressor Request Response Client Protected Backend TLS Encyption TLS Encyption TLS Encyption TLS Encyption
  • 9. ▌ Detecting fraud requires a specialized toolset ▌ These transactions should be stopped in transit, or marked for review in order to efficiently fight fraud ▌ This process must be automated, and must provide context to make accurate decisions The solution ▌ Fully integrated, precise and customizable solution for fraud detection ▌ Automated data collection and aggregation for monitored transactions ▌ Enrichment of transaction data for a wider scope of information and context in decision making ▌ Machine learning technology processing the digital footprint of each transaction 9 FRAUD DETECTION Prevent fraudulent financial transactions
  • 10. Fraud Detection 10 Fraud Module Enrichment Response Scoring API call Data ▌ Basic building blocks of a transaction ▌ Enriched by multiple data sources to provide context ▌ Machine Learning process ▌ Include custom data ▌ Enriched data is scored based on context, relations, previous activity ▌ Custom scoring options ▌ Whitelist – Blacklist ▌ Machine Learning rules ▌ Block fraudulent transactions ▌ Log selected traffic contents ▌ Customizable policies ▌ SIEM integration for Alerts ▌ Big Data integration for fighting money laundering Score Log Alert Abort Enrich
  • 11. Thank You ! Amandine Elbaze amandine.elbaze@cybersolutions.fr