Droid Wars: Protect your APIs from
cyber threats
1©2015 Apigee. All Rights Reserved.
youtube.com/apigee
slideshare.net/apigee
@Subrak
Subra Kumaraswamy
@Davidandrz
David Andrzejek
5https://en.wikipedia.org/wiki/C-3PO
•Search engine indexing
•Health monitoring
•Performance testing
6http://ideas.wikia.com/http://starwars.wikia.com/
•Scrapers: Content, price data, inventory data
•Reconnaissance: probe for API security weakness
•Bruteforce bots: DDoS attacks, etc.
7http://ideas.wikia.com/http://starwars.wikia.com/
•Theft of data and business
•Promotion abuse
•Bot traffic skews analytics and KPIs
•Create performance overhead on Web Operations
There is also reputational risk!
8
What’s different about APIs?
9
10http://starwars..com/
API Security is Unique
• Your APIs are vulnerable to the typical OWASP Top 10 attacks
• IN ADDITION, you have to worry about:
– Hackers reverse engineering apps to access private APIs
– API key theft—looks like legit usage!
– Traffic spike protection by way of bots or DoS attacks
– Identity tracking across API sessions
– XML/JSON injection-type attacks
– Token harvesting due to insecure communication or storage
11
Secure Your APIs
12
Users Apps APIs Backend
Mutual TLS
IP access
control
Spike arrest
Rate limits
Threat protection
Intrusion detection
DDoS
API key
OAuth2
TLS
IP access control
OAuth2
MFA
Federated login
Am I Secure Now?
13
Security Policies Configured
14
Need to rethink the “known known” security approach
15
15
Backend
Service
Legitimate Traffic
API Bots
IP Blacklist
Apps
16
Data-driven approach to security
17
Vol
URI
+
many other kinds…
VS.
Vol
URI
Password guessers Screen scrapers
Data-driven approach to security
API Security: Data-Driven Approach
Closed Loop Protection: Analyze, Detect, Protect
API clients
Target Services
API
Dashboard
Machine learning
models and rules
Action (Block/Throttle/Alert)
Blacklist
Your traffic
System-wide
purchased
Key Takeaways
21
• If you have valuable data, you will be targeted.
• APIs bring unique challenges. Old approaches don’t work.
• Sophisticated rules and machine learning algorithms are the
only way to discern bots from real traffic.
• An automated system is needed, to capture, analyze, report,
and act.
Securing APIs: End-to-End
22
Thank you

More Related Content

PPTX
APIs: The New Security Layer
PPTX
API Security Lifecycle
PDF
How to Achieve Agile API Security
PDF
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
PPTX
Deep-Dive: Secure API Management
PPTX
Managing Identities in the World of APIs
PDF
I Love APIs 2015: Scaling Mobile-focused Microservices at Verizon
PDF
I Love APIs 2015: Advanced Crash Course in Apigee Edge Workshop
APIs: The New Security Layer
API Security Lifecycle
How to Achieve Agile API Security
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Deep-Dive: Secure API Management
Managing Identities in the World of APIs
I Love APIs 2015: Scaling Mobile-focused Microservices at Verizon
I Love APIs 2015: Advanced Crash Course in Apigee Edge Workshop

What's hot (20)

PPTX
API Services: Harness the Power of Enterprise Infrastructure
PPTX
Data-driven Security: Protect APIs from Adaptive Threats
PDF
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
PDF
How Secure Are Your APIs?
PPTX
Transforming Your Business Through APIs
PDF
The Dev, Sec and Ops of API Security - API World
PPTX
API Services: Building State-of-the-Art APIs
PPTX
What are your APIs Worth?
PPTX
Apigee Edge Overview and Roadmap
PDF
Pivotal + Apigee Workshop (June 4th, 2019)
PPTX
Apigee Edge Product Demo
PPT
Why APIs are Different Than Integration
PPTX
API Security: Securing Digital Channels and Mobile Apps Against Hacks
PPTX
API Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
PPTX
Managing Sensitive Information in an API and Microservices World
PPTX
Deep-Dive: API Security in the Digital Age
PDF
How Apigee Api Management Platform Helps with Digital Excellence
PDF
I Love APIs 2015: Crash Course Foundational Topics in Apigee Edge Workshop
PPTX
Node.js - Extending the Programmability of Apigee Edge
PDF
Data Driven Security
API Services: Harness the Power of Enterprise Infrastructure
Data-driven Security: Protect APIs from Adaptive Threats
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
How Secure Are Your APIs?
Transforming Your Business Through APIs
The Dev, Sec and Ops of API Security - API World
API Services: Building State-of-the-Art APIs
What are your APIs Worth?
Apigee Edge Overview and Roadmap
Pivotal + Apigee Workshop (June 4th, 2019)
Apigee Edge Product Demo
Why APIs are Different Than Integration
API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Design Best Practices & Tech Talk : API Craft Meetup @ Apigee
Managing Sensitive Information in an API and Microservices World
Deep-Dive: API Security in the Digital Age
How Apigee Api Management Platform Helps with Digital Excellence
I Love APIs 2015: Crash Course Foundational Topics in Apigee Edge Workshop
Node.js - Extending the Programmability of Apigee Edge
Data Driven Security
Ad

Similar to Protect your APIs from Cyber Threats (20)

PDF
5 step plan to securing your APIs
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PPTX
Outpost24 webinar - Api security
PDF
HowYourAPIBeMyAPI
PDF
Enhancing your Security APIs
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PDF
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
PDF
What is API Security and How Does It Keep Apps Safe_.pdf
PDF
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
PPTX
Adapt or Die Sydney - API Security
PDF
Better API Security With A SecDevOps Approach
PDF
Better API Security with Automation
PDF
Is Your API Being Abused – And Would You Even Notice If It Was?
PPTX
London Adapt or Die: Securing your APIs the Right Way!
PDF
SecDevOps for API Security
PDF
Peeling the Onion: Making Sense of the Layers of API Security
5 step plan to securing your APIs
Outpost24 webinar Why API security matters and how to get it right.pdf
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
Outpost24 webinar - Api security
HowYourAPIBeMyAPI
Enhancing your Security APIs
apidays New York 2023 - Putting yourself out there - how to secure your publi...
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
Hacking and Defending APIs - Red and Blue make Purple.pdf
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
What is API Security and How Does It Keep Apps Safe_.pdf
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
Adapt or Die Sydney - API Security
Better API Security With A SecDevOps Approach
Better API Security with Automation
Is Your API Being Abused – And Would You Even Notice If It Was?
London Adapt or Die: Securing your APIs the Right Way!
SecDevOps for API Security
Peeling the Onion: Making Sense of the Layers of API Security
Ad

More from Apigee | Google Cloud (20)

PDF
Magazine Luiza at a glance (1)
PPTX
Monetization: Unlock More Value from Your APIs
PDF
Apigee Demo: API Platform Overview
PDF
Ticketmaster at a glance
PDF
AccuWeather: Recasting API Experiences in a Developer-First World
PDF
Which Application Modernization Pattern Is Right For You?
PPTX
Apigee Product Roadmap Part 2
PPTX
The Four Transformative Forces of the API Management Market
PDF
Walgreens at a glance
PDF
Apigee Edge: Intro to Microgateway
PDF
Managing the Complexity of Microservices Deployments
PDF
Pitney Bowes at a glance
PPTX
Microservices Done Right: Key Ingredients for Microservices Success
PDF
Adapt or Die: Opening Keynote with Chet Kapoor
PDF
Adapt or Die: Keynote with Greg Brail
PDF
Adapt or Die: Keynote with Anant Jhingran
PDF
London Adapt or Die: Opening Keynot
PDF
London Adapt or Die: Lunch keynote
PDF
London Adapt or Die: Closing Keynote — Adapt Now!
PPTX
London adapt or-die opening keynote chet kapoor
Magazine Luiza at a glance (1)
Monetization: Unlock More Value from Your APIs
Apigee Demo: API Platform Overview
Ticketmaster at a glance
AccuWeather: Recasting API Experiences in a Developer-First World
Which Application Modernization Pattern Is Right For You?
Apigee Product Roadmap Part 2
The Four Transformative Forces of the API Management Market
Walgreens at a glance
Apigee Edge: Intro to Microgateway
Managing the Complexity of Microservices Deployments
Pitney Bowes at a glance
Microservices Done Right: Key Ingredients for Microservices Success
Adapt or Die: Opening Keynote with Chet Kapoor
Adapt or Die: Keynote with Greg Brail
Adapt or Die: Keynote with Anant Jhingran
London Adapt or Die: Opening Keynot
London Adapt or Die: Lunch keynote
London Adapt or Die: Closing Keynote — Adapt Now!
London adapt or-die opening keynote chet kapoor

Recently uploaded (20)

PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
STKI Israel Market Study 2025 version august
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPT
What is a Computer? Input Devices /output devices
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
A proposed approach for plagiarism detection in Myanmar Unicode text
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
STKI Israel Market Study 2025 version august
Convolutional neural network based encoder-decoder for efficient real-time ob...
What is a Computer? Input Devices /output devices
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
sustainability-14-14877-v2.pddhzftheheeeee
Getting started with AI Agents and Multi-Agent Systems
NewMind AI Weekly Chronicles – August ’25 Week III
Final SEM Unit 1 for mit wpu at pune .pptx
Build Your First AI Agent with UiPath.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
Microsoft Excel 365/2024 Beginner's training
Comparative analysis of machine learning models for fake news detection in so...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Custom Battery Pack Design Considerations for Performance and Safety
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
1 - Historical Antecedents, Social Consideration.pdf
Zenith AI: Advanced Artificial Intelligence

Protect your APIs from Cyber Threats