| dc.contributor.advisor | ȚURCANU, Dinu | |
| dc.contributor.author | MOISEI, Liviu | |
| dc.contributor.author | MOCANU, Liviu | |
| dc.date.accessioned | 2026-01-13T15:51:09Z | |
| dc.date.available | 2026-01-13T15:51:09Z | |
| dc.date.issued | 2026 | |
| dc.identifier.citation | MOISEI, Liviu and Liviu MOCANU. Mitigating the top 5 OWASP API security risks using gateway patterns. In: Conferenţa Tehnico-Ştiinţifică a Colaboratorilor, Doctoranzilor şi Studenţilor = The Technical Scientific Conference of Undergraduate, Master and PhD Students, 14-16 Mai 2025. Universitatea Tehnică a Moldovei. Chişinău: Tehnica-UTM, 2026, vol. 1, pp. 362-368. ISBN 978-9975-64-612-3, ISBN 978-9975-64-613-0 (PDF). | en_US |
| dc.identifier.isbn | 978-9975-64-612-3 | |
| dc.identifier.isbn | 978-9975-64-613-0 | |
| dc.identifier.uri | https://repository.utm.md/handle/5014/34298 | |
| dc.description.abstract | rate limiting, access control, payload validation, microservices, web security This paper investigates how API gateway patterns can effectively mitigate five of the most critical risks identified in the OWASP API Security Top 10 (2023 edition). As APIs form the backbone of modern microservices and cloud-native systems, ensuring their security is vital. The research outlines a layered defense strategy, focusing on gateway-enforced controls such as rate limiting, schema validation, authentication, authorization, and access policy enforcement. The methodology involves a structured analysis of security literature, case studies, and industry documentation to evaluate how API gateways address real-world vulnerabilities – such as Broken Object Level Authorization and Unrestricted Resource Consumption – across both perimeter and contextual security. This study contributes by bridging theoretical security models with real-world gateway implementations, illustrating their effectiveness through case analysis and highlighting where such protections fall short. The research finds that gateway patterns are most effective when complemented by backend validation and secure development practices. This paper proposes a practical security framework for developers and system architects seeking to fortify API-driven infrastructures. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Universitatea Tehnică a Moldovei | en_US |
| dc.relation.ispartofseries | Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor = The Technical Scientific Conference of Undergraduate, Master and PhD Students: 14-16 mai 2025; | |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | rate limiting | en_US |
| dc.subject | access control | en_US |
| dc.subject | payload validation | en_US |
| dc.subject | microservices | en_US |
| dc.subject | web security | en_US |
| dc.title | Mitigating the top 5 OWASP API security risks using gateway patterns | en_US |
| dc.type | Article | en_US |
The following license files are associated with this item: