International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 25 |
Year of Publication: 2024 |
Authors: Mohamed Amer, Tarek S. Sobh |
10.5120/ijca2024923712 |
Mohamed Amer, Tarek S. Sobh . New Framework for Securing Web APIs Token-based Authentication / Authorization with Auto Expire Auto Refresh (AEAR) Features. International Journal of Computer Applications. 186, 25 ( Jun 2024), 8-14. DOI=10.5120/ijca2024923712
Token-based authentication for Web APIs allows users to verify their unique identity. In return, they receive a unique token that grants access to specific resources for a limited period of time. These tokens are stored on the client's browser with expiration properties [1, 2], making them vulnerable to cyber-attacks such as Stealing Tokens through Redirection, Cross-Site Request Forgery (CSRF), and Cross-Site Scripting (XSS) [3]. The algorithms themselves can also be a source of vulnerabilities, including Weak Symmetric Keys and Incorrect Composition of Encryption and Signature [4]. Various authentication protocols like Open Authorization (OAuth), Security Assertion Markup Language (SAML), OpenID Connect (OIDC), Client Initiated Backchannel Authentication (CIBA), and JSON Web Token (JWT) and their associated attacks are examined. A new framework that incorporate Multi-Factor Authentication (MFA) and One Time Password (OTP) is proposed to address these vulnerabilities, along with detailed analysis and guidelines for its implementation.