2021
DOI: 10.1016/j.procs.2021.01.320
|View full text |Cite
|
Sign up to set email alerts
|

Security in Microservices Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(22 citation statements)
references
References 18 publications
1
20
0
1
Order By: Relevance
“…Spring Security Framework [14][15][16] is a robust, highly customizable, comprehensive, and extensible open-source Java framework supporting authentication and authorization. Furthermore, it provides a solution to protect common external attacks [28][29][30][31][32][33][34][35][36][37], such as session fixation, clickjacking, CSRF, etc. For securing Spring-based applications, it is the de-facto standard.…”
Section: Basic Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Spring Security Framework [14][15][16] is a robust, highly customizable, comprehensive, and extensible open-source Java framework supporting authentication and authorization. Furthermore, it provides a solution to protect common external attacks [28][29][30][31][32][33][34][35][36][37], such as session fixation, clickjacking, CSRF, etc. For securing Spring-based applications, it is the de-facto standard.…”
Section: Basic Preliminariesmentioning
confidence: 99%
“…Microservice Architecture (MSA) [29][30][31][32][33][34][35][36][37] has arisen to describe a specific way of developing software systems for independently deployable services. The traditional monolithic software development approach suffers from the following drawbacks: bundled deployment as a single stack, intransigent scalability, high cost of resources and refactoring efforts, and DevOps challenges among dispersed teams [15,16].…”
Section: Basic Preliminariesmentioning
confidence: 99%
“…Moreover, many of these types of threats exploit AI-enabled technology to improve their effectiveness, rendering traditional forms of defence useless. Attacks supported by AI are more dangerous, and most defences are not sufficiently prepared for this fight [15].…”
Section: Artificial Intelligence In Cybersecuritymentioning
confidence: 99%
“…This smell occurs whenever two microservices in an application interact without enacting a secure communication [44,73]. As microservice-based applications are highly distributed, communication interfaces and channels proliferate, hence increasing the overall application attack surface.…”
Section: Non-secured Service-to-service Communicationsmentioning
confidence: 99%
“…Each access point constitutes a potential attack vector that can be exploited by an intruder to authenticate as an end-user, and having multiple access points hence result in increasing the attack surface to violate Authenticity in a microservice-based application [35]. The use of multiple access points for user authentication also results in maintainability and usability issues, since user login is to be developed, maintained, and used in multiple parts of the application [44].…”
Section: Multiple User Authenticationmentioning
confidence: 99%