RESEARCH ON ANOMALY DETECTION METHODS IN API LOGS TO ENSURE SECURITY AND RELIABILITY OF SOFTWARE SYSTEMS

Authors

DOI:

https://doi.org/10.35546/kntu2078-4481.2025.1.2.19

Keywords:

anomaly detection, cybersecurity, artificial intelligence, software system security, threat detection

Abstract

With the increasing number of logs from various APIs, manual inspection and analysis is becoming an increasingly difficult task. Machine learning methods allow automating the process of analyzing large amounts of data and detecting unusual patterns that may indicate some anomalies or threats. Examining logs from API systems allows you to determine whether requests to the system are safe or suspicious. Anomalies in requests may indicate attempts at unauthorized access or malicious actions to a computer system. Today, companies often engage third-party pentesting specialists to periodically test software for vulnerabilities. However, to increase autonomy and security, it is advisable to implement a system that can independently identify abnormal traffic that may indicate potential threats. Such an approach will allow preventing attacks in advance and minimizing risks faster than waiting for results from external experts. The object of research is the processes of detecting anomalies in API logs to improve the security and reliability of software systems. The aim of the study is to investigate and evaluate the effectiveness of methods for detecting anomalies in API logs in order to improve the security and reliability of software systems. The study is aimed at comparing different unsupervised learning models and determining the most effective one for detecting potentially malicious activity in API logs. The paper investigates methods for detecting anomalies in API logs, which is critical to ensuring the security and reliability of software systems.Modern approaches to log analysis, including machine learning, statistical analysis, and anomaly detection methods, are considered. It is established that effective anomaly detection allows timely identification of potential threats, such as cyber attacks, system errors or unauthorized access, which significantly increases the level of software security.

References

OWASP, OWASP API Security Project. Available at: https://owasp.org/www-project-api-security/ (Accessed: 22 February 2025).

Lala, S. K., Kumar, A., & Subbulakshmi, T. (2021, May). Secure web development using owasp guidelines. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 323-332). IEEE.

Catherine, A., Anastasia, D., Olga, S., & Adebayo, F. R. (2025). Enhancing API Security in FinTech with Genetic Algorithm-Based Machine Learning Models.

Costa, Fabio, and Akamai Solutions Engineer Principal. “Sécurité des APIs: un pilier oublié de la stratégie Zéro Trust–Global Security Mag Online”. (2025).

Aharon, U., Dubin, R., Dvir, A., & Hajaj, C. (2025). A classification-by-retrieval framework for few-shot anomaly detection to detect API injection. Computers & Security, 150, 104249.

Mohiuddin Ahmed, Abdun Naser, and Jiankun Hu. “A survey of network anomaly detection techniques”. In: Journal of Network and Computer Applications 60 (2016), pp. 19–31. ISSN: 1084-8045. DOI: 10.1016/j.jnca.2015.11.016. URL: https://www. sciencedirect.com/science/article/pii/S1084804515002891.

Carmen Sánchez-Zas, Xavier Larriva-Novo, Víctor A Villagrá, Mario Sanz Rodrigo, and José Ignacio Moreno. “Design and Evaluation of Unsupervised Machine Learning Models for Anomaly Detection in Streaming Cybersecurity Logs”. In: Mathematics 10.21 (2022), p. 4043.

Published

2025-02-25