Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Cloudflare Application Security Report Reveals API Attacks Increasing Significantly
Cybersecurity

Cloudflare Application Security Report Reveals API Attacks Increasing Significantly

Bill DoerrfeldBy Bill DoerrfeldApril 22, 20225 Mins Read
Facebook Twitter LinkedIn Email
API Attacks
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Most of us already know that the threat potential is widening across today’s interconnected software landscape. And with so many applications depending upon the internet, analyzing incoming web traffic is a productive way to discover and prevent potential risks. Monitoring these requests is becoming more of a priority as hackers attempt to exploit newer technologies, like API endpoints, which may not have the proper protection in place.

Cloudflare recently released interesting data on application security trends. Cloudflare, the company behind the popular reverse proxy, says that 32 million HTTP requests pass through its network every second — w3tech estimates this accounts for 19.3% of all websites. With such a broad perspective on the state of web traffic, the metrics produced by Cloudflare internal systems can be thought of as benchmarks for the web as a whole.

Below, I’ll review data from the latest Cloudflare application security report, which compiles web application security data collected from December 1, 2021 to March 1, 2022. As we’ll notice, there is a high prevalence of non-human actors hitting web applications, including bot traffic and structured data requests to API endpoints—it can be difficult to decipher when this traffic is malicious and when it’s not. Simultaneously, HTTP anomalies and SQL injection attacks are becoming increasingly common among API endpoints.

API Attacks Become More Commonplace

First off, Cloudflare noticed a significant uptick in API requests. APIs, or application programming interfaces, have become a standard glue to hold applications together on the web. These backend interfaces are fundamental for linking data and functionality across applications. They help sync databases, connect partners, integrate third-party SaaS, and power public-facing open data initiatives. APIs will arguably play an essential role within incoming metaverse projects as well.

API traffic is now the highest growing type of web traffic, accounting for 55% of total requests. Cloudflare reports a 20% rise in API traffic in 2021. API endpoints are also increasingly a target for hackers, often due to a lack of proper authorization control, among other common vulnerabilties. Web APIs often connect to sensitive information and payment details, making them a valuable commodity for data exfiltration. As such, Cloudflare has noticed that API endpoints receive more malicious requests compared to typical web applications.

If we examine the types of API attacks, we see that SQLi injection is the most common attack type, making up 34.5% of all API attacks. This is most likely due to hackers attempting to discover and exploit vulnerabilities with backend databases, surmises the report. Other common API attack types include HTTP anomalies (18.2%), Vendor-Specific CVE (14.5%), Command Injection (14.3%), and XSS (7.3%).

Bot Traffic is Considerable

Much of the traffic on the internet isn’t initiated by humans at all. Instead, much of it is comprised of machine-to-machine connections or automated workflows. Bot traffic now accounts for 38% of all HTTP requests, and 10% of this bot traffic is accessing API endpoints. Some bots, like search engines, might be conducting verifiable traffic, but much automation is unverified traffic. This includes custom-built automated tools like scanners, crawlers, and bots built by hackers, which tend to get blocked by web application proxies.

Looking at the more general attack types, we see that HTTP anomalies, such as malformed method names, made up over 50% of the blocked requests. This demonstrates a constant effort by hackers to discover exploits by testing HTTP requests. They may place common undocumented identifiers in the URI to test whether they can access specific fields. Or, an attacker may attempt to request undocumented methods to weigh the frailty of a system.

HTTP anomaly detection is thus imperative for a web application. When blocking malformed HTTP requests, such a proxy often searches for things like:

  • A missing user agent
  • HTTP requests that don’t conform to the expected HTTP verb for the endpoint, like GET, POST, or PUT.
  • Attempting to access a non-standard port
  • Invalid UTF-8 encoding

Over a third of non-verified bot HTTP traffic is often blocked outright. In addition to HTTP anomalies, other types of attacks include software-specific CVE-based attacks (11.8%), information disclosure (10.4%), SQLi (7.0%), and XSS (6.1%).

IP-Based Protection is Outdated

Interestingly, many of the “users” online aren’t human at all. Bots and calculated attack automation are often used as surveillance across web endpoints at a large scale. The data above demonstrates the top potential risks to look out for when exposing services online. To prevent malicious HTTP traffic in its tracks, Cloudflare encourages organizations to stop using an outdated IP address-based approach for protection, as IP addresses can easily be spoofed, and instead adopt a more zero-trust posture.

Furthermore, the Cloudflare report is not the only study noticing a rise in API attacks in recent months. Another study conducted by Salt Labs confirmed an even sharper increase in API attacks — the group traced a 681% increase in API attacks over the past 12 months, with a 321% increase in overall call volume. This traffic can be challenging to spot since web application firewalls tend to generate many false positives. Furthermore, large enterprises likely have many shadow APIs, or undocumented integrations, lurking across their portfolio. This makes auditing the potential attack surface a bit murky.

The fact that API endpoints receive more malformed requests than normal web applications substantiates that improving your API security posture is a top priority. In order to thwart this incoming rise, it’s a good practice to follow the industry-leading API security best practices. These include techniques such as using an API gateway, adopting OAuth 2.0 with a centralized server, carefully using tokens, and using scopes for access control.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

API Cyber Attack Cybersecurity cybersecurity as an enabler featured
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

Arvind Krishna’s Next IBM Miracle

May 13, 2025

ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

May 13, 2025

Arvind Krishna Restoring IBM to Former Glory

May 13, 2025

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny
  • Arvind Krishna Restoring IBM to Former Glory
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications
  • How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.