API Vulnerabilities In Cloud Computing Platform: Attack And Detection