1 / 3

Web Application Security Assessment Service

Briskinfosec is a full range of IT security services, 10 years of work experience. Web Application protection and security will become effective. Find out how

Download Presentation

Web Application Security Assessment Service

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. https://www.briskinfosec.com Briskinfosec Technology and Consulting Pvt Ltd Mobile: 8608634123 https://www.briskinfosec.com https://www.facebook.com/briskinfosec https://twitter.com/briskinfosec Web Application Security Assessment Service

  2. https://www.briskinfosec.com Web Application Security Assessment Service Traditional firewalls fail to protect Web resources from most threats. The reason is that such attacks most often occur at the application level, in the form of standard requests to the Web resource, where the capabilities of the firewall are extremely limited and it is not able to detect this attack. For such purposes, specialized firewalls are used that work at the application level and have a large number of signatures aimed at detecting attacks on Web applications. These firewalls are called WAF (Web Application Firewall). The purpose of this solution is to detect and block attacks on Web resources using filtering http / https protocols. Web Application Firewall Can Be Implemented As a Hardware Device, Virtual Machine Classic WAF placement on the network in reverse proxy mode in front of protected web servers. Depending on the manufacturer other modes of operation may also be supported for example transparent proxy, bridging, or even passive mode, when the product works with traffic replication. After installing WAF and launching productive traffic, the main component of protection immediately starts working machine learning, during which a reference model of communication with the protected object is compiled, and thus a "white" list of acceptable access identifiers is formed. Currently, three types of access identifiers are used in web applications: HTTP parameters (in views of the type: Raw, XML, JSON), resource identifier (URL, URN), session identifier (cookie). The WAF's job is to determine the valid identifier values for the web application. The reference (positive) model will subsequently be composed of certain values. The inclusion of specific identifier values in the model is based on the use of a mathematical statistical algorithm, which evaluates these values as valid using a sample of productive traffic. When all the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. which evaluates these values as valid using a sample of productive traffic. When all

  3. https://www.briskinfosec.com the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. which evaluates these values as valid using a sample of productive traffic. When all the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. In addition to machine learning the WAF feature set usually includes the following typical security mechanisms: protocol validation, signature analysis, protection against injection and XSS (often proprietary) the ability to create your own protection rules; DDoS protection; integration with reputation and fraud services; integration with other devices in the company's information security landscape. The priority for the WAF manufacturer is to focus its own research centers on generating security policy updates for their devices, taking into account the current threats to web applications. This is how, for example, attack signatures inherent in specific web frameworks and content control systems or proprietary protection mechanisms against XSS and SQL injection appear. Our company supplies web application security assessment service and solutions from leading manufacturers

More Related