30 likes | 31 Views
Briskinfosec is a full range of IT security services, 10 years of work experience. Web Application protection and security will become effective. Find out how
E N D
https://www.briskinfosec.com Briskinfosec Technology and Consulting Pvt Ltd Mobile: 8608634123 https://www.briskinfosec.com https://www.facebook.com/briskinfosec https://twitter.com/briskinfosec Web Application Security Assessment Service
https://www.briskinfosec.com Web Application Security Assessment Service Traditional firewalls fail to protect Web resources from most threats. The reason is that such attacks most often occur at the application level, in the form of standard requests to the Web resource, where the capabilities of the firewall are extremely limited and it is not able to detect this attack. For such purposes, specialized firewalls are used that work at the application level and have a large number of signatures aimed at detecting attacks on Web applications. These firewalls are called WAF (Web Application Firewall). The purpose of this solution is to detect and block attacks on Web resources using filtering http / https protocols. Web Application Firewall Can Be Implemented As a Hardware Device, Virtual Machine Classic WAF placement on the network in reverse proxy mode in front of protected web servers. Depending on the manufacturer other modes of operation may also be supported for example transparent proxy, bridging, or even passive mode, when the product works with traffic replication. After installing WAF and launching productive traffic, the main component of protection immediately starts working machine learning, during which a reference model of communication with the protected object is compiled, and thus a "white" list of acceptable access identifiers is formed. Currently, three types of access identifiers are used in web applications: HTTP parameters (in views of the type: Raw, XML, JSON), resource identifier (URL, URN), session identifier (cookie). The WAF's job is to determine the valid identifier values for the web application. The reference (positive) model will subsequently be composed of certain values. The inclusion of specific identifier values in the model is based on the use of a mathematical statistical algorithm, which evaluates these values as valid using a sample of productive traffic. When all the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. which evaluates these values as valid using a sample of productive traffic. When all
https://www.briskinfosec.com the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. which evaluates these values as valid using a sample of productive traffic. When all the resources of the web application are added to the positive model, the system administrator must ensure that there are no significant number of false positives and switch the system to blocking mode. In addition to machine learning the WAF feature set usually includes the following typical security mechanisms: protocol validation, signature analysis, protection against injection and XSS (often proprietary) the ability to create your own protection rules; DDoS protection; integration with reputation and fraud services; integration with other devices in the company's information security landscape. The priority for the WAF manufacturer is to focus its own research centers on generating security policy updates for their devices, taking into account the current threats to web applications. This is how, for example, attack signatures inherent in specific web frameworks and content control systems or proprietary protection mechanisms against XSS and SQL injection appear. Our company supplies web application security assessment service and solutions from leading manufacturers