24. Research Importance of Web Application Firewall Technology for Protecting Web-based Resources By ICSA Labs
25.
26. Existing Technologies for Network Security Protocol-Enforcing Network Firewalls They provide the first line of defense by arresting most basic protocol attacks at the network boundary, including protocol-based denial of service attacks. They primarily operate in the network, session, and transport layers of the Open Systems Interconnection (OSI) reference model.
27. Intrusion Prevention Systems IPS can be deployed at various locations within an enterprise network. IPS agents monitor network traffic and scan for signatures of a wide range of known attacks. IPS is effective at providing signature scanning, pattern matching, anomaly detection, and behavioral-based functionality for a broad range of known attacks that make it past perimeter defenses.
28. Outbound Content Filtering They provide access control for internal corporate users as they access information from the Internet. Content filtering provides protection to an enterprise by preventing users from accessing malicious or otherwise dangerous external content by enforcing white and black lists of known good and known bad Internet sites. More sophisticated content filtering platforms provide additional protection by monitoring other services, including instant messaging and file transfer systems such as FTP and peer-to-peer (P2P).
29. Anti-Malware Gateways “ Malware” refers to malicious code such as viruses, Trojans, rootkits, macro viruses, etc., as well as other undesirable content such as spyware and phishing links. Anti-malware gateways scan inbound and outbound content, including email, instant messaging, and file downloads, for code that can compromise client security. Recent enhancements include outbreak prevention by which a gateway can signal other security devices to limit propagation when malware is detected.
30. Web Application Firewalls Web application firewalls (WAFs) deal specifically with web-based traffic. They employ a wide range of functions to work with perimeter firewall and IPS technology to increase application attack prevention. Most WAFs include HTTP/HTTPS protocol enforcement and negative signature detection. Other protection mechanisms include URL normalization and scanning, positive security functionality that enforces proper application operation and page logic flow, and adaptive learning modules that can update security policies on the fly.
31. Continued WAFs can recognize and be configured to police the usage of specific web application elements and functions, such as web objects, form fields, and, most importantly, application session logic. WAFs enforce proper context of the HTML request and response, as well as provide semantic awareness of the relationships of the various web objects present on a web site, WAFs can be deployed between perimeter defenses and the web servers they protect, or installed directly on web server platforms as host-based WAFs.
34. Conclusion Dedicated WAFs are designed specifically for HTTP/HTTPS protocols and are required in addition to traditional security technologies to provide a complete solution for securing web applications. They provide web-specific functionality and application language-specific functionality. These capabilities are vital to preventing sophisticated attacks and protecting valuable information assets.