WAF (Web Application Firewall)
WAF (Web Application Firewall)
WAF (Web Application Firewall)
So main question which occurs is that why WAF if we have firewall in networks. Our
Traditional firewalls like Network firewalls, intruder detection systems (IDS) & Intrusion
Prevention Systems (IPS) are good at providing network-level security and network level
traffic security. But they don’t have the ability to stop OWASP (Open Web Application
Security Project) like SQL injection, session hijacking, cross-site scripting and many more.
In simple They can’t protect application layer attacks. A WAF is most like a proxy firewall
but with a specific focus on application layer or layer 7 logic.
EXAMPLE
A company suffered massive DDoS attacks that caused a 70% traffic spike. This led to
timeouts for most of the users trying to access the company’s website.
These application level attacks were using HTTPS, so setting filters to stop the DDoS bots
may have also blocked genuine website users. The only way the company could handle this
situation was to use a web application firewall that had the ability to filter and control
HTTP traffic.
The WAF service that Company implemented could detect users based on their IP
addresses and provide the necessary protection against HTTP attacks. The implementation
of the WAF resulted in a drop in the unwanted traffic, thereby improving site performance.
Example
Page news.jsp, the field id could only accept characters [0-9] and starting at number 0 until
65535
2) Automated Patches
Some WAFs have the ability to use your scan findings to temporarily patch your application
for immediate protection. This temporary patch isn’t a full solution, but it’s enough to
mitigate risk until you’ve prepared a permanent fix.
built-in. But you can customize, and add any additional signatures, such as specific files,
information or code.
Features of WAF
1) Understanding HTTP/XML
➢ HTTP protocol support
➢ XML/SOAP support
➢ Anti-evasion
➢ SSL Decryption / Inspection
2) Building Blocks
➢ Signatures
➢ Policy engine
3) Network
➢ SSL Acceleration
➢ Non-transparent / privacy
➢ Connection pooling
➢ User authentication