pooja.ppoj
pooja.ppoj
pooja.ppoj
net/publication/387187876
CITATIONS READS
0 136
1 author:
Monika Prakash
Sri Shakthi Institute of Engineering and Technology
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Monika Prakash on 19 December 2024.
Abstract —This concept of a web application firewall Traditional WAFs often rely on signature-based
(WAF) was initially introduced by Net Continuum, a detection, which involves matching incoming requests
company specializing in network security, in the late against a database of known attack patterns. While
1990s. A web application firewall (WAF) is a security effective against known attacks, signature-based
tool that monitors, filters, and blocks HTTP traffic to detection may struggle to identify novel and zero-day
protect web applications from cyber threats. This web attacks. To overcome this limitation, anomaly-based
application firewall (WAF) enhances security with detection techniques have gained popularity. These is
five key modules. Request Filtering (Flask) screens
techniques analyse the behaviour of incoming requests
incoming traffic, while Signature-Based Detection
and identify of a word those deviations from normal
(regex) catches known attack patterns. Anomaly-
indicating potential attacks.
Based Detection (PyOD) identifies unusual
behaviour, and Data Loss Prevention (DLP) prevents This project aims to develop a WAF that combines the
sensitive data leaks. Finally, Logging and strengths of both signature-based and anomaly-based
Monitoring (logging library) tracks firewall activities detection. By leveraging machine learning algorithms,
for ongoing analysis, creating a layered defence for the WAF can learn from historical data and adapt to
web applications. evolving threats. Additionally, the WAF will
Keyword: Web Application Firewall (WAF), Flask, incorporate data loss prevention (DLP) techniques to
Signature based detection, Anomaly based detection, protect sensitive information from unauthorized access
Data loss prevention (DLP), exfiltration. and exfiltration.
The proposed WAF will be implemented using Python
I. INTRODUCTION versatile programming language well-suited for web
In recent years, the increasing reliance on web development and machine learning. By utilizing open-
applications has led to a surge in cyberattacks targeting source libraries and frameworks, the WAF can be
these systems. Malicious actors exploit vulnerabilities developed effectively. The WAF will be evaluated on
in web applications to steal sensitive data, disrupt its ability to detect and block various types of attacks,
services, and compromise user privacy. To address including SQL injection, XSS, and brute-force attacks.
these threats, Web Application Firewalls (WAFs) have It will also be assessed based on its performance in
emerged as a critical security measure. WAFs act as a terms of latency, throughput, and resource utilization.
security layer between web applications and the SQL injection attacks, they continue to persist as a
internet, filtering and monitoring incoming and prevalent and persistent threat, affecting organizations
outgoing traffic. across various industries and sectors.
II LITERATURE REVIEW
Web Application Firewalls (WAFs) have become this a (2020). Effective logging provides an audit trail of security
crucial component of web security frameworks, designed to events, which is vital for compliance with regulations such
protect web applications from various attacks, particularly as SOC 2 and PCI DSS. Python’s logging library is
those targeting known vulnerabilities such as SQL commonly used for this purpose due to its flexibility and
injection, cross-site scripting (XSS), and cross-site request ease of integration. Costa and Martins demonstrated that
forgery (CSRF). With the growth of web applications and automated logging reduces the response time in detecting
increasing sophistication of attacks, WAFs offer a robust and mitigating threats, allowing security teams to act on
line of defenes. Research in this area focuses on enhancing potential incidents in near real-time.
detection accuracy, minimizing false positives, and Regulatory compliance is a recurring theme across WAF
integrating compliance with data protection laws. research, particularly with the increasing impact of data
2.1 REQUEST FILTERING protection laws. Examining case studies on SQL injection
: In "Web Application Firewall: Network Security Models vulnerabilities, Berger et al. (2022) explored the legal
and Configuration" (IEEE, 2022), the authors discuss the consequences of breaches and the role of WAFs in
role of HTTP request filtering as part of WAFs, mitigating such risks. Their findings suggest that WAFs not
emphasizing layered filtering techniques to block malicious only provide technical security but also help organizations
requests based on content and request patterns. They avoid substantial fines associated with data breaches.
analyse configurations and challenges, particularly the need In conclusion, the literature indicates that a modular WAF,
for efficient filtering to prevent false positives and ensure combining request filtering, signature-based detection,
low latency in web applications. anomaly detection, DLP, and logging, provides
2.2 SIGNATURE BASED DETECTION comprehensive security. Studies advocate for hybrid WAFs
The paper "Web Application Firewall Using Machine that adapt to evolving threats while maintaining compliance
Learning" (IEEE, 2022) explores how signature-based with regulatory frameworks.
methods, combined with machine learning, enhance WAFs . For future work on your web application firewall, you could
by identifying predefined threat signatures such as SQL enhance its intelligence and flexibility by integrating
injection and XSS attacks. Regular expressions are advanced machine learning and data analytics techniques.
highlighted as a core mechanism for signature detection, Improving the anomaly detection module with custom
effectively capturing known attack patterns while models could allow for more sophisticated behavior-based
improving detection reliability when combined with ML detection. This could be paired with real-time threat
models. intelligence feeds, which would enable your firewall to
2.3 ANAMOLY BASED DETECTION update its rules dynamically and defend against evolving
In the 2021 study "Improving Web Application Firewalls threats. Moreover, incorporating sensitive data
through Anomaly Detection," researchers apply PyOD- classification and file fingerprinting in the DLP module
based models to improve detection accuracy for atypical could help protect against subtle data leaks, making it more
requests. The study highlights one-class classification effective at securing confidential information.
methods and their ability to flag anomalies by learning Furthermore, enhancing the firewall’s performance and
normal traffic patterns, a critical approach for spotting zero- usability can contribute to a seamless and robust security
day attacks that don’t match existing signatures. framework. Implementing caching mechanisms for non-
2.3 DATA LOSS PREVENTION (DLP) sensitive data requests would reduce server load and
The IEEE paper "A Survey on Data Loss Prevention for response times, making the system more responsive during
Web Application Firewalls" (2021) investigates DLP high-traffic periods. Integrating with a load balancer would
techniques integrated into WAFs. This work emphasizes the also help maintain performance by distributing traffic
use of pattern matching and content analysis to detect and effectively, ensuring high availability and reliability even
block sensitive data from being exfiltrated through web under intense load. Lastly, providing comprehensive
applications, particularly in contexts where regulatory documentation, including user guides and developer
compliance (e.g., GDPR) is essential. tutorials, would make it easier for other users to deploy,
2.5 LOGGING AND MONITORING configure, and extend the firewall as needed. This focus on
"Web Application Firewall: Logging and Monitoring for scalability and ease of use, combined with the advanced
Enhanced Security" (IEEE, 2023) explores the importance security features, would make the firewall not only
of structured logging in WAFs to track security incidents. powerful but also highly accessible and adaptable to diverse
Real-time log analysis and monitoring help identify operational requirements. Implementing customizable
ongoing attack patterns, facilitating quick responses and filtering rules and automated signature updates would
post-attack forensics. This paper underlines the importance enhance adaptability to new threats, while real-time alerts
of comprehensive logs for continuous security and dashboards would improve response efficiency. Adding
improvements. role-based access controls ensures only authorized users
Incident analysis and regulatory compliance are essential manage the firewall. Together, these enhancements make
components of a WAF, as reinforced by Costa and Martins the firewall robust, responsive, and user-friendly.
III PROPOSED SYSTEM FIG:3.1 WORK OF WEB APPLICATION FIREWALL