Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach

被引:10
|
作者
Sepczuk, Mariusz [1 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
Web Application Firewall; Mimic defense; DHR; Dynamic security; Web application security;
D O I
10.1016/j.jnca.2023.103596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of publicly available applications on the Internet, the number of new vulnerabilities increases. The currently used security methods are static and predictable and therefore have problems detecting unknown vulnerabilities. This issue creates an advantage for attackers - more attacks are carried out successfully than existing countermeasures that protect against them. It can especially be seen when considering the protection provided by Web Application Firewalls (WAF). Namely, it is often enough to obfuscate an attacker's payload to bypass security mechanisms successfully. Of course, many approaches are used to improve the protection provided by WAF, but this is associated with many problems, and a high level of security is expected almost from the moment such a device is deployed. One such approach may be the use of mimic defense, which is a proactive method of detecting unknown attacks. This paper presents the results of experiments in the network with web servers secured by WAF with additional protection provided by the mimic defense idea. The conducted research shows that the usage of mimic defense increases the number of detected and blocked attack attempts. It also introduces the unpredictability that an attacker has to confront when trying to carry out an attack. Moreover, the proposed concept allows for creating new temporary rules that supply the WAF while increasing the chances of detecting previously undiscovered attacks.
引用
收藏
页数:17
相关论文
共 43 条
  • [1] Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
    Li, Qianmu
    Meng, Shunmei
    Sang, Xiaonan
    Zhang, Hanrui
    Wang, Shoujin
    Bashir, Ali Kashif
    Yu, Keping
    Tariq, Usman
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
  • [2] Artificial Intelligent Web Application Firewall for advanced detection of web injection attacks
    Roman-Gallego, Jesus-Angel
    Perez-Delgado, Maria-Luisa
    Vinuela, Marcos Luengo
    Vega-Hernandez, Maria-Concepcion
    EXPERT SYSTEMS, 2025, 42 (01)
  • [3] Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks
    Dawadi, Babu R.
    Adhikari, Bibek
    Srivastava, Devesh K.
    SENSORS, 2023, 23 (04)
  • [4] Web Application Firewall Based on Anomaly Detection using Deep Learning
    Toprak, Sezer
    Yavuz, Ali Gokhan
    ACTA INFOLOGICA, 2022, 6 (02): : 219 - 244
  • [5] A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks
    Miehling, Erik
    Rasouli, Mohammad
    Teneketzis, Demosthenis
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2490 - 2505
  • [6] A QoS-supported approach using fault detection and tolerance for achieving reliability in dynamic orchestration of web services
    Gupta R.
    Kamal R.
    Suman U.
    International Journal of Information Technology, 2018, 10 (1) : 71 - 81
  • [7] An approach for dynamic web application testing using MBT
    Panthi V.
    Mohapatra D.P.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 2) : 1704 - 1716
  • [8] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [9] Data mining approach to web application intrusions detection
    Kalicki, Arkadiusz
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2011, 2011, 8008
  • [10] Detection and defense of application-layer DDoS attacks in backbone web traffic
    Zhou, Wei
    Jia, Weijia
    Wen, Sheng
    Xiang, Yang
    Zhou, Wanlei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 38 : 36 - 46