Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach

被引:10
|
作者
Sepczuk, Mariusz [1 ]
机构
[1] Warsaw Univ Technol, Fac Elect & Informat Technol, Warsaw, Poland
关键词
Web Application Firewall; Mimic defense; DHR; Dynamic security; Web application security;
D O I
10.1016/j.jnca.2023.103596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase of publicly available applications on the Internet, the number of new vulnerabilities increases. The currently used security methods are static and predictable and therefore have problems detecting unknown vulnerabilities. This issue creates an advantage for attackers - more attacks are carried out successfully than existing countermeasures that protect against them. It can especially be seen when considering the protection provided by Web Application Firewalls (WAF). Namely, it is often enough to obfuscate an attacker's payload to bypass security mechanisms successfully. Of course, many approaches are used to improve the protection provided by WAF, but this is associated with many problems, and a high level of security is expected almost from the moment such a device is deployed. One such approach may be the use of mimic defense, which is a proactive method of detecting unknown attacks. This paper presents the results of experiments in the network with web servers secured by WAF with additional protection provided by the mimic defense idea. The conducted research shows that the usage of mimic defense increases the number of detected and blocked attack attempts. It also introduces the unpredictability that an attacker has to confront when trying to carry out an attack. Moreover, the proposed concept allows for creating new temporary rules that supply the WAF while increasing the chances of detecting previously undiscovered attacks.
引用
收藏
页数:17
相关论文
共 43 条
  • [21] Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
    Nunes, Paulo
    Fonseca, Jose
    Vieira, Marco
    IEEE ACCESS, 2025, 13 : 3139 - 3153
  • [22] An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach
    Li, Yumei
    Voos, Holger
    Darouach, Mohamed
    Hua, Changchun
    IMA JOURNAL OF MATHEMATICAL CONTROL AND INFORMATION, 2016, 33 (04) : 1081 - 1102
  • [23] Vulnerability Detection in PHP Web Application Using Lexical Analysis Approach with Machine Learning
    Anbiya, Dhika Rizki
    Purwarianti, Ayu
    Asnar, Yudistira
    PROCEEDINGS OF 2018 5TH INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2018,
  • [24] Peptipedia: a user-friendly web application and a comprehensive database for peptide research supported by Machine Learning approach
    Quiroz, Cristofer
    Saavedra, Yasna Barrera
    Armijo-Galdames, Benjamin
    Amado-Hinojosa, Juan
    Olivera-Nappa, Alvaro
    Sanchez-Daza, Anamaria
    Medina-Ortiz, David
    DATABASE-THE JOURNAL OF BIOLOGICAL DATABASES AND CURATION, 2021,
  • [25] UAV Detection using Web Application Approach based on SSD Pre-Trained Model
    Wastupranata, Leonard Matheus
    Munir, Rinaldi
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON AEROSPACE ELECTRONICS AND REMOTE SENSING TECHNOLOGY (ICARES 2021), 2021,
  • [26] An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique
    Bharati, Vishal
    Kumar, Arun
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 781 - 792
  • [27] Count vectorizer model based web application vulnerability detection using artificial intelligence approach
    Manjunatha, K. M.
    Kempanna, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2039 - 2048
  • [28] An Approach for the Application of a Dynamic Multi-Class Classifier for Network Intrusion Detection Systems
    Larriva-Novo, Xavier
    Sanchez-Zas, Carmen
    Villagra, Victor A.
    Vega-Barbas, Mario
    Rivera, Diego
    ELECTRONICS, 2020, 9 (11) : 1 - 18
  • [29] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [30] A Novel End-to-End Deep Learning Approach for Skin Cancer Detection Based on Web Application
    Alqahtani, Mejdal A.
    TRAITEMENT DU SIGNAL, 2024, 41 (04) : 1781 - 1796