K. Nagendran, S. Balaji, B. A. Raj, P. Chanthrika, RG Amirthaa
{"title":"Web应用防火墙规避技术","authors":"K. Nagendran, S. Balaji, B. A. Raj, P. Chanthrika, RG Amirthaa","doi":"10.1109/ICACCS48705.2020.9074217","DOIUrl":null,"url":null,"abstract":"Recently there has been a robust increase in cyber attacks. Statistical studies show that around 4% of internet traffic is malicious. Firewalls are deployed as blocking mechanisms to identify and prevent malicious requests. They filter seemingly malicious packets based on the filter rules. Despite the filters, there are certain evasion techniques used by attackers to bypass the firewall. This paper describes the techniques for bypassing the web application firewall based on their configurations and paranoia levels of implementation so that security researchers can understand loop holes in the firewall to build a better firewall strategy. By these techniques, an attacker can achieve the attacks he intends to do even if the firewall is placed between the web application and the client.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Web Application Firewall Evasion Techniques\",\"authors\":\"K. Nagendran, S. Balaji, B. A. Raj, P. Chanthrika, RG Amirthaa\",\"doi\":\"10.1109/ICACCS48705.2020.9074217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently there has been a robust increase in cyber attacks. Statistical studies show that around 4% of internet traffic is malicious. Firewalls are deployed as blocking mechanisms to identify and prevent malicious requests. They filter seemingly malicious packets based on the filter rules. Despite the filters, there are certain evasion techniques used by attackers to bypass the firewall. This paper describes the techniques for bypassing the web application firewall based on their configurations and paranoia levels of implementation so that security researchers can understand loop holes in the firewall to build a better firewall strategy. By these techniques, an attacker can achieve the attacks he intends to do even if the firewall is placed between the web application and the client.\",\"PeriodicalId\":439003,\"journal\":{\"name\":\"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCS48705.2020.9074217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS48705.2020.9074217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recently there has been a robust increase in cyber attacks. Statistical studies show that around 4% of internet traffic is malicious. Firewalls are deployed as blocking mechanisms to identify and prevent malicious requests. They filter seemingly malicious packets based on the filter rules. Despite the filters, there are certain evasion techniques used by attackers to bypass the firewall. This paper describes the techniques for bypassing the web application firewall based on their configurations and paranoia levels of implementation so that security researchers can understand loop holes in the firewall to build a better firewall strategy. By these techniques, an attacker can achieve the attacks he intends to do even if the firewall is placed between the web application and the client.