Главная
Study mode:
on
1
Introduction
2
Story
3
Questions
4
Another Question
5
Question Answers
6
What can I learn
7
What can I do
8
Today Im going to talk about
9
Three Methods
10
Objectives
11
IP Reputation
12
Adolf Signature
13
File Upload
14
Web Hive
15
BotNet Mitigation
16
Similarities between attackers
17
Excessive access
18
Analysis
19
Enhanced Executive Report
20
Case Study
21
Webhive
22
Actionable Insights
23
Analysis Reporting
24
Querying the database
Description:
Explore advanced techniques for post-processing ModSecurity Core Rule Set WAF triggers to generate actionable defenses in this 40-minute conference talk from AppSecEU 2014. Learn how to analyze collected malicious HTTP traffic to gain new insights on attackers and their techniques, enabling improved security controls and hardened defenses. Dive into detailed case studies based on real traffic from Akamai's Cloud Security Intelligence platform, including examples of remote file inclusion attacks and methods for generating signatures to enhance detection capabilities. Discover how to leverage attack "anchors" for enriching other security controls, monitoring URL and domain reputation, and correlating distributed attack campaigns. Gain valuable knowledge on improving web application security through innovative analysis of WAF data.

Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

OWASP Foundation
Add to list