Academic literature on the topic 'Web Application Firewall (WAFW)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web Application Firewall (WAFW).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web Application Firewall (WAFW)"

1

Dr., A.SHAJI GEORGE, and GEORGE A.S.HOVAN. "A Brief Study on The Evolution of Next Generation Firewall and Web Application Firewall." IJARCCE:International Journal of Advanced Research in Computer and Communication Engineering 10, no. 5 (2021): 31–37. https://doi.org/10.5281/zenodo.7027397.

Full text
Abstract:
The rapid development of Information Technology (IT) has altered the appearance of the network perimeter. Data is all around, with users who access it from around the world and from all types of devices. At the same moment, Information Technology (IT) teams are implementing analytics, cloud, as well as automation to quicken the delivery of innovative applications and drive business development. These essential changes have created a threat environment that reveals weaknesses in legacy security technologies, for example, the port-based network security, as well as the different tools and techno
APA, Harvard, Vancouver, ISO, and other styles
2

A. Zaki, Aya, and Saja J. Mohammed. "Artificial Intelligence for Web Application Firewall (WAF): A Comprehensive Review." International Research Journal of Innovations in Engineering and Technology 08, no. 11 (2024): 219–24. https://doi.org/10.47001/irjiet/2024.811027.

Full text
Abstract:
The increasing prevalence of cyberattacks that bypass traditional defenses necessitates prioritizing web application security .So, that create an urgent need to use “firewalls”, especially with web applications. The paper submitted a summary of the search and analysis of the scientific literature on web applications, in addition to the studies that have been suggested model for a “web application firewall (WAF)” that employed features engineering and machine learning to identify frequent online threats. The existing research examined WAFs and test their effectiveness in identifying fraudulent
APA, Harvard, Vancouver, ISO, and other styles
3

Durmuşkaya, Muhammed Ersin, and Selim Bayraklı. "Web application firewall based on machine learning models." PeerJ Computer Science 11 (July 16, 2025): e2975. https://doi.org/10.7717/peerj-cs.2975.

Full text
Abstract:
The increasing reliance on web applications for storing sensitive data and financial transactions has elevated the importance of web application security. A machine learning-based web application firewall was designed to protect web applications against injection vulnerabilities. A hybrid dataset, including CISC 2010, HTTPParams 2015, and real-time Hypertext Transfer Protocol (HTTP) requests, was employed. The study evaluated five classification algorithms—K-nearest neighbors, logistic regression, naïve Bayes, support vector machine, and decision tree—for detecting cross site scripting (XSS),
APA, Harvard, Vancouver, ISO, and other styles
4

Rizal, Randi, and Yusuf Sumaryana. "Peningkatan Keamanan Aplikasi Web Menggunakan Web Application Firewall (WAF) Pada Sistem Informasi Manajemen Kampus Terintegrasi." Jurnal ICT : Information Communication & Technology 20, no. 2 (2021): 323–30. http://dx.doi.org/10.36054/jict-ikmi.v20i2.416.

Full text
Abstract:
Increasing the security of web applications on the integrated campus management information system needs to be done because the application is accessed by public networks so that there are many attacks and attempts to prevent threats from attackers. This study applies a Web Application Firewall (WAF)-based application security using ModeSecurity and Core Rules Set from Owasp which aims to improve the security system of the web application by using a firewall. This study uses an experimental method by implementing a Web Application Firewall (WAF) as a web-based protection system, then the proce
APA, Harvard, Vancouver, ISO, and other styles
5

Riska, Riska, and Hendri Alamsyah. "Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 11, no. 1 (2021): 37–42. http://dx.doi.org/10.33369/jamplifier.v11i1.16683.

Full text
Abstract:
The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in which the purpose of implementing this web security system is to understand the concept of a security system on the web and pay attention to the results before the application of the firewall and after the application of the firewall on the web. This research uses experimental research methods, in this study the implementation of a web application
APA, Harvard, Vancouver, ISO, and other styles
6

Alotaibi, Fahad M., and Vassilios G. Vassilakis. "Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks." Future Internet 15, no. 5 (2023): 170. http://dx.doi.org/10.3390/fi15050170.

Full text
Abstract:
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand, software-defined networking (SDN) technology has significantly improved network management and operation by providing centralized control for network administrators. In this work, we investigated the possibility of using SDN to implement a firewall capable of detecting and blocking web attacks. As a proof of concept, we designed and implement
APA, Harvard, Vancouver, ISO, and other styles
7

Surekha, M., K. Kiran Kumar, M. V.S.Prasanth, and P. S.G.Aruna Sri. "Web application firewall using XSS." International Journal of Engineering & Technology 7, no. 2.7 (2018): 941. http://dx.doi.org/10.14419/ijet.v7i2.7.11429.

Full text
Abstract:
Web Applications security has turned out to be logically more essential nowadays. Tremendous quantities of assaults are being sent on the web application layer. Because of emotional increment in Web applications, security gets helpless against assortment of dangers. The ma-jority of these assaults are focused towards the web application layer and system firewall alone can't keep these sorts of assaults. The essen-tial explanation for achievement of these assaults is the numbness of utilization designers while composing the web applications and the vulnerabilities in the current advancements. W
APA, Harvard, Vancouver, ISO, and other styles
8

Rizqi, Muhamad Fahrizal, Rohmat Tulloh, and Nazel Djibran. "Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 341–48. http://dx.doi.org/10.32493/informatika.v8i2.33691.

Full text
Abstract:
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by attackers, for that network security is very important to avoid theft of important data Security in a web application is a important aspect to have. Securing a web application can be done by installing a firewall that is connected directly to the server network. Security for a web application usually uses a web application firewall installed on a web server. To overcome a security problem in Web Applications and minimize
APA, Harvard, Vancouver, ISO, and other styles
9

Annas, Muhammad, Rizal Tjut Adek, and Yesy Afrillia. "Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications." Journal of Advanced Computer Knowledge and Algorithms 1, no. 3 (2024): 52. http://dx.doi.org/10.29103/jacka.v1i3.16315.

Full text
Abstract:
Data leakage cases have recently been rampant in Indonesia. One of the biggest is the leak of user data from BPJS Health in 2021, this data leak is certainly very detrimental to users. This research develops a Web Application Firewall (WAF) using ModSecurity and OWASP Core Rule Set to protect web applications from SQL Injection and XSS attacks. The methodology involves analyzing the functionality of the existing system using UML, with DVWA and WordPress as test objects. Results showed 100% SQL Injection and 99.8% XSS attack detection, with logs recording attacks in real-time. The findings emph
APA, Harvard, Vancouver, ISO, and other styles
10

ALQAHTANI, ABDULLAH HAMAD. "Web Intrusion Detection Systems Comparison: Techniques and usage." Journal of Computer and Information Technology 13, no. 1 (2022): 1–10. http://dx.doi.org/10.22147/jucit/130101.

Full text
Abstract:
Web attacks are one of the most concern these days. Vulnerable applications require protection, which can be provided through web application firewalls (WAF) and web intrusion detection systems (WIDS). Some of them are signature based and some detect / protect through anomaly detection. Various commercial solutions have been offered by vendors like CISCO ACE application firewall, Barracuda application firewall etc. Open source community has also contributed some formidable solutions like ModSecurity, PHPIDS, Ironbee, WebKnight and Snort etc. No solution has yet proven to be the silver bullet a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Web Application Firewall (WAFW)"

1

Anantaprayoon, Amata. "Project X : All-in-one WAF testing tool." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97102.

Full text
Abstract:
Web Application Firewall (WAF) is used to protect the Web application (web app). One of the advantages of having WAF is, it can detect possible attacks even if there is no validation implemented on the web app. But how can WAF protect the web app if WAF itself is vulnerable? In general, four testing methods are used to test WAF such as fuzzing, payload execution, bypassing, and footprinting. There are several open-source WAF testing tools but it appears that it only offers one or two testing methods. That means a tester is required to have multiple tools and learn how each tool works to be abl
APA, Harvard, Vancouver, ISO, and other styles
2

Thomassen, Pål. "AppSensor : Attack-aware applications compared against a web application firewall and an intrusion detection system." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18576.

Full text
Abstract:
The thesis takes a look at the OWASP AppSensor project. The OWASP AppSensor project is about the idea of detecting attacks inside the applicaiton. The thesis compares OWASP AppSensor against both a web application firewall and an intrusion detection system. The comparison is based both on a short litterature study and an experiment performed. The experiment was a set of attacks based on OWASP top ten list which were executed against a simple bank web application. In the experiment the intrusion detection systems, web application firewall and the AppSensor detection points inside the applicatio
APA, Harvard, Vancouver, ISO, and other styles
3

Ляшенко, Г. Є., та В. В. Шевчук. "Дослідження можливостей міжмережних екранів нового покоління NGFW". Thesis, ФОП Петров В. В, 2021. https://openarchive.nure.ua/handle/document/18677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
APA, Harvard, Vancouver, ISO, and other styles
5

VALENZA, ANDREA. "<script>alert('Expect the Unexpected')</script>: Raising Cybersecurity Awareness by Hook or by Crook." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1041466.

Full text
Abstract:
In the last decades, computer security has been a constantly growing concern. Nowadays it is a common understanding that, although crucial, technology alone is not the ultimate solution. To effectively and promptly face new menaces, well-trained security experts and a properly designed process are necessary. Both of them can only be attained via a proper cybersecurity culture. In this thesis, we address the problems related to the correct cybersecurity mindset. In particular, we focus on two important aspects, i.e., (i) using security testing to show the lack of a correct mindset in the wil
APA, Harvard, Vancouver, ISO, and other styles
6

Medici, Samuele. "Applicazioni client-server sicure per utenti in mobilità." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17993/.

Full text
Abstract:
In questa tesi è stata svolta un'analisi approfondita di una tipica architettura client server, dove il server è situato all'interno di una intranet aziendale e il client può accedere ai suoi servizi tramite dispositivi mobili e non mobili. L'analisi parte da ogni componente, dispositivi per l'accesso, le reti utilizzate e come i server della intranet mettono a disposizione tali servizi. Sono stati presi in considerazione le principali minacce che incombono su tali componenti e da questo punto sono state fatti studi su quali componenti impiegare per contrastare tali minacce. Gli sviluppi s
APA, Harvard, Vancouver, ISO, and other styles
7

Hsueh, Hsiangcheng, and 薛向程. "A Study Of Lightweight Web Application Firewall." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/60589494311676524841.

Full text
Abstract:
碩士<br>靜宜大學<br>資訊傳播工程學系<br>100<br>With the increasing number of Internet users and web sites, and the evolution of web 2.0, more and more personal data and commercial information can be retrieved through the Internet. In order to obtain the business and political benefits, malicious attacks on web sites occur frequently today. Therefore, enabling data protection on web sites and web applications is more and more important. Current network intrusion detection system can be used for comprehensive protection on local area network. However, this system is too heavy. When we need this intrusion dete
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Tsung-Chih, and 劉宗治. "Design and Implement of a Hadoop-based SIEM System-A Case Study of Web Application Firewall." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/teaw8t.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>101<br>With the tremendously improvement of network technologies and the increased popularization of networking, information security has received a significant attention from human beings. Especially, analyzing a huge amount of log data to extract implicit or explicit attacks, so to alert system managers or execute defense procedures has become a major research area. To rapidly and automatically handle the information security issue, many researchers have proposed the Security Informant and Event Management (SIEM) system. Thus, by the SIEM system, we can detect a
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Web Application Firewall (WAFW)"

1

Baloch, Rafay. "Evading Web Application Firewalls (WAFs)." In Web Hacking Arsenal. CRC Press, 2024. http://dx.doi.org/10.1201/9781003373568-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pałka, Dariusz, and Marek Zachara. "Learning Web Application Firewall - Benefits and Caveats." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23300-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prandl, Stefan, Mihai Lazarescu, and Duc-Son Pham. "A Study of Web Application Firewall Solutions." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Torrano-Gimenez, Carmen, Alejandro Perez-Villegas, and Gonzalo Alvarez. "A Self-learning Anomaly-Based Web Application Firewall." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04091-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Raju, S. Lokesh, Santosh Sheshware, and Ruchit R. Patel. "Use ModSecurity Web Application Firewall to Mitigate OWASP's Top 10 Web Application Vulnerabilities." In Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture. River Publishers, 2022. https://doi.org/10.1201/9781003338512-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Román-Gallego, Jesús-Ángel, María-Luisa Pérez-Delgado, and Marcos Luengo Viñuela. "Development of Web Application Firewall Based on Artificial Intelligence." In Advances in Intelligent Systems and Computing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38344-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of WEB Application Firewall Based on Feature Matching." In Application of Intelligent Systems in Multi-modal Information Analytics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15740-1_154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mounika, Gollapudi, N. Sunanda, G. Sathar, V. Raghavendra Sai, and K. Chandra Shekar. "Enhancing web application security: A machine learning approach to firewall implementation." In Intelligent Computing Techniques and Applications. CRC Press, 2025. https://doi.org/10.1201/9781003658221-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bahruddin, Habib, Vera Suryani, and Aulia Arif Wardana. "Adversary Simulation of Structured Query Language (SQL) Injection Attack Using Genetic Algorithm for Web Application Firewalls (WAF) Bypass." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-47724-9_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Trinh, Cong-Vu, Thien-Thanh Le, Minh-Khoi Le-Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, and Khuong Nguyen-An. "An Efficient Machine Learning-Based Web Application Firewall with Deep Automated Pattern Categorization." In Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8296-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web Application Firewall (WAFW)"

1

Nikam, Yuvraj, Sachin Ware, Tarun Patil, Harshavardhan Waghmare, Suruchi Dedgaonkar, and Pravin Futane. "Ai-Based Web Application Firewall." In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT). IEEE, 2025. https://doi.org/10.1109/icccit62592.2025.10928035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maheshwari, Muskan, Aniket Nayak, Asmit Sethy, and Sujatha G. "Adaptive Web Application Firewall for Multi-Threat Detection." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Kanan, Dhanashree P. Kesarkar, Manasi M. Jadhav, Sampada S. Lagad, Nilesh B. Korade, and Vinodkumar Bhutnal. "Smart Defense: Machine Learning-Based Web Application Firewall." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Anil, J. B. Simha, and Rashmi Agarwal. "Machine Learning-Based Web Application Firewall for Real-Time Threat Detection." In 2024 IEEE Conference on Engineering Informatics (ICEI). IEEE, 2024. https://doi.org/10.1109/icei64305.2024.10912239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Darmawan, Irfan, Afan Nuridwan, Alam Rahmatulloh, Rohmat Gunawan, and Randi Rizal. "Real-time Web Application Firewall Monitoring uses the OWASP CRS Framework." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10956835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Jiale, and Wen Cheng. "Design and Implementation of a Web Application Firewall System based on OpenResty." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10673202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhote, Sanjana, Aditya Magdum, Siddharth Singh, and Dipika Raigar. "ML based Web Application Firewall for Signature and Anomaly Detection Using Feature Extraction." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sa'adah, Khoerina, Rayhan Ramdhany Hanaputra, Girinoto, and Setiyo Cahyono. "A Deep Learning Approach to Detect Cross-Site Scripting Attack as a Web Application Firewall." In 2024 International Conference on Information Technology and Computing (ICITCOM). IEEE, 2024. https://doi.org/10.1109/icitcom62788.2024.10762471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wiradyaksa, IGNB Dimas, Dwi Haura Putri, Roihan Muhammad Iqbal, Novia Helni Astari, Nyoman Karna, and Favian Dewanta. "Design and Implementation of Automated Web Application Firewall, Rate Limiting, and Intrusion Detection System for Cyber Defense." In 2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2024. http://dx.doi.org/10.1109/icitisee63424.2024.10730693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Muryllo Pimenta de, and Carlo Marcelo Revoredo da Silva. "MinimalisticWAF: Um Web Application Firewall baseado em ganchos de APIs I/O." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19279.

Full text
Abstract:
Muitos servidores na web são protegidos somente por firewalls baseados em proxy e são vulneráveis à ataques direcionados à protocolos da camada de aplicação. Esse artigo aborda um modelo de firewall standalone que fica residente na camada de aplicação exigindo o mínimo de alterações possível na implementação. Resultados mostraram que a tecnologia conteve diversos ataques no endereço real do servidor oriundos de botnets procurando por serviços de bancos de dados vulneráveis, aplicações com livre acesso a upload de arquivos e rotas com autenticações e interpretadores de código shell quebrados. E
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Web Application Firewall (WAFW)"

1

O'Connor, Kellen, and Brad Nance. Protecting Websites from Cross-Site Scripting (XSS) Attacks: A Novel Configuration usingPulse Secure© Pulse Connect Secure© and Virtual Web Application Firewall (vWAF). Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1820799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!