DSpace Repository

IMPLEMENTATION OF WEB APPLICATION FIREWALL (WAF) FOR MAXIMUM PROTECTION OVER NETWORK

Show simple item record

dc.contributor.author Baloch, Abdul Rafay Reg # 24084
dc.contributor.author Erum, Uzma Reg # 24156
dc.contributor.author Jaffrey, Syed Tanzil ur Rehim Reg # 24151
dc.date.accessioned 2017-06-22T05:31:06Z
dc.date.available 2017-06-22T05:31:06Z
dc.date.issued 2015
dc.identifier.uri http://hdl.handle.net/123456789/1971
dc.description Supervised By : S.M Asim Ali Rizvi en_US
dc.description.abstract Security is one of the key elements of any financial model. An OSI model perspective we have seen an upward progression inside the layer of insecurity. We started from physical layer attacks and gradually moved to Layer 2 and so on and so forth. At the moment we are at a point where most of the security issues lie at the application layer. Most of the application layer attacks we witness are fell inside the category of “Input Validation Attacks” i.e. not properly validating the users input before its parsed. To minimize the attack surface at application layer, vendors have come up with application layer firewalls also known as WAF (Web Application Firewall). A web application firewall uses two basic approaches for detecting malicious input, a positive model (Allow Known Good) or otherwise known as a White list or a negative model (Reject Known Bad), due to the simplicity of design, almost all of the “WAF” vendors rely upon “Blacklisting” Approach to filter the input. However, there is a fundamental problem inside the blacklist approach is that different browsers parse different inputs in a different way, which makes it easier for us to bypass blacklist based Web application firewalls The objective of this project is the Implementation of Web Application Firewall over Network for Maximum Protection it will be fulfilling the needs over the security area. This document has the detailed description of project; this project actually works for the server side protection. VIII Our solution is a light weight, and contains a user friendly interface which allows even non-technical people to configure and modify the rules. The implementation would be based upon a strong blacklist with minimal number of false positives. The second objective of this project is to create a tool which allows vendors to test the effectiveness of their Web Application Firewall as well as for webmasters to analyze the current solutions they have implemented en_US
dc.language.iso en_US en_US
dc.title IMPLEMENTATION OF WEB APPLICATION FIREWALL (WAF) FOR MAXIMUM PROTECTION OVER NETWORK en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account