Fine grained and efficient rule protection
Ngwaf identifies and
defends various known attacks through the rule base, and meets the common
security risks and pain points of business systems, so as to realize
high-fine-grained and efficient rule protection.
The rule base
includes:
SQL injection attack,
XSS attack, CSRF Cross Site Request Forgery;
HTTP header injection
attack, directory traversal attack, remote file inclusion attack;
Brute force attack,
web crawler, web Trojan horse attack;
DDoS attack, session
hijacking, session fixation;
LDAP injection, PHP
mail injection, HTTP parameter pollution vulnerability;
Web sensitive
information disclosure vulnerability, HTTP response header splitting attack;
X-forwarded-for
header forgery and file upload attack;
The authentication
function is missing, the static file is not detected by WAF, and the request
method / request parameters are limited;
It also supports
configurable rules (request method limit, HTTP protocol limit, illegal request
header detection, upload file size limit, request parameter limit) and custom
rule library.
Automatic dynamic modeling
The
Web Application Firewall Based on the rule feature base can solve a large
number of web application risks, but due to the unique "delay" of the
rule base, it can only solve the known security risks and is powerless to
defend against 0day vulnerabilities and new attacks. In addition, there will be
some errors in the accuracy of the conventional feature library model, because
it does not know the user's business logic. The unique application dynamic
modeling technology of ngwaf can fully understand the user's business behavior
and fully display the user's business logic through automatic learning of the
application, so as to completely solve the above problems. Automatic modeling
is not limited to the following contents: access URL, application system path,
HTTP request parameters, number, type, name, value range, etc. Through the
modeling results, the white list defense model can effectively solve various
0day vulnerabilities, new business attacks and unauthorized operations.