Abstract

The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.

Highlights

  • The web became the main link that connects all users all over the world where data about the web users are stored in databases (Rajan et al, 2010)

  • The core component of any web application firewalls (WAFs) consists of known procedures that have to be done before data reach the server backend

  • The firewall as any known type of WAF will intercept the traffic between the user and the web application in order to check whether the data is malicious or safe to be passed down to the web application and continue the interaction between the user and the web application safely and heavily monitored (Sakthivel et al.,2012)

Read more

Summary

Introduction

The web became the main link that connects all users all over the world where data about the web users are stored in databases (Rajan et al, 2010). Some of these activities contain sensitive and private information about the user such as credit card numbers, passwords, and money authorization transactions information. There is a major need for developing researches and find methods for preventing and detecting any possible attack against such web based infrastructure, securing databases and help making the data more private for the users. There is a need to take pre-steps and create a method to detect and prevent such harmful activities before even taking place through the Internet by distributing the attacker’s information to other firewalls as a new approach to web application security field

Objectives
Methods
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.