NEED SOME HELP
CLICK HERE OR CALL US ON
hosting provider in india 1-800-212-2022
web hosting services in USA 1-888-288-3570
Have questions? Let us answer them all!

Go4hosting
FORUM

Go4hosting offers top-notch services, such as dedicated server hosting, VPS hosting, Co- location,Web hosting,
Email hosting, and Cloud Computing solutions. All the services offered by Go4hosting are efficient, reliable,
andcost-effective. , remaining essentially unchanged.

It is currently Fri Apr 19, 2024 12:29 pm

All times are UTC + 5:30 hours




Post new topic Reply to topic  [ 2 posts ] 
Author Message
PostPosted: Wed Aug 29, 2018 12:32 pm 
Offline

Joined: Tue Apr 12, 2016 5:37 pm
Posts: 99
What is Web Application Firewall and How It Works?


Top
 Profile  
 
PostPosted: Wed Aug 29, 2018 12:46 pm 
Offline

Joined: Wed Apr 13, 2016 11:20 am
Posts: 209
A web application firewall (WAF) is an online security monitoring system that examines suspicious and illegitimate activity. It identifies and filters out bad web traffic based on the rules specified by the customers.

The primary target of the cyber criminals is the websites, web hosting services and web applications. While the traditional security systems like the Intrusion Prevention Systems (IPS), Intrusion Detection systems (IDS), and network firewalls are important to stop illegal intrusions, they do not have the ability to detect or stop XSS attacks, SQL injections, web session hijacking or any similar attacks.

WAF scrutinizes, both GET and POST requests, that are sent through HTTP and HTTPs as per the configured rules you set to filter malicious traffic. WAF is built to catch every suspicious movement which the normal security tools could have missed before the traffic reaches the server. They also can be configured to comply with the HIPAA and PCI-DSS regulations.

The web application firewall can be in three models- A whitelist model that allows traffic that meets specific criteria. There is a blacklist model that uses predefined signatures to block malicious web traffic that can abuse vulnerabilities. The third model is hybrid in nature blending both whitelist and blacklist models.


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 

All times are UTC + 5:30 hours


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to: