Hide
Раскрыть

ISSN 2587-814X (print),
ISSN 2587-8158 (online)

Russian version: ISSN 1998-0663 (print),
ISSN 2587-8166 (online)

Petr Baranov 1, Eldar Beybutov 1
  • 1 National Research University Higher School of Economics, 20 Myasnitskaya Str., Moscow, 101000, Russian Federation

Securing information resources using web application firewalls

2015. No. 4 (34). P. 71–78 [issue contents]

Petr A. Baranov - Associate Professor, Department of Innovations and Business in IT, National Research University Higher School of Economics   
Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation.   
E-mail: pbaranov@hse.ru

Eldar R. Beybutov - MSc Program Student, Faculty of Business and Management, National Research University Higher School of Economics   
Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation.   
E-mail: eldar.beybutov@gmail.com

      This paper provides an overview of core technologies implemented by comparably new products on the information security market – web application firewalls. Web applications are a very widely-used and convenient way of presenting remote users with access to corporate information resources. They can, however, become single point of failure rendering all the information infrastructure inaccessible to legitimate clients. To prevent malicious access attempts to endpoint information resources and, intermediately, to web servers, a new class of information security solutions has been created.
      Web application firewalls function at the highest, seventh layer of the ISO/OSI model and serve as a controlling tunnel for all the traffic heading to and from a company’s web application server(s). To ensure decent levels of traffic monitoring and intrusion prevention, web application firewalls are equipped with various mechanisms of data exchange session “normality” control. These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means, such as denial of service, XSS injection and CRRF attack prevention. The ability to research and add user rules to be processed along with vendor-provided ones is important, since every company has its own security policy and, therefore, the web application firewall should provide security engineers with ways to tweak its rules to reflect the security policy more precisely.
      This research is based on broad practical experience of integrating web application firewalls into the security landscape of various organizations, their administration and customization. We illustrate our research into available filtering mechanisms and their implementations with exemplary product features by market leaders, diagrams and screenshots from real web application firewall systems.

Citation: Baranov P.A., Beybutov E.R. (2015) Securing information resources using web application firewalls.Business Informatics, no. 4 (34), pp. 71–78. DOI: 10.17323/1998-0663.2015.4.71.78.
BiBTeX
RIS
 
 
Rambler's Top100 rss