TY - JOUR TI -

Securing information resources using web application firewalls

T2 - IS - KW - information security KW - web application firewall KW - application server protection AB - Petr A. Baranov - Associate Professor, Department of Innovations and Business in IT, National Research University Higher School of Economics   Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation.   E-mail: pbaranov@hse.ruEldar R. Beybutov - MSc Program Student, Faculty of Business and Management, National Research University Higher School of Economics   Address: 20, Myasnitskaya Street, Moscow, 101000, Russian Federation.   E-mail: eldar.beybutov@gmail.com      This paper provides an overview of core technologies implemented by comparably new products on the information security market - web application firewalls. Web applications are a very widely-used and convenient way of presenting remote users with access to corporate information resources. They can, however, become single point of failure rendering all the information infrastructure inaccessible to legitimate clients. To prevent malicious access attempts to endpoint information resources and, intermediately, to web servers, a new class of information security solutions has been created.      Web application firewalls function at the highest, seventh layer of the ISO/OSI model and serve as a controlling tunnel for all the traffic heading to and from a company’s web application server(s). To ensure decent levels of traffic monitoring and intrusion prevention, web application firewalls are equipped with various mechanisms of data exchange session "normality" control. These mechanisms include protocol check routines, machine learning techniques, traffic signature analysis and more dedicated means, such as denial of service, XSS injection and CRRF attack prevention. The ability to research and add user rules to be processed along with vendor-provided ones is important, since every company has its own security policy and, therefore, the web application firewall should provide security engineers with ways to tweak its rules to reflect the security policy more precisely.      This research is based on broad practical experience of integrating web application firewalls into the security landscape of various organizations, their administration and customization. We illustrate our research into available filtering mechanisms and their implementations with exemplary product features by market leaders, diagrams and screenshots from real web application firewall systems. AU - Petr Baranov AU - Eldar Beybutov UR - https://bijournal.hse.ru/en/2015--4 (34)/174433786.html PY - 2015 SP - 71-78 VL -