YoVDO

Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

Offered By: OWASP Foundation via YouTube

Tags

Web Application Firewalls Courses Threat Intelligence Courses ModSecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for post-processing ModSecurity Core Rule Set WAF triggers to generate actionable defenses in this 40-minute conference talk from AppSecEU 2014. Learn how to analyze collected malicious HTTP traffic to gain new insights on attackers and their techniques, enabling improved security controls and hardened defenses. Dive into detailed case studies based on real traffic from Akamai's Cloud Security Intelligence platform, including examples of remote file inclusion attacks and methods for generating signatures to enhance detection capabilities. Discover how to leverage attack "anchors" for enriching other security controls, monitoring URL and domain reputation, and correlating distributed attack campaigns. Gain valuable knowledge on improving web application security through innovative analysis of WAF data.

Syllabus

Introduction
Story
Questions
Another Question
Question Answers
What can I learn
What can I do
Today Im going to talk about
Three Methods
Objectives
IP Reputation
Adolf Signature
File Upload
Web Hive
BotNet Mitigation
Similarities between attackers
Excessive access
Analysis
Enhanced Executive Report
Case Study
Webhive
Actionable Insights
Analysis Reporting
Querying the database


Taught by

OWASP Foundation

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera