YoVDO

Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

Offered By: OWASP Foundation via YouTube

Tags

Web Application Firewalls Courses Threat Intelligence Courses ModSecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for post-processing ModSecurity Core Rule Set WAF triggers to generate actionable defenses in this 40-minute conference talk from AppSecEU 2014. Learn how to analyze collected malicious HTTP traffic to gain new insights on attackers and their techniques, enabling improved security controls and hardened defenses. Dive into detailed case studies based on real traffic from Akamai's Cloud Security Intelligence platform, including examples of remote file inclusion attacks and methods for generating signatures to enhance detection capabilities. Discover how to leverage attack "anchors" for enriching other security controls, monitoring URL and domain reputation, and correlating distributed attack campaigns. Gain valuable knowledge on improving web application security through innovative analysis of WAF data.

Syllabus

Introduction
Story
Questions
Another Question
Question Answers
What can I learn
What can I do
Today Im going to talk about
Three Methods
Objectives
IP Reputation
Adolf Signature
File Upload
Web Hive
BotNet Mitigation
Similarities between attackers
Excessive access
Analysis
Enhanced Executive Report
Case Study
Webhive
Actionable Insights
Analysis Reporting
Querying the database


Taught by

OWASP Foundation

Related Courses

Secure Your Code - Injections and Logging
Pluralsight
Introduction to the OWASP ModSecurity Core Rule Set
nullcon via YouTube
Implementing AppSensor in ModSecurity
LASCON via YouTube
OWASP Flagship Projects - OWASP ModSecurity Core Rule Set
OWASP Foundation via YouTube
Practical OWASP CRS in High Security Settings
OWASP Foundation via YouTube