Technical White Paper On Web Application Firewall
Technical White Paper On Web Application Firewall
Abstract: This White Paper introduces the application background of WAF technology, its
implementation and operation mechanism of WAF, and its application scenarios.
Abbreviations:
CONTENTS
1 Overview .......................................................................................................................... 3
1.1 Web Security Status .............................................................................................. 3
1.2 Web Application Firewall ....................................................................................... 3
2 Deployments .................................................................................................................... 4
2.1 Transparent Mode ................................................................................................. 4
2.2 Reverse Proxy Mode ............................................................................................. 4
2.3 Bypass Mode ......................................................................................................... 5
3 Comprehensive Web Protection ...................................................................................... 6
3.1 Protection against Parameter Attack ..................................................................... 6
3.2 Protection against Parameter Tampering.............................................................. 8
3.3 Protection against HTTP Protocol Attack .............................................................. 8
3.4 Protection against Buffer Overflow Attack ............................................................. 9
3.5 Protection against Website Directory Scanning .................................................. 10
3.6 Protection against Weak Passwords and Brute Force ........................................ 10
3.7 Application-layer Anti-DDoS ................................................................................ 10
3.8 Protection of Multiple Policies.............................................................................. 11
3.9 Sensitive Keyword Filtering and Server Information Protection .......................... 11
4 Load Balancing .............................................................................................................. 13
5 Session Management .................................................................................................... 13
5.1 Session Number Limits ........................................................................................ 13
6 Web page Tamper-proof ................................................................................................ 13
6.1 Web page Tamper-proof...................................................................................... 13
6.2 Web page Tampering Recovery .......................................................................... 14
1 Overview
1.1 Web Security Status
In the World Wide Web (www, or commonly known as the Web) age, the Web service
platform has become a pillar of information-based development, on which many enterprises
have built service applications. While facilitating enterprises and users, the Web application
platforms also put the enterprise’s service systems under severe challenges. The
diversification of service systems and the rapid development of the Internet draw great
attention from network enthusiasts and hackers, who have gradually shifted their focus of
attack from traditional Web servers to Web services, leading to a rapid increase in the
potential threats of Web application platforms.
The recent years saw numerous network enthusiasts and hackers launched attacks on Web
services for various purposes. In the meanwhile, a huge number of attacks launched by hackers
by exploiting Web security vulnerabilities have affected government websites, Tieba, and online
communities in China, causing great inconvenience to the business of enterprises and
individuals at all levels.
2)Access Control: Perform access control on Web application platform, including active access
control and passive access;
3) Network Management: Functions such as reverse proxy mode, forwarding control, and
diagnostic tools are available;
4)Web Attack Protection: As the core function of Web Application Firewall, it provides security
protection for Web application platforms to prevent unnecessary losses to the application
platforms caused by attacks.
Hangzhou DPtech Technologies Co., Ltd. www.dptechnology.net Page3
Technical White Paper on Web Application Firewall
2 Deployments
2.1Transparent Mode
As shown in the figure, in Transparent Mode, the uplink and downlink configurations of WAF
device will remain unchanged, i.e., between two running devices. As there is no need to adjust
the existing network structure in Transparent mode, plug-and-play deployment can be realized.
Deployment features: Seamless connection with the original services without changing the
existing network topology; optimized services include load balancing and others.
SQL Injection is generally caused by the lack of application verification of the input data.
Hackers generally send a piece of data containing SQL statements to the parser, which then
restores the data to a command for execution. SQL Injection attacks usually lead to
catastrophic consequences. All information in the entire database can be read or tampered,
and access rights of even the administrator can be obtained. Usually, attackers look for SQL
Hangzhou DPtech Technologies Co., Ltd. www.dptechnology.net Page5
Technical White Paper on Web Application Firewall
injection vulnerability, determine the type of the back-end database, and obtain the relevant
permissions to carry out dangerous attacks. DPtech WAF3000 provides a signature library of
SQL injections, which includes injection point search, surmise of database type and
permission structures, addition of new database users and system users, addition of
permissions, surmise of data table structure, backup database, directory traversal,
WEBSHELL upload and backup of logs. In practice, attack payload can be found in anywhere
in the HTTP request, such as request string, POST data, cookie, custom or standard HTTP
header, and part of the URL. DPtech enables detection of potential threats in the above
locations. When an attack packet passes through the device, the system will match potential
threats with the signature library. If packet is found to contain attack signatures, it will be block
upon an alarm to prevent malicious requests for data tampering. The defense work is mainly
carried out in the following aspects:
1)Construct dynamic SQL statements based on dynamic strings. We replace the original
dynamic query statements with parameterized statements, which not only provides effective
protection, but also improve the efficiency compared to modern databases;.
2) We conduct input validation to make sure its compliance with the standard process
defined in the application. Validation applies to simple scenarios of taking parameter values
as a data type or complex ones with regular expressions or business logic for verification. In
response, we have whitelists (positive verification) and blacklists (negative verification) in
place. For simple or confirmed attack statements, we use blacklist matching. For complex and
potentially threatening statements, we determine whether it is a security statement by
analyzing its grammar and morphology. By grammar and morphology, we are referring to the
database grammar and morphology that are relatively outdated but still in use compared with
new data;
3) Encode the output query statements: We performed different encoding processes for
different databases to change potentially threatening codes into a part of other security codes,
thus effectively preventing malicious users from exploiting SQL Injection vulnerability in
specific queries;
DPtech WAF3000 supports double protocols of signatures and parameters and specifies the
range of value. By checking if the parameters corresponding to the specific features in the
client packets fall within the specified range, it prevents the client from entering illegal
parameter values, thereby greatly reducing the possibility of introducing potentially dangerous
requests through parameters.
It can impose limitations on the overall length of URL according to the type of services,
effective preventing server parsing load caused by malformed URLs. Limitations can also be
set to protocol attributes, such as the total number, total length, parameter name, and the
length of parameter values of URL requests.
header fields, which helps normalize escape attempts caused by header fields with abnormal
lengths.
3.3.4 Cookie Encryption
The Cookie in the client packets sent by the server generally stores the session value
generated internally. This value is the key that determines the direct connection between the
client and the server, and shall not be tampered by the client or malicious user. Malicious
tampering will lead to security and privacy information leakage and unnecessary losses to
customers and servers. DPtech WAF3000 summarizes and encrypts the Cookie valve using
the set-cookie field of the response packet. Users are not allowed to view or modify the
Cookie when it passes through the httponly. The encrypted Cookie is returned to the client to
prevent the latter from making any modifications. Replay the Cookie exploited by malicious
users and make careful analysis on Cookie tampering to prohibit them from accessing the
server. In this way, protection against related dangers is enabled.
Meanwhile, HTTPS attacks are filtered to avoid attacks and damages to the security of the
server caused by exploiting HTTPS vulnerabilities.
Meanwhile, HTTPS attacks are filtered to avoid attacks and damages to the security of the
server caused by exploiting HTTPS vulnerabilities.
DPtech WAF3000 calculates and counts the login request frequency through a precise
algorithm to analyze whether there is brute force of the username and password, ensuring
prompt and proper protection and preventing the username from brute force attacks.
If username and password are accidentally leaked, the attackers can still find no way to
launch an attack with the back-end administrator account as they cannot obtain the second
authentication password set in DPtech WAF3000.
period. If the threshold is exceeded, the attack sources will be blocked. We are capable of
efficiently calculating the threshold with a set of professional algorithms, thus providing real-
time protection against application-layer DOS attacks.
receiving the permission. Based on careful algorithms, DPtech WAF3000 analyzes and
processes the specific fields of the request packets of the access protection page to
determine whether the guest is launching an attack by forging his identity. If yes, the request
will be blocked to provide protection.
4 Load Balancing
DPtech WAF3000 provides the following abundant load balancing functions:
5 Session Management
Session Number Limits
With session identification and counting technology, DPtech WAF3000 provides the following
protection for the IP addresses for specific purposes:
of the request page with the cache page, so as to determine whether the web page has been
tampered with. For pages that are subject to constant updates, manual refreshing is required,
adding to the workload of network administrators and affecting the timeliness of information
acquisition due to the time interval between refresh operations. WAF3000 Tamper-proof
adopts a whitelist mechanism to include content that is allowed to be changed to the whitelist
policy. When the Web page changes, the device will determine whether the content changes
are contained in the dynamic tags of the white list. If yes, the device cache will be
automatically refreshed.