dc.description.abstract |
Web Applications need to be secured in this era of e-commerce just like any of other business does.With this increase in web applications usage, the vulnerabilities are also increasing with time. Web applications are more prone to attacks, which is becoming a real problem for web application users now-a-days. In the field of Computer security , a vulnerability is a fault/sensitive weakness which can be misused by such as some attacker, to perform unauthorized actions in your system . To exploit a vulnerability, attacker should have tool or connection technique to system weakness. WAF protects these vulnerabilities. It monitors, and blocks HTTP traffic to and from a web application. It is a type of firewall that controls access to web application(s) from the Internet. It can be implemented as rule set on HTTP conversation. Through customizing the rules accordingly to application, several attacks (XSS, SQL injection, etc. can be identified and blocked. It offers a single source of control for the security of websites, applications, and APIs, hosted across multiple cloud environments. As a cloud based service, this WAF requires no hardware or software to install and maintain. |
en_US |