{"id":1345,"date":"2023-11-17T02:32:20","date_gmt":"2023-11-17T02:32:20","guid":{"rendered":"https:\/\/matob.web.id\/random\/?p=1345"},"modified":"2023-11-17T02:32:20","modified_gmt":"2023-11-17T02:32:20","slug":"web-application-firewall","status":"publish","type":"post","link":"https:\/\/matob.web.id\/random\/web-application-firewall\/","title":{"rendered":"What Is Web Application Firewall (WAF)?"},"content":{"rendered":"<p><a href=\"https:\/\/matob.web.id\/random\/1001\/web-application-firewall\">Web Application Firewall (WAF)<\/a> is a firewall that monitors, filters, and blocks data coming from the client to a website or web application. A Web Application Firewall can be network-based, host-based or cloud-based, and is sometimes used via a reverse proxy in front of a website or application.<\/p>\n<p>As a network tool, server plugin or cloud service, WAF examines every data to analyze Layer 7 web application logic and filter out malicious traffic that can damage websites.\u00a0WAF is a security that is quite commonly used by companies to protect websites from exploits, malware, and other threats.<\/p>\n<p>Through these safeguards, Web Application Firewall (WAF)\u00a0can detect and quickly secure websites from even the most dangerous threats, which even traditional firewalls such as IDSes and IPSes cannot.<\/p>\n<p>WAF is usually very useful for companies that provide their products or services on the internet such as e-commerce, online banking, and others.<\/p>\n<h2><strong>Web Application Firewall vs <\/strong><strong>Firewall<\/strong><\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-1349 aligncenter\" src=\"https:\/\/matob.web.id\/random\/wp-content\/uploads\/sites\/2\/2021\/11\/web-application-firewall-2.jpg\" alt=\"web application firewall 2\" width=\"1499\" height=\"710\" title=\"\" srcset=\"https:\/\/matob.web.id\/random\/wp-content\/uploads\/sites\/2\/2021\/11\/web-application-firewall-2.jpg 1499w, https:\/\/matob.web.id\/random\/wp-content\/uploads\/sites\/2\/2021\/11\/web-application-firewall-2-768x364.jpg 768w\" sizes=\"(max-width: 1499px) 100vw, 1499px\" \/><\/p>\n<p>Firewall is a broad term for firmware that protects a computer network by filtering incoming data.\u00a0Within these broad terms, there are several categories that are differentiated based on what protection they provide.<\/p>\n<p>Meanwhile, Web Application Firewall (WAF) is another category of firewall and is distinguished by how specifically WAF filters data.<\/p>\n<p>WAF itself is unique because it only focuses on web-based attackers at the application layer, where other types of firewalls cannot fight attacks like this. Web Application Firewall (WAF) is similar to a proxy firewall, but with a specific focus on Layer 7 application logic.<\/p>\n<h2><strong>How Web Application Firewall (WAF) works?<\/strong><\/h2>\n<p>Web Application Firewall (WAF) analyzes requests from Hypertext Transfer Protocol (HTTP) and applies all the rules that define which parts are correct or suspicious.<\/p>\n<p>The main parts of HTTP that WAF analyzes are GET and POST requests. GET requests are used to receive data from the server, while POST requests are used to send data to the server.<\/p>\n<p>WAF uses three approaches to analyze and filter content from HTTP.\u00a0You can listen to it below:<\/p>\n<p><strong>Whitelisting<\/strong> :<\/p>\n<p>Whitelisting means WAF will reject all requests by default and only allow requests that are already trusted.\u00a0Usually there is already an IP address provided and it is known to be secure.<\/p>\n<p>Whitelisting is an easier way than blacklisting.\u00a0However, the drawback of whitelisting is the possibility of blocking traffic either accidentally.\u00a0Although it can be very efficient, sometimes using whitelisting becomes less accurate.<\/p>\n<p><strong>Blacklisting<\/strong> :<\/p>\n<p>Blacklisting by default will leave data and use certain presets to block malicious web traffic or web applications.\u00a0Simply put, blacklisting is the use of certain rules that can indicate a danger.<\/p>\n<p>Blacklisting is more appropriate for public websites because it receives a lot of traffic from unfamiliar IP addresses, and it is not known whether it is malicious or good traffic.<\/p>\n<p>The disadvantages of blacklisting are that it takes more effort to use it, and must have more information to filter data based on specific information.<\/p>\n<p><strong>Hybrid security<\/strong> :<\/p>\n<p>This model uses both whitelisting and blacklisting elements.<\/p>\n<p>Whichever model you use for WAF, the real hard job is to analyze HTTP interactions and destroy malicious traffic before it hits your server.<\/p>\n<h2><strong>Types of Web Application Firewall (WAF)<\/strong><\/h2>\n<p><strong>Network-based\u00a0<\/strong><strong>WAFs <\/strong>are\u00a0usually hardware-based and can reduce latency because they are installed locally and near applications.\u00a0Most network-based WAF vendors allow replicating rules and settings across their equipment, allowing users to deploy and configure at scale.<\/p>\n<p>The disadvantage of this type of WAF is the cost because you will be asked for money in advance, then costs for operational maintenance.<\/p>\n<p><strong>Host-based\u00a0<\/strong><strong>WAF<\/strong>\u00a0can be fully integrated into the application code itself.\u00a0The advantages of implementing host-based WAF are low costs and ease of customization.<\/p>\n<p>However, this type can be difficult because it requires an application library and relies on a local server to work effectively.<\/p>\n<p>Therefore, more employees are needed, including developers, systems analysts, and possibly DevOps \/ DevSecOps as well.<\/p>\n<p><strong>Cloud-based\u00a0<\/strong><strong>WAF<\/strong> offers a cheaper solution for companies that want minimal resources for Web Application Firewall (WAF) management. Cloud WAF is easier to deploy and available on a usage or subscription basis.<\/p>\n<p>Sometimes it just takes a simple domain system or proxy change to redirect app traffic. While it may worry you to have to entrust your company&#8217;s traffic to third parties, namely WAF vendors, this method allows your application to be protected across a wide spectrum of hosting locations.<\/p>\n<p>In addition, WAF vendors must already have the latest security updates and be able to <a href=\"https:\/\/www.threatx.com\/products\/cloud-waf\/\" target=\"_blank\" rel=\"noopener\">identify the latest threats<\/a> as well.<\/p>\n<h2><strong>Web Application Firewall (WAF) Benefits<\/strong><\/h2>\n<p>Web Application Firewall (WAF) has many advantages over other traditional firewalls as it offers better visibility of sensitive data from the HTTP layer. WAF can prevent attacks at the application layer that would normally bypass traditional firewalls.<\/p>\n<ul>\n<li>Attack\u00a0<strong>cross-site scripting\u00a0<\/strong><strong>(XSS)<\/strong>\u00a0allows attackers to inject and execute malicious scripts in another user&#8217;s browser.<\/li>\n<li>A\u00a0<strong>structured query language\u00a0<\/strong><strong>(SQL)<\/strong>\u00a0attack could compromise any application that uses a SQL database and could allow attackers to access and potentially modify sensitive data.<\/li>\n<li><strong>Web session hacking<\/strong>\u00a0can allow attackers to hijack a session ID and impersonate an authorized user.\u00a0The session ID is usually stored in a cookie or Uniform Resource Locator (URL).<\/li>\n<li>A\u00a0<strong>distributed denial-of-service\u00a0<\/strong><strong>(DDoS) attack<\/strong>\u00a0can make a network so full of traffic that it cannot serve users.\u00a0Both firewall and WAF networks can actually control this kind of attack, but they do it differently.<\/li>\n<\/ul>\n<p>In addition to the above benefits, <a href=\"https:\/\/matob.web.id\/random\/1001\/web-application-firewall\">Web Application Firewall<\/a> (WAF) is also able to maintain web-based applications without having to access the source code.<\/p>\n<p>Although host-based WAF is integrated with application code, a cloud-hosted Web Application Firewall (WAF) is capable of maintaining applications without needing to have access.<\/p>\n<p>In addition, Web Application Firewall (WAF) cloud is also easy to deploy and set up so users can quickly customize settings to adapt to new attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web Application Firewall (WAF) is a firewall that monitors, filters, and blocks data coming from the client to a website or web application. A Web Application Firewall can be network-based, host-based or cloud-based, and is sometimes used via a reverse proxy in front of a website or application. As a network tool, server plugin or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1348,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[172,194,76],"class_list":["post-1345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2","tag-cloudflare","tag-cyber-security","tag-security"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/comments?post=1345"}],"version-history":[{"count":2,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1345\/revisions"}],"predecessor-version":[{"id":2891,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1345\/revisions\/2891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media\/1348"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media?parent=1345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/categories?post=1345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/tags?post=1345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}