Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5837
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKaur, Gurpreet-
dc.date.accessioned2015-07-25T05:29:30Z-
dc.date.available2015-07-25T05:29:30Z-
dc.date.issued2015-06-
dc.identifier.urihttp://hdl.handle.net/123456789/5837-
dc.description.abstractWeb Application Firewalls are an important building block in every HTTP net- work. WAF often called as 'Deep Packet Inspection Firewalls' are defensive secu- rity strategy for all kinds of known and zero-day attacks. Web Application Firewall (WAF) engine with a rule set, to ensure critical protection across every web architec- ture. These approaches aimed to achieve e ciency and application-layer consistency between the WAF and Web application. The WAF then has the ability to enforce security policies based upon a variety of criteria including signatures of known attacks, protocol standards and anomalous application tra c. Web Application Firewalls can be either software, or hardware appliance based and are installed in front of a webserver in an e ort to try and shield it from incoming attacks. WAF systems detects both inbound and outbound attacks. Thus, Using ModSecurity as platform, we aim to develop such CRS to provide protections against all kinds of attacks and threats by hardening web security.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries13MCEI08;-
dc.subjectComputer 2013en_US
dc.subjectProject Report 2013en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject13MCEIen_US
dc.subject13MCEI08en_US
dc.subjectINSen_US
dc.subjectINS 2013en_US
dc.subjectCE (INS)en_US
dc.titleWeb Security Hardening Using Web Application Firewall Through Attacks Evasionen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
13MCEI08.pdf13MCEI0814.91 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.