Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall

被引:0
作者
Muzaki, Rizki Agung [1 ]
Briliyant, Obrina Candra [1 ]
Hasditama, Maulana Andika [2 ]
Ritchi, Hamzah [3 ]
机构
[1] Politekn Siber & Sandi Negara, Dept Cyber Secur, Cyber Secur Engn, Bogor, Indonesia
[2] Budapest Univ Technol & Econ BME, Comp Engn, Fac Elect Engn & Informat, Budapest, Hungary
[3] Univ Padjadjaran, Dept Accounting, Fac Econ & Business, Bandung, Indonesia
来源
2020 5TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2020) | 2020年
关键词
Web Application Security; Web Application Firewall; ModSecurity; Reverse Proxy Method;
D O I
10.1109/iwbis50925.2020.9255601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks. Despite the increased adoption, web applications use is however directly associated with comparable threats and attacks. With the increasing threats and attacks on web applications, organizations require a more effective concept of web application security. Web Application Firewall (WAF) is a security concept that can be used to prevent various threats and attacks on web applications. WAF has the ability to filter packets, block dangerous HTTP requests, and also do logging. This paper demonstrates and proposes the implementation of WAF on a web-based application using ModSecurity and the Reverse Proxy method. From the tests carried out e.g. cross-site scripting, SQL injection and unauthorized vulnerability web scanning, all threats were successfully thwarted by ModSecurity and reverse proxy method implemented in the WAF.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 12 条
[1]  
Anggrahito R, 2019, CITEE, P199
[2]  
[Anonymous], 2019, NETCRAFT 0228
[3]  
Open Web Application Security Project (OWASP), 2020, OWASP Top Ten
[4]  
Pham D.-S., 2015, ICISS
[5]  
Positive Technology, 2019, IN PRESS
[6]  
Pubal J., 2015, WEB APPL FIREWALLS
[7]  
Security Advisory, 2020, BADAN SIBER SANDI NE
[8]  
Shahriar H., 2018, 42 IEEE INT C COMP S
[9]  
Sugiyono, 2017, METODE PENELITIAN KU
[10]  
Sullivan Brian., 2012, Web Application Security: A Beginners Guide