Web application firewall / Mohd Ikram Rahimi
The Web Application can easily be attacked by the hackers eventhough with the existence of the normal firewall in the system. This is due to the limitation that the normal firewall does not work in the application layer. The hackers will attack the Web Application using the methods like Structured Q...
| Main Author: | |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Information Technology and Quantitative Sciences
2006
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/677/ |
| _version_ | 1848802377367289856 |
|---|---|
| author | Rahimi, Mohd Ikram |
| author_facet | Rahimi, Mohd Ikram |
| author_sort | Rahimi, Mohd Ikram |
| building | UiTM Institutional Repository |
| collection | Online Access |
| description | The Web Application can easily be attacked by the hackers eventhough with the existence of the normal firewall in the system. This is due to the limitation that the normal firewall does not work in the application layer. The hackers will attack the Web Application using the methods like Structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection, or Session Manipulation as the normal firewall only open port 80 for Internet connection. Most of the Web Application Firewall is quite costly. There are only few that can be operated under free license. The usage of ModSecurity can solve the problem as it can be downloaded under GNU license. This thesis is attempted to show the benefits of implementing ModSecurity and also the reverse proxy server, instead of just implementing the conventional web server. The penetration test is done to evaluate the performance of the server using this Web Application Firewall. The results showed that ModSecurity and the Reverse Proxy methods can improve the level of security for the web server by forbidding any intrusion to take place through the Web Application. The impacts of the attacks had caused severe damage to the server. The attacks also had congested the physical memory, CPU usage, and CPU clock with or without ModSecurity. |
| first_indexed | 2025-11-14T21:22:23Z |
| format | Student Project |
| id | uitm-677 |
| institution | Universiti Teknologi MARA |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T21:22:23Z |
| publishDate | 2006 |
| publisher | Faculty of Information Technology and Quantitative Sciences |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | uitm-6772025-03-17T03:05:13Z https://ir.uitm.edu.my/id/eprint/677/ Web application firewall / Mohd Ikram Rahimi Rahimi, Mohd Ikram Electronic Computers. Computer Science Web databases The Web Application can easily be attacked by the hackers eventhough with the existence of the normal firewall in the system. This is due to the limitation that the normal firewall does not work in the application layer. The hackers will attack the Web Application using the methods like Structured Query Language (SQL) Injection, Cross Site Scripting (XSS), Command Injection, or Session Manipulation as the normal firewall only open port 80 for Internet connection. Most of the Web Application Firewall is quite costly. There are only few that can be operated under free license. The usage of ModSecurity can solve the problem as it can be downloaded under GNU license. This thesis is attempted to show the benefits of implementing ModSecurity and also the reverse proxy server, instead of just implementing the conventional web server. The penetration test is done to evaluate the performance of the server using this Web Application Firewall. The results showed that ModSecurity and the Reverse Proxy methods can improve the level of security for the web server by forbidding any intrusion to take place through the Web Application. The impacts of the attacks had caused severe damage to the server. The attacks also had congested the physical memory, CPU usage, and CPU clock with or without ModSecurity. Faculty of Information Technology and Quantitative Sciences 2006 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/677/1/677.pdf Rahimi, Mohd Ikram (2006) Web application firewall / Mohd Ikram Rahimi. (2006) [Student Project] <http://terminalib.uitm.edu.my/677.pdf> (Unpublished) |
| spellingShingle | Electronic Computers. Computer Science Web databases Rahimi, Mohd Ikram Web application firewall / Mohd Ikram Rahimi |
| title | Web application firewall / Mohd Ikram Rahimi |
| title_full | Web application firewall / Mohd Ikram Rahimi |
| title_fullStr | Web application firewall / Mohd Ikram Rahimi |
| title_full_unstemmed | Web application firewall / Mohd Ikram Rahimi |
| title_short | Web application firewall / Mohd Ikram Rahimi |
| title_sort | web application firewall / mohd ikram rahimi |
| topic | Electronic Computers. Computer Science Web databases |
| url | https://ir.uitm.edu.my/id/eprint/677/ |