Experimental study of ModSecurity web application firewalls

dc.contributor.authorSobola, Timilehin David
dc.date.accessioned2025-05-01T16:10:24Z
dc.date.available2025-05-01T16:10:24Z
dc.date.issued2020
dc.descriptionRisks related to web security are too important to be ignored. The Open Web Application Security Project (OWASP) document maintains a rating of the top 10 common threats. Although not an official standard, is widely acknowledged in the classification of vulnerabilities. This paper evaluates the effectiveness of ModSecurity web application firewall with OWASP Core Rule Set (CRS) version 3.2 released in September 2019 to detect known web security risks. This paper proposes to provide insight on detection capability of ModSecurity with CRS v.3.2 at default level, how well it can protect web server against Denial of Service (DoS) attacks, and performance on web server in terms of Throughput (the average amount of bytes transmitted every second), Transaction rates (the amount of hits), Concurrency (the average number of parallel connections and increases as server efficiency declines). In addition, provides recommendation on areas of improvement and future research areas.
dc.identifier.doihttps://doi.org/10.7939/r3-n39r-bb44
dc.language.isoen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/
dc.subjectOWASP
dc.subjectweb application firewall
dc.subjectModSecurity
dc.subjectOWASP Core Rule Set
dc.titleExperimental study of ModSecurity web application firewalls
dc.typehttp://purl.org/coar/resource_type/c_1843
ual.jupiterAccesshttp://terms.library.ualberta.ca/public

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Sobola_2020_Spring_MISSM.pdf
Size:
422.41 KB
Format:
Adobe Portable Document Format