Access to Applications Based on a « Driving License » Model


More and more countries are modifying their policies with a new “driving license” model.

With a classic license model, drivers can be caught frequently; they just have to pay a huge amount of money to the police each time.

Since this model has lot of limitations, it was changed to a “point-based model.” Either you begin with 0 points (and you increase it based on your “mistakes”) or your points decrease. Regardless of how the model works, you’re still allowed to drive if you have below a certain number of points on your license.

After being “bad” too many times, police will keep your driving license for a certain period. If this model is good for the security on roads, why wouldn’t we apply it to our application accesses?

[You might also like: WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10]

Accessing applications while sending attacks

Processing traffic (either good or bad) needs resources on all levels. One of the main problems faced by CISOs is detecting attacks without impacting legitimate clients. Of course, another aspect of the job responsibilities is to adapt the solution to the need (avoiding oversizing any security solution).

As security solutions have to handle both kinds of traffic, they have to be robust and sized for everything.

A problem can appear when you have a peak in traffic, and your bad traffic increases too. Hackers will try to identify the right moment to send bad traffic to you (usually during this peak), permitting them to be hidden in an easier way (as you have so much traffic, you can’t detect such small portion).

And also, some security solutions will bypass traffic when they’re full. So if by any chance you send an attack while a device is full, you will target the backend application directly without protection.

Going to the next step with a “score-based” license

As discussed previously, detecting and blocking attacks one by one can be very hard to handle and would consume a lot of resources. Instead of thinking that all clients are good even if they send attacks, the ideal WAF solution can adapt the “point-based driving license” to the application’s protection.

[You might also like: Security Impacting Humans: Fingerprinting vs. CAPTCHA]

By default, everyone will be seen as legitimate, but when hackers or bots send bad traffic, they will score points. Of course, in the meantime their requests will be blocked, but that can’t be enough.

After reaching a certain amount of points, these bad clients will be completely blocked for a short period. After that period, they will be allowed back but will keep their points. Then with only few requests, they will be blocked once more but for a longer period. That means even during a peak of traffic, they will not be allowed to impact your application as they will be blocked even before analyzing the HTTP request deeply.

A WAF has to be deployed as close as possible from the backend application, so we defined a mechanism called “Defense Messaging” which permits our solution to exchange information about bad clients and block them at the perimeter of your network.

Stay tuned to our next blog in this series, “Why would you let hackers consume your resources?”

Download “Web Application Security in a Digitally Connected World” to learn more.

Download Now

Thomas Gobet

Before being a WAF and Application Security Architect EMEA-CALA, he began his career in a Web agency as Security Administrator and continued in security domain working for distributors. He worked from networking solutions up to security solutions like Firewalls, SSL-VPN, and Web Application Firewalls. Combining his experience in WAF and his knowledge about Web allowed him to become an architect for EMEA-CALA theatre. He writes about application risks, protections and implementations of it.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center