After years of running WAFs using the Core Rule Set I wanted a way to detect
known malicious users before they get a chance to send their attack
payloads.
Normally, when an attacker sends their payload, the contents of the request
are checked via ModSecurity using the Core Rule Set (CRS). The CRS is
essentially a large black list which means that the payload either matches
or passes. There
is no middle ground. Attackers normally perform reconnaissance before they
attack which may or may not contain malicious payloads. Ideally we want to
stop
known malicious attackers as early as possible, i.e. via an IP reputation
background check, and not wait for them to send their attack.

As a result, I started on the Open Fraud Detection Project (OFDEP) which
aims at
providing a free community supported API that ModSecurity can query to
receive
a score indicating the odds that a given user / transaction is bad. The WAF
can
then make a decision on how to proceed based on the score. At the moment the
API is Beta quality and supports IP, email address and username lookups.
Query
results are currently returned in XML but JSON will be supported shortly.
The
most common use cases that I tried to cover are:

o IP reputation
o comment spam
o account creation fraud

For specific API details see: http://wafsec.com/api.html

--
 - Josh
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to