First, product overview
In general, network attackers targeted at potential vulnerabilities of Web applications, improper configuration of web system software, and weaknesses in the HTTP protocol itself, by sending a series of request data containing specific attempts to detect and attack Web sites, especially Web applications, for purposes such as illegally acquiring site information, Tampering with databases and Web pages, bypassing identity authentication and impersonating users, stealing user data and data, controlling compromised servers, and more.
The iwall Application firewall provides protection for Web sites, especially Web applications. It is a comprehensive analysis of the application layer of user HTTP request data (such as URLs, parameters, links, cookies, request lines, headers, loads, etc.), distinguish the normal user access to the Web application and the attacker's malicious behavior, real-time blocking and alarm attack behavior.
Iwall applies firewalls to common injection attacks , cross-site attacks , access to sensitive files, unsafe local storage, illegal execution of scripts, illegal execution of system commands, resource hotlinking, source code leaks, URL Access limit invalidation and other attack methods are effective protection effect.
The location and role of the iwall application firewall in the security system is as follows:
Iwall Application Firewall-Product brief