Description from the Publisher
DragonWAF Identification Technologies
1. SQL Injection Prevention
Remote attackers send requests to gain access on IIS web server, causing data leakage or data deletion. DragonWAF can identify the attacks, analyze, filters them.
2. Buffer Overflow Protection
Buffer Overflow is an anomaly that stores data in a buffer outside the memory the programmer set aside for it. The extra data overwrites adjacent memory, which may contain program variables and program flow control data. DragonWAF can control the request length.
3. HTTP Methods Protection
Illegal commands that will cause data loss or tamper on web server, DragonWAF administrators can analyze, classify, filter and protect web servers from any incoming requests.
4. Shellcode Exploits Prevention
A standard English website environment is free of high-bit commands communication that could cause damage to server data, whereas in other language there will be complicated coding or high-bit requests targeting on IIS Web Servers.
5. Encoding Attack Prevention
The variety of â€œencoding attacksâ€ are sent to IIS Web Server are deceitful, trying to beat default policy. DragonWAF is able to identify such attacks, analyze risk level and filter them.
6. Keyword Strings Filtering
DragonWAF is able to eliminate such commands. This type of command attempts to create a buffer overflow on web servers, causing permission issues to execute intrusion attacks.
7. Directory Traversal Filtering
In a file transfer, the server end will provide required files by user end requests. There are policies to decide if users are permitted to read,write and create directories. DragonWAF can identify â€œDirectory Traversalâ€ attack, starts filtration.
8. Directory Protection
DragonWAF protects default IIS website directory, against any abnormal access requests to exploit sub-directory paths.
9. Customizable Remote Warning Page
Warn remote end of their malicious attacks with a warning message with a â€œRemote Warning Pageâ€