[go: up one dir, main page]

0% found this document useful (0 votes)
13 views3 pages

Synopsis Format

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 3

Synopsis

on

Web Application firewall


SUBMITTED TOWARDS PARTIAL FULFILLMENT OF THE REQUIREMENT FOR
THE AWARD OF THE DEGREE OF

BACHELOR OF TECHNOLOGY
(Computer Science & Engineering)

SUBMITTED BY

Aryan

21/CSE/115

Under the supervision of

Urvashi Mam

(Department of Computer Science & Engineering)

VAISH COLLEGE OF ENGINEERING, ROHTAK

(Affiliated to Maharshi Dayanand University, Rohtak)

February – 2024
1. Title
Web Application Firewall
2. Introduction
Web App Firewall helps to protect web applications. It’s one of the cyber crime and security
projects because it enables you to comprehend cyber security in a general context
3. Objective
Web application firewalls (WAFs) act as security guards for websites, filtering
incoming traffic and blocking malicious attempts like SQL injections or data
breaches. They shield the application by inspecting and filtering HTTP requests,
safeguarding it from various cyber threats.
4. Scope of the Project

Focus on developing a novel detection & mitigation technique for specific emerging
attack types (e.g., API attacks, zero-day threats).
5. Literature Review
WAFs offer diverse features (filtering, anomaly detection, machine learning) but
struggle with false positives or performance overhead. Your project explores
potential solutions through [your key area of focus, e.g., advanced detection
techniques, optimization strategies] for enhanced web security.
6. Proposed System/Implementation

Leveraging real-time behavioral analysis and machine learning, this WAF adapts to
novel attacks, providing dynamic protection for evolving web applications.
7. Tools and Technologies
Signature-based rules for known threats + Machine learning for anomaly
detection using python programming
8. Project Timeline
Milestone Deadline

Requirements gathering and February 24,


analysis 2024

System design and architecture March 1, 2024

Prototype development March 9, 2024

Testing and refinement March 20, 2024


Documentation and deployment March 27, 2024

Project completion and


April 10, 2024
presentation

9. Expected Outcome

customizable, high-performance WAF equipped with advanced detection for


known and zero-day attacks. Expect reduced application vulnerabilities and
enhanced security posture, leading to increased user trust and business
resilience
10. Significance of the Project
"This WAF tackles the novel [cross-site scripting, file insertion, SQL injection, and many
others] vulnerability, enhancing security for [target audience] by [impact, e.g.,
reducing data breaches by 20%]."
11. Future Scope

WAFs can evolve with: 1) AI-powered anomaly detection for zero-day attacks, 2)
API security integration for comprehensive protection, 3) cloud-native flexibility
for scalability and adaptability, 4) self-learning capabilities for continuous
improvement, and 5) context-aware automation for faster, smarter responses.
12. Conclusion
Developed WAF successfully mitigates [cross-site scripting, file insertion, SQL
injection] with [key technology], achieving [performance metric] improvement
and demonstrating potential for real-world application security.
Project delivers robust WAF enhancing [user benefit, e.g., data privacy] for
web applications, offering a valuable tool in the fight against cyber threats.
13. References
Gemini , www.greywizard.com , google , geeks for geeks and w3schools.

You might also like