In order to provide generic web applications protection, the Core Rules use the following techniques:
HTTP Protection – detecting violations of the HTTP protocol and a locally defined usage policy.
Real-time Blacklist Lookups – utilizes 3rd Party IP Reputation
Web-based Malware Detection – identifies malicious web content by check against the Google Safe Browsing API.
HTTP Denial of Service Protections – defense against HTTP Flooding and Slow HTTP DoS Attacks.
Common Web Attacks Protection – detecting common web application security attack.
Automation Detection – Detecting bots, crawlers, scanners and other surface malicious activity.
Integration with AV Scanning for File Uploads – detects malicious files uploaded through the web application.
Tracking Sensitive Data – Tracks Credit Card usage and blocks leakages.
Trojan Protection – Detecting access to Trojans horses.
Identification of Application Defects – alerts on application misconfigurations.
Error Detection and Hiding – Disguising error messages sent by the server.