{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:15:46Z","timestamp":1768896946048,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319269603","type":"print"},{"value":"9783319269610","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_29","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"501-510","source":"Crossref","is-referenced-by-count":24,"title":["A Study of Web Application Firewall Solutions"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Prandl","sequence":"first","affiliation":[]},{"given":"Mihai","family":"Lazarescu","sequence":"additional","affiliation":[]},{"given":"Duc-Son","family":"Pham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"29_CR1","unstructured":"Guardian. \n                      http:\/\/guardian.jumperz.net\/index.html"},{"key":"29_CR2","unstructured":"ModSecurity. \n                      https:\/\/www.modsecurity.org\/"},{"key":"29_CR3","unstructured":"Web Knight. \n                      https:\/\/www.aqtronix.com\/?PageID=99"},{"key":"29_CR4","unstructured":"Balock, R., Jaffery, T.: Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters. Technical report, Rhainfosec (2013), White Paper"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Bau, J., Bursztein, E., Gupta, D., Mitchell, J.: State of the art: automated black-box web application vulnerability testing. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 332\u2013345. IEEE (2010)","DOI":"10.1109\/SP.2010.27"},{"key":"29_CR6","volume-title":"Web Application Firewalls","author":"M Becher","year":"2007","unstructured":"Becher, M.: Web Application Firewalls. VDM Verlag, Saarbr\u00fccken (2007)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Bojinov, H., Bursztein, E., Boneh, D.: Xcs: cross channel scripting and its impact on web applications. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 420\u2013431. ACM (2009)","DOI":"10.1145\/1653662.1653713"},{"key":"29_CR8","unstructured":"Cabrera, H., Krstic, G., Petrushevski, S.: CloudFlare vs Incapsula: Round 2. Technical report, Zero Science Lab (2013). \n                      http:\/\/zeroscience.mk\/files\/wafreport2013v2.pdf\n                      \n                    . Accessed 16 July 2015"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-14215-4_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Doup\u00e9","year":"2010","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G.: Why Johnny can\u2019t pentest: an analysis of black-box web vulnerability scanners. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 111\u2013131. Springer, Heidelberg (2010)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Y.W., Yu, F., Hang, C., Tsai, C.H., Lee, D.T., Kuo, S.Y.: Securing web application code by static analysis and runtime protection. In: Proceedings of the 13th International Conference on World Wide Web, pp. 40\u201352. ACM (2004)","DOI":"10.1145\/988672.988679"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: a static analysis tool for detecting web application vulnerabilities. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE (2006)","DOI":"10.1109\/SP.2006.29"},{"key":"29_CR12","first-page":"295","volume-title":"Proceedings of the 20th IFIP International Information Security Conference","author":"A Nguyen-Tuong","year":"2005","unstructured":"Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically hardening web applications using precise tainting. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Proceedings of the 20th IFIP International Information Security Conference, vol. 181, pp. 295\u2013307. Springer, US (2005)"},{"key":"29_CR13","unstructured":"Tibom, P.: Incapsula vs. CloudFlare: Security Review & Comparison. Technical report, Personal Review (2012). \n                      https:\/\/www.computerscience.se\/downloads\/Full-Review.pdf\n                      \n                    . Accessed 16 July 2015"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-04091-7_11","volume-title":"Proceedings of the Conference on Computational Intelligence in Security for Information Systems","author":"C Torrano-Gimenez","year":"2009","unstructured":"Torrano-Gimenez, C., Perez-Villegas, A., Alvarez, G.: A self-learning anomaly-based web application firewall. In: Herrero, \u00c1., Gastaldo, P., Zunino, R., Corchado, E. (eds.) Proceedings of the Conference on Computational Intelligence in Security for Information Systems, vol. 63, pp. 85\u201392. Springer, Heidelberg (2009)"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/978-3-319-13841-1_20","volume-title":"Information Systems Security","author":"A Vernotte","year":"2014","unstructured":"Vernotte, A., Dadeau, F., Lebeau, F., Legeard, B., Peureux, F., Piat, F.: Efficient detection of multi-step cross-site scripting vulnerabilities. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 358\u2013377. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:02:34Z","timestamp":1559332954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}