Skip to main content
Version: v8

Machine Learning

Reason behind using AI based Machine Learning in WAF.


Haltdos WAF uses machine learning for detecting and diminishing application layer attacks on web applications with the help of built-in rules (signatures) and user defined rules.

Anomaly based Learning

Haltdos provides user a robust solution with the help of machine-learning because the main task of a web application firewall is to protect downstream web applications against technical attacks. It can also be used for log analysis, or to support administrators in creating or optimizing complex WAF configurations.

AL is limited because it depends on what it learns from usage patterns that it has encountered. Web application firewalls that leverage machine learning ML, however, take a different approach. With ML, the WAF can minimize false positives by using a statistical model to determine the probability that an anomaly is actually evidence of a cyberattack or if it’s just an error or a change in how users interact with the application.

WAFs can utilize ML in an additional way – training ML models to recognize specific threats based on data collected from actual attacks or from security solutions. For example, leverages machine learning to detect advanced bots, providing a total picture of bot activity on web applications. To learn about whether a request is legitimate or a potential malicious attack attempt, it performs the following tasks:

  • Captures and collects inputs, such as URL parameters, to build a mathematical model of allowed access.

  • Observes the HTTP method of the traffic.

  • Matches anomalies against pre-trained threat models.

  • Detect attacks.

Haltdos WAF utilizes the Isolation Forest Model to detect and mitigate web-based threats by identifying anomalous traffic patterns. The algorithm works by isolating abnormal requests that deviate from typical traffic, making it effective in identifying potential attacks like SQL injection, cross-site scripting (XSS). By focusing on isolating outliers, Haltdos WAF can proactively detect and block threats even without predefined attack signatures. This enhances the security of web applications by providing real-time protection against sophisticated or evolving attacks that might bypass traditional detection methods.

Haltdos WAF enumerates all HTTP requests, parameters, headers and cookies and then performs calculation during the initial learning phase of standard behavior by detecting deviation. Initially, solution is set on LEARNING mode which means working on sample request and performing baseline evaluation of users and web application. The baseline is key in figuring every request URL + Method combination and includes all parameters (present in header and in body) along with cookies. Once the learning is complete, the solution will verify every request against the model to determine whether it's an anomaly or not.

The magnificent advantage of Haltdos WAF is that solution does not depend on only one algorithm to evaluate genial anomaly or 0-day attack. Every request is evaluated against different ML models which check for different categories of attacks such as SQL Injection, Cross-site Scripting, Struts2 vulnerabilities, Prevention of sensitive data exposure, Broken Access Control etc. The suspicion score is the measure of deviation from baseline. Greater the deviation, higher the score and likely that the incoming request is a malicious request.

To understand how to configure Machine Learning Detection for your application, go to Learning module.