Abstract
An Attack Signature is a digital fingerprint—a distinct pattern, often encoded as a Regular Expression (RegEx), that serves as an identifiable characteristic of a known cyberattack. These signatures are stored in a central Attack Signatures Pool composed of vendor-supplied and custom user-defined patterns, and are used to detect and block attacks like SQL Injection, Cross-Site Scripting (XSS), and Command Injection. The paper details the three-step technical mechanism—Creation, Distribution, and Inspection—by which WAFs enforce these rules in real-time. While Attack Signatures provide fast detection of known threats with low processing overhead, they have significant limitations. They are ineffective against Zero-Day Threats and can be circumvented by advanced Evasion Techniques like code obfuscation and polymorphism. Critically, increasing the number of active signatures, while boosting true positives (blocked attacks), simultaneously increases the risk of False Positives, which disrupt legitimate business operations and increase resource consumption.
View more »