S1 |
RCE AV |
Remote Command Execution detection via signature matching. |
S2 |
SQLi |
SQL Injection detection. |
S3 |
XSS |
Cross-Site Scripting detection. |
S4 |
LFI |
Local File Inclusion payload detection. |
S5 |
RFI |
Remote File Inclusion detection. |
S6 |
Specific exploit signature |
Exact match for known CVEs and public exploit payloads. |
S7 |
Generic exploits signature |
Detection of generalized patterns for injection/fuzzing attempts. |
S8 |
Informational signature |
Indicators like /admin , known tools, or outdated software hints. |
S9 |
Global signature – request level |
Signatures applied to the full request context. |
S10 |
Param-level signature |
Signatures targeting individual parameters. |
S11 |
URL param-level signature |
Applied only to query string parameters within URLs. |
S12 |
Signature normalization – |
Normalization techniques used to detect obfuscated payloads: |
|
|
• lowercase conversion |
|
|
• encoding transformations |
|
|
• base64 decoding (if app supports it) |
|
|
• other evasions (e.g., null byte, whitespace, mixed case) |
|
|
• meta characters (; , % , -- , M'C , etc.) |
S13 |
Signature content-type checks – |
Validation against different body types and parsers: |
|
|
• TXT |
|
|
• HTML |
|
|
• JSON |
|
|
• XML |
S14 |
CVE-based signatures |
Targeted rules for known vulnerabilities; 1-day delay before blocking. |
S15 |
Informational/default signatures |
Low-risk alerts on suspicious but non-blocking patterns. |
S16 |
CI-triggered signature overload |
Detection of excessive sig triggers from single IP/source. |
S17 |
Vul hunting & scanner detection |
One-strike, fuzzing, or scan-based trigger identification. |