SlideShare a Scribd company logo
OWASP AppSensor
Detecting Attacks in your
Application
Meetup, September 2020
Simon Bäumler
simon.baeumler@qaware.de
Simon Bäumler
Sofwarearchitekt, QAware GmbH
Kontakt Details
Phone: +49 89 23 23 15 136
Mail: simon.baeumler@qaware.de
2
Software architecture &
development of secure applications
Fan of Microservices, Clouds and
Security (of course!)
QAware
“There are those who've been hacked and
those who don't know they've been
hacked.” James B. Comey, former FBI Chief
Basic assumption: A hacker spies on a
system before attacking it.
So can’t we detect a hacker before he is
actually attacking the system?
But aren't there already established
intrusion detection systems (IDS)?
This is about detecting attacks.
QAware 6
There are many variants of IDS
Network Based
IDS
Internet
Firewall /
Reverse Proxy
Server
Applikation
DB
Host
Based
IDS
Web Application
Firewall (WAF)
Other:
Wireless IDS
Network behaviour
analysis
Hybride IDS
Is there also
an IDS for
Applications?
?
Classic IDS systems have weaknesses
QAware 7
IDS systems don’t know the technical context in the app.
To be precise, you need to teach an IDS the connections encoded in the app.
 This is complex and error-prone
When detecting an attack, an IDS can‘t do much more than block the action
 Malfunctions that cannot be understood by the user
 Can lead to further application errors
A different approach:
Building the IDS into the application
This allows the business logic to be used to detect suspicious behavior
 This is exactly the underlying idea of AppSensor
AppSensor in a Nutshell
The AppSensor Approach:
Use application logic to detect attacks
Instrumentation of the application with log-like detection
points
Evaluation of the collected data on the AppSensor server.
Attack detection can thus be further automated
Feedback to the system, e.g. to block user accounts of
attackers
Automatic protection for identified attacks
OWASP AppSensor allows context sensitive detection
and response to attacks.
QAware 9
AppSensor is explicitly recommended for prevention of
OWASP Top 10: A10-Insufficient Logging&Monitoring
QAware 10
A word of warning
QAware 11
At the moment the development of the AppSensor tooling seems to have stalled
The last commit was is august 2019
But: AppSensor calls itself a conceptual framework
I.e. it is more about the method than about the concrete tool
Parts of the method can be easily implemented with standard frameworks
More on that later…
QAware 12
AppSensor can be integrated into any system.
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
QAware 13
AppSensor can be operated as a server on its own.
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
Provisioning of
components with
Detection Points
QAware 14
Detected events are forwarded to the AppSensor
server…
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
AppSensor Detection
Points send events
when suspicious
behavior is observed
The events are
forwarded to the
server
QAware 15
… persisted, aggregated …
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
The events are
stored in the
AppSensor server,
aggregated
QAware 16
… and analyzed for attacks.
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
Analysis: Detection of
attack patterns using
definable heuristics on
the collected events
QAware 17
Detected attacks are reported to the application.
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
Detected attacks
are forwarded to
the client.
QAware 18
In the application, the developer can decide how to
respond to attacks.
Component A
Component B Component C
AppSensor
Server
AppSensor
Client
Components can use
it to respond to
detected attacks
Details
QAware 20
The AppSensor Server is designed for extensibility
AppSensor Server
Store
Listeners
Analysis
Engine
Reporting
Engine
Handler
Datastore Config
Events/Attacks
Responses
QAware 21
The interface of AppSensor
http://appsensor.org/docs/v2.3.0/api/ui/index.html#/
QAware 22
The events and alerts can be viewed in the
AppSensorUI
Detection Points can be added to components
QAware 23
Generation of events similar to logging
Important is the category of detection point (here "AE4") - This is how the heuristics work for attack
detection
if ( username.length > 30 ) {
screen_errors.add ( "The username entered is too long." );
// "AE4" is the identifier for this specific detection point
appSensor.addEvent ( logged_in_user, "AE4" );
}
AppSensor knows 50 types of detection points.
QAware 24
Access to
resources without
permission
Client-side input
validation
bypassed
Unexpected data
format
Suspicious login
behavior
Attack attempt
detected
Automated
application scan
detected
Detection Points are configured in the app sensor server
QAware 25
<detection-point>
<category>Authentication</category>
<id>AE2</id>
<threshold>
<count>3</count>
<interval unit="seconds">60</interval>
</threshold>
<responses>
<response>
<action>slowdownLogin</action>
<interval unit="minutes">10</interval>
</response>
</responses>
</detection-point>
Summary
27
Idea: Use existing logging infrastructure.
Logstash Kibana
Use existing tools (ELK etc) to implement an AppSensor Inspired Security Monitoring
Detection Points from AppSensor offer a good reference for:
What (and where) should be logged
Which data are important for logging
The AppSensor-Guide provides useful hints on what to consider
https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf
QAware
There are other tools that have a similar approach
QAware 28
Logging, e.g with ELK
Response can be implemented with Alerting tools, e.g. ElastAlert
Ensnare
Framework for Ruby on Rails
Riemann
„Engine for filtering, altering, and combining events“
Runtime Application Self Protection (RASP) includes similar functionality
Mostly commercial products
The basic idea of AppSensor can be easily implemented
QAware 29
AppSensor uses the business logic of an application
Security-critical events are detected, collected, and aggregated
Alarms can be generated from the collected events via heuristics
What is important is the approach, not the tool!
QAware GmbH München
Aschauer Straße 32
81549 München
Tel.: +49 (0) 89 23 23 15 – 0 github.com/qaware
linkedin.com/qaware slideshare.net/qaware
twitter.com/qaware xing.com/qaware

More Related Content

PDF
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
PDF
Connect Ops and Security with Flexible Web App and API Protection
PDF
Overcoming (organizational) scalability issues in your Prometheus ecosystem
PPTX
Jenkins Online Meetup - Automated SLI based Build Validation with Keptn
PPTX
Shipping Code like a keptn: Continuous Delivery & Automated Operations on k8s
PDF
SecDevOps - The Operationalisation of Security
PPTX
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
PPT
Code Quality - Security
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
Connect Ops and Security with Flexible Web App and API Protection
Overcoming (organizational) scalability issues in your Prometheus ecosystem
Jenkins Online Meetup - Automated SLI based Build Validation with Keptn
Shipping Code like a keptn: Continuous Delivery & Automated Operations on k8s
SecDevOps - The Operationalisation of Security
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
Code Quality - Security

What's hot (18)

PPTX
Integrating security into Continuous Delivery
PDF
System Event Monitoring for Active Authentication
PPTX
Application Security at DevOps Speed and Portfolio Scale
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PPTX
Continuous Security Testing with Devops - OWASP EU 2014
PDF
Cloud security : Automate or die
PPTX
Continuous Delivery and Automated Operations on k8s with keptn
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
Innovating Faster with Continuous Application Security
PDF
The Joy of Proactive Security
PDF
DevSecOps | DevOps Sec
PDF
The Future of Security and Productivity in Our Newly Remote World
PPTX
How to Get Started with DevSecOps
PDF
Building Security in Using CI
PDF
Security Automation Simplified - BSides Austin 2019
PPTX
A Guide to Event-Driven SRE-inspired DevOps
PDF
Scale security for a dollar or less
Integrating security into Continuous Delivery
System Event Monitoring for Active Authentication
Application Security at DevOps Speed and Portfolio Scale
BsidesMCR_2016-what-can-infosec-learn-from-devops
Continuous Security Testing with Devops - OWASP EU 2014
Cloud security : Automate or die
Continuous Delivery and Automated Operations on k8s with keptn
You Build It, You Secure It: Introduction to DevSecOps
Better Security Testing: Using the Cloud and Continuous Delivery
Innovating Faster with Continuous Application Security
The Joy of Proactive Security
DevSecOps | DevOps Sec
The Future of Security and Productivity in Our Newly Remote World
How to Get Started with DevSecOps
Building Security in Using CI
Security Automation Simplified - BSides Austin 2019
A Guide to Event-Driven SRE-inspired DevOps
Scale security for a dollar or less
Ad

Similar to OWASP AppSensor: Detecting Attacks in your Application (20)

PPTX
Securing Your Public Cloud Infrastructure
PDF
How to build observability into a serverless application
PDF
Yan Cui - How to build observability into a serverless application - Codemoti...
PDF
Beginners guide to aws security monitoring
PDF
How to build observability into a serverless application
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PDF
Azure Incident Response Cheat Sheet.pdf
PPTX
API Security: Essential Practices for Developers
PDF
Swascan
PDF
Brochure Swascan Overview
PDF
Leveraging AI-Powered AWS Codeguru Security to Detect and Resolve Code Vulner...
DOCX
Demand for Penetration Testing Services.docx
PDF
5 step plan to securing your APIs
PPTX
Using Splunk for Information Security
PPTX
Using Splunk for Information Security
PPTX
Automating your AWS Security Operations
PDF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
PDF
Top 10 Web App Security Risks
PPT
PDF
IBM Qradar-Advisor
Securing Your Public Cloud Infrastructure
How to build observability into a serverless application
Yan Cui - How to build observability into a serverless application - Codemoti...
Beginners guide to aws security monitoring
How to build observability into a serverless application
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Azure Incident Response Cheat Sheet.pdf
API Security: Essential Practices for Developers
Swascan
Brochure Swascan Overview
Leveraging AI-Powered AWS Codeguru Security to Detect and Resolve Code Vulner...
Demand for Penetration Testing Services.docx
5 step plan to securing your APIs
Using Splunk for Information Security
Using Splunk for Information Security
Automating your AWS Security Operations
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
Top 10 Web App Security Risks
IBM Qradar-Advisor
Ad

More from QAware GmbH (20)

PDF
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
PDF
Frontends mit Hilfe von KI entwickeln.pdf
PDF
Mit ChatGPT Dinosaurier besiegen - Möglichkeiten und Grenzen von LLM für die ...
PDF
50 Shades of K8s Autoscaling #JavaLand24.pdf
PDF
Make Agile Great - PM-Erfahrungen aus zwei virtuellen internationalen SAFe-Pr...
PPTX
Fully-managed Cloud-native Databases: The path to indefinite scale @ CNN Mainz
PDF
Down the Ivory Tower towards Agile Architecture
PDF
"Mixed" Scrum-Teams – Die richtige Mischung macht's!
PDF
Make Developers Fly: Principles for Platform Engineering
PDF
Der Tod der Testpyramide? – Frontend-Testing mit Playwright
PDF
Was kommt nach den SPAs
PDF
Cloud Migration mit KI: der Turbo
PDF
Migration von stark regulierten Anwendungen in die Cloud: Dem Teufel die See...
PDF
Aus blau wird grün! Ansätze und Technologien für nachhaltige Kubernetes-Cluster
PDF
Endlich gute API Tests. Boldly Testing APIs Where No One Has Tested Before.
PDF
Kubernetes with Cilium in AWS - Experience Report!
PDF
50 Shades of K8s Autoscaling
PDF
Kontinuierliche Sicherheitstests für APIs mit Testkube und OWASP ZAP
PDF
Service Mesh Pain & Gain. Experiences from a client project.
PDF
50 Shades of K8s Autoscaling
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
Frontends mit Hilfe von KI entwickeln.pdf
Mit ChatGPT Dinosaurier besiegen - Möglichkeiten und Grenzen von LLM für die ...
50 Shades of K8s Autoscaling #JavaLand24.pdf
Make Agile Great - PM-Erfahrungen aus zwei virtuellen internationalen SAFe-Pr...
Fully-managed Cloud-native Databases: The path to indefinite scale @ CNN Mainz
Down the Ivory Tower towards Agile Architecture
"Mixed" Scrum-Teams – Die richtige Mischung macht's!
Make Developers Fly: Principles for Platform Engineering
Der Tod der Testpyramide? – Frontend-Testing mit Playwright
Was kommt nach den SPAs
Cloud Migration mit KI: der Turbo
Migration von stark regulierten Anwendungen in die Cloud: Dem Teufel die See...
Aus blau wird grün! Ansätze und Technologien für nachhaltige Kubernetes-Cluster
Endlich gute API Tests. Boldly Testing APIs Where No One Has Tested Before.
Kubernetes with Cilium in AWS - Experience Report!
50 Shades of K8s Autoscaling
Kontinuierliche Sicherheitstests für APIs mit Testkube und OWASP ZAP
Service Mesh Pain & Gain. Experiences from a client project.
50 Shades of K8s Autoscaling

Recently uploaded (20)

PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
System and Network Administraation Chapter 3
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
top salesforce developer skills in 2025.pdf
PPTX
history of c programming in notes for students .pptx
PDF
Nekopoi APK 2025 free lastest update
PPTX
L1 - Introduction to python Backend.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Transform Your Business with a Software ERP System
Computer Software and OS of computer science of grade 11.pptx
System and Network Administraation Chapter 3
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
How to Migrate SBCGlobal Email to Yahoo Easily
Softaken Excel to vCard Converter Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
ai tools demonstartion for schools and inter college
Operating system designcfffgfgggggggvggggggggg
Digital Systems & Binary Numbers (comprehensive )
wealthsignaloriginal-com-DS-text-... (1).pdf
CHAPTER 2 - PM Management and IT Context
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
top salesforce developer skills in 2025.pdf
history of c programming in notes for students .pptx
Nekopoi APK 2025 free lastest update
L1 - Introduction to python Backend.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Transform Your Business with a Software ERP System

OWASP AppSensor: Detecting Attacks in your Application

  • 1. OWASP AppSensor Detecting Attacks in your Application Meetup, September 2020 Simon Bäumler simon.baeumler@qaware.de
  • 2. Simon Bäumler Sofwarearchitekt, QAware GmbH Kontakt Details Phone: +49 89 23 23 15 136 Mail: simon.baeumler@qaware.de 2 Software architecture & development of secure applications Fan of Microservices, Clouds and Security (of course!) QAware
  • 3. “There are those who've been hacked and those who don't know they've been hacked.” James B. Comey, former FBI Chief
  • 4. Basic assumption: A hacker spies on a system before attacking it. So can’t we detect a hacker before he is actually attacking the system?
  • 5. But aren't there already established intrusion detection systems (IDS)? This is about detecting attacks.
  • 6. QAware 6 There are many variants of IDS Network Based IDS Internet Firewall / Reverse Proxy Server Applikation DB Host Based IDS Web Application Firewall (WAF) Other: Wireless IDS Network behaviour analysis Hybride IDS Is there also an IDS for Applications? ?
  • 7. Classic IDS systems have weaknesses QAware 7 IDS systems don’t know the technical context in the app. To be precise, you need to teach an IDS the connections encoded in the app.  This is complex and error-prone When detecting an attack, an IDS can‘t do much more than block the action  Malfunctions that cannot be understood by the user  Can lead to further application errors A different approach: Building the IDS into the application This allows the business logic to be used to detect suspicious behavior  This is exactly the underlying idea of AppSensor
  • 8. AppSensor in a Nutshell
  • 9. The AppSensor Approach: Use application logic to detect attacks Instrumentation of the application with log-like detection points Evaluation of the collected data on the AppSensor server. Attack detection can thus be further automated Feedback to the system, e.g. to block user accounts of attackers Automatic protection for identified attacks OWASP AppSensor allows context sensitive detection and response to attacks. QAware 9
  • 10. AppSensor is explicitly recommended for prevention of OWASP Top 10: A10-Insufficient Logging&Monitoring QAware 10
  • 11. A word of warning QAware 11 At the moment the development of the AppSensor tooling seems to have stalled The last commit was is august 2019 But: AppSensor calls itself a conceptual framework I.e. it is more about the method than about the concrete tool Parts of the method can be easily implemented with standard frameworks More on that later…
  • 12. QAware 12 AppSensor can be integrated into any system. Component A Component B Component C AppSensor Server AppSensor Client
  • 13. QAware 13 AppSensor can be operated as a server on its own. Component A Component B Component C AppSensor Server AppSensor Client Provisioning of components with Detection Points
  • 14. QAware 14 Detected events are forwarded to the AppSensor server… Component A Component B Component C AppSensor Server AppSensor Client AppSensor Detection Points send events when suspicious behavior is observed The events are forwarded to the server
  • 15. QAware 15 … persisted, aggregated … Component A Component B Component C AppSensor Server AppSensor Client The events are stored in the AppSensor server, aggregated
  • 16. QAware 16 … and analyzed for attacks. Component A Component B Component C AppSensor Server AppSensor Client Analysis: Detection of attack patterns using definable heuristics on the collected events
  • 17. QAware 17 Detected attacks are reported to the application. Component A Component B Component C AppSensor Server AppSensor Client Detected attacks are forwarded to the client.
  • 18. QAware 18 In the application, the developer can decide how to respond to attacks. Component A Component B Component C AppSensor Server AppSensor Client Components can use it to respond to detected attacks
  • 20. QAware 20 The AppSensor Server is designed for extensibility AppSensor Server Store Listeners Analysis Engine Reporting Engine Handler Datastore Config Events/Attacks Responses
  • 21. QAware 21 The interface of AppSensor http://appsensor.org/docs/v2.3.0/api/ui/index.html#/
  • 22. QAware 22 The events and alerts can be viewed in the AppSensorUI
  • 23. Detection Points can be added to components QAware 23 Generation of events similar to logging Important is the category of detection point (here "AE4") - This is how the heuristics work for attack detection if ( username.length > 30 ) { screen_errors.add ( "The username entered is too long." ); // "AE4" is the identifier for this specific detection point appSensor.addEvent ( logged_in_user, "AE4" ); }
  • 24. AppSensor knows 50 types of detection points. QAware 24 Access to resources without permission Client-side input validation bypassed Unexpected data format Suspicious login behavior Attack attempt detected Automated application scan detected
  • 25. Detection Points are configured in the app sensor server QAware 25 <detection-point> <category>Authentication</category> <id>AE2</id> <threshold> <count>3</count> <interval unit="seconds">60</interval> </threshold> <responses> <response> <action>slowdownLogin</action> <interval unit="minutes">10</interval> </response> </responses> </detection-point>
  • 27. 27 Idea: Use existing logging infrastructure. Logstash Kibana Use existing tools (ELK etc) to implement an AppSensor Inspired Security Monitoring Detection Points from AppSensor offer a good reference for: What (and where) should be logged Which data are important for logging The AppSensor-Guide provides useful hints on what to consider https://www.owasp.org/index.php/File:Owasp-appsensor-guide-v2.pdf QAware
  • 28. There are other tools that have a similar approach QAware 28 Logging, e.g with ELK Response can be implemented with Alerting tools, e.g. ElastAlert Ensnare Framework for Ruby on Rails Riemann „Engine for filtering, altering, and combining events“ Runtime Application Self Protection (RASP) includes similar functionality Mostly commercial products
  • 29. The basic idea of AppSensor can be easily implemented QAware 29 AppSensor uses the business logic of an application Security-critical events are detected, collected, and aggregated Alarms can be generated from the collected events via heuristics What is important is the approach, not the tool!
  • 30. QAware GmbH München Aschauer Straße 32 81549 München Tel.: +49 (0) 89 23 23 15 – 0 github.com/qaware linkedin.com/qaware slideshare.net/qaware twitter.com/qaware xing.com/qaware