Malicious request fingerprinting is a technique used to identify and block suspicious or malicious requests on a website. It involves analyzing various attributes of incoming requests and comparing them against known patterns or indicators of malicious activity. The Website Firewall fingerprint scan will not systematically deny access to visitor. However, it should make one or more of these actions:
Request Analysis: When a request is received by your website, its attributes are analyzed. This includes examining elements such as the request method (e.g., GET, POST), headers, user-agent, IP address, URL parameters, and other relevant data.
Creating Fingerprint: Based on the analyzed attributes, a unique fingerprint or signature is generated to represent the request. This fingerprint can be a combination of values, hashes, or patterns extracted from the request attributes.
Comparison with Known Patterns: The generated fingerprint is compared against our database of known malicious request patterns or signatures. These patterns may include known attack vectors, suspicious user agents, common injection techniques, or other indicators of malicious intent.
Blocking or Flagging: If the generated fingerprint matches any known malicious patterns, the Website Firewall will block the request and flag it for further analysis.