Difference between revisions of "OWASP AppSensor Handbook"
|Line 120:||Line 120:|
__NOTOC__ <headertabs />
__NOTOC__ <headertabs />
Revision as of 18:37, 30 October 2013
The OWASP AppSensor Handbook
The OWASP AppSensor Handbook is a documentation project that documents, the philosophy, architecture, development, deployment, verification and operation of OWASP AppSensor.
Write a short introduction
Write a description that is just a few paragraphs long
The OWASP AppSensor Handbook is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
What is XXX?
OWASP XXX provides:
Link to presentation
Project leader's name
News and Events
This project can be purchased as a print on demand book from Lulu.com
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:
As of XXX, the priorities are:
Involvement in the development and promotion of XXX is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
| project_name = OWASP AppSensor Project
| project_home_page = :Category:OWASP AppSensor Project
| project_description =
Real Time Application Attack Detection and Response
The AppSensor project defines a conceptual framework and methodology that offers prescriptive guidance to implement intrusion detection and automated response into an existing application. Current efforts are underway to create the AppSensor tool which can be utilized by any existing application interested in adding detection and response capabilities.
Detection AppSensor defines over 50 different detection points which can be used to identify a malicious attacker.
Response AppSensor provides guidance on how to respond once a malicious attacker has been identified. Possible actions include: logging out the user, locking the account or notifying an administrator. More than a dozen response actions are described.
Defending the Application An attacker often requires numerous probes and attack attempts in order to locate an exploitable vulnerability within the application. By using AppSensor it is possible to identify and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.
| project_license = Creative Commons Attribution Share Alike 3.0 for documentation & MIT License for Tools
| leader_name1 = Michael Coates | leader_email1 = firstname.lastname@example.org | leader_username1 = MichaelCoates
| leader_name2 = John Melton | leader_email2 = email@example.com | leader_username2 = John Melton
| leader_name3 = Colin Watson | leader_email3 = firstname.lastname@example.org | leader_username3 = Clerkendweller
| leader_name4 = Dennis Groves | leader_email4 = email@example.com | leader_username4 = Dennis Groves
| contributor_name1 = Ryan Barnett | contributor_email1 = firstname.lastname@example.org | contributor_username1 = Rcbarnett
| contributor_name2 = Simon Bennetts | contributor_email2 = | contributor_username2 = Simon Bennetts
| contributor_name3 = August Detlefsen | contributor_email3 = | contributor_username3 =
| contributor_name4 = Randy Janida | contributor_email4 = | contributor_username4 =
| contributor_name5 = Jim Manico | contributor_email5 = email@example.com | contributor_username5 = Jmanico
| contributor_name6 = Giri Nambari | contributor_email6 = | contributor_username6 =
| contributor_name7 = Eric Sheridan | contributor_email7 = | contributor_username7 = Esheridan
| contributor_name8 = John Stevens | contributor_email8 = | contributor_username8 = firstname.lastname@example.org
| contributor_name8 = Kevin Wall | contributor_email8 = | contributor_username8 =
| contributor_name9 = Dennis Groves | contributor_email9 = | contributor_username9 =
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project
| project_road_map = http://www.owasp.org/index.php/OWASP_AppSensor_Project#tab=Project_Roadmap
| links_url1 = http://www.brighttalk.com/webcast/20680 | links_name1 = Automated Application Defenses to Thwart Advanced Attackers
| links_url2 = https://www.owasp.org/index.php/File:Appsensor-pid.pdf | links_name2 = Diagram
| links_url3 = https://github.com/jtmelton/appsensor | links_name3 = AppSensor v2 Code
| links_url4 = https://www.owasp.org/index.php/Project_Information:template_AppSensor_Project | links_name4 = Former Project About
| release_1 = AppSensor v2 (alpha)
| release_2 =
| release_3 =
| release_4 = | project_about_page = Projects/OWASP AppSensor Project }}