惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

The Register - Security
The Register - Security
美团技术团队
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
Jina AI
Jina AI
C
Check Point Blog
aimingoo的专栏
aimingoo的专栏
I
InfoQ
S
Securelist
T
Tor Project blog
GbyAI
GbyAI
L
LINUX DO - 热门话题
V
Visual Studio Blog
AWS News Blog
AWS News Blog
The Cloudflare Blog
腾讯CDC
K
Kaspersky official blog
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
Recorded Future
Recorded Future
李成银的技术随笔
W
WeLiveSecurity
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
M
Microsoft Research Blog - Microsoft Research
G
Google Developers Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
Schneier on Security
Schneier on Security
B
Blog
IT之家
IT之家
爱范儿
爱范儿
H
Help Net Security
Simon Willison's Weblog
Simon Willison's Weblog
NISL@THU
NISL@THU
J
Java Code Geeks
博客园 - 聂微东
T
The Exploit Database - CXSecurity.com
Cyberwarzone
Cyberwarzone
博客园 - 叶小钗
MyScale Blog
MyScale Blog
Application and Cybersecurity Blog
Application and Cybersecurity Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Project Zero
Project Zero
F
Future of Privacy Forum
D
Darknet – Hacking Tools, Hacker News & Cyber Security
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
Hacker News: Ask HN
Hacker News: Ask HN
D
Docker
Apple Machine Learning Research
Apple Machine Learning Research
B
Blog RSS Feed
V
Vulnerabilities – Threatpost

DEV Community

How to Tailor Your Resume to a Job Description in 5 Minutes (A Method That Actually Works) Flutter vs React Native in 2026: I Built the Same App in Both JWT vs Session Tokens in Spring Boot: A Senior Dev's Decision Guide How to Choose an AI Gateway in 2026 How to Teach Source Evaluation When Your Students Use ChatGPT Why Passwordless B2C Rollouts Stall at 5% (and How to Reach 60%) Rmux Review: Rust Terminal Multiplexer Built for AI Agents I realized I was only using half of what Claude Code has to offer DevOps & Deployment Essentials: Your Practical CI/CD Guide How next-generation captchas work and why it matters for automation Chat is Dead: How JSON Prompting Cut My AI Costs by 73% What if Everybody Were Suddenly... Better? Selling Digital Products in a Country PayPal Refuses to Touch PostgreSQL backup tool Databasus released backup verification in real database Docker containers We Connected an LLM to a 12-Year-Old Codebase. Here's What Broke. The Fallacy of Digital Platforms: Why Stripe Isn't Always King Sizce Google'ın 26 Mayıs tarihinde arama bölümünü tamamen yapay zekaya devredecek olması açık webin devamı için nasıl sonuçlanır? When Should You Use GraphRAG Instead of RAG? Big Data Is Not Just About “Huge Data” The Prefix Bubble MPP TestKit VSCode Extension - Inline HTTP 402 Payment Flow Hints The README Was a Protocol. The Entrypoint Was Still Optional. After AI Healthcare, Medical World Models May Be the Next Life-Science AI Platform Your AI Agent Doesn't Need an API Key: Entra Agent ID and Anthropic's Workload Identity Federation ECDSA - The Math That Only Goes One Way S3 Files Killed My Least Favorite Lambda Pattern BNB RPC Endpoints for Production Apps and Backend Workloads I Used to Get Excited About New Tools Now I Feel Tired. Google I/O 2026 — What I Hoped to See Beyond the Model Announcements Most 'AI agents' are just scripts with a marketing budget 🚀 Replicating the evasive VoidLink: My Journey Building Cortex C2 # new stuff dropped in duckkit 🦆 Paying the bills in a restricted country with cryptocurrency: the lie that almost killed our digital product Building Global Economies Through Better APIs: Lessons from PayPal vs Crypto for Crypto Payments in Developing Countries Verified or Not? Ep. 2 — Snyk's Own Test App Scanned With 9 Engines 17 SessionAuth Tools in OpenClaw: Integrate Any AI Framework with Wallet Infrastructure WebMCP and the Citation Paradox — What Agent-Ready Websites Actually Mean for GEO What Gemma 4 Doesn't Know About Cameroon — and What That Taught Me About Building AI for the Real World AI Can Generate Code — And Interactive Coding Playgrounds Are Becoming Essential Modern Web Guidance: Teaching AI Agents to Stop Coding Like It's 2019 The Discipline We Forgot We Had I Built a 3-Agent AI Research Crew in 250 Lines of Python (LangGraph + Free Gemini) PostgreSQL MCP: Let Claude query your databases in plain English Building digital products and Android apps under IteraTrail Fuel Price API for Fleet Cost Planning Linux File System Explained Simply Building a shot-detection worker for an upload pipeline with PySceneDetect 0.7 Wiring VMAF (and PSNR) into your encoder CI with FFmpeg 8.1 and ffmpeg-quality-metrics Bikin Chatbot Sendiri yang Bisa Jawab Pertanyaan dari Dokumen kamu Learning Arabic: Where to Start
OCI Web 应用防火墙(WAF)深度解析:架构、流量检测、威胁防护和企业级安全设计
Bonthu Durga · 2026-05-21 · via DEV Community

简介

现代应用程序在暴露于互联网时,不断面临SQL注入、机器人、DDoS攻击、恶意流量和第7层攻击等威胁。

OCI Web应用防火墙(WAF)通过在流量到达后端应用程序之前进行检查和过滤HTTP/HTTPS流量,帮助保护互联网应用程序。

OCI WAF是什么?

OCI WAF 在流量到达受保护的应用之前执行第 7 层流量检查、请求过滤、威胁检测和政策执行.

-> 它就像网络流量的安全检查点.

为什么需要 WAF

✔ SQL 注入
✔ 跨站脚本 (XSS)
✔ 机器人流量
✔ DDoS攻击
✔ 凭证填充
✔ 恶意HTTP请求

实际案例

攻击者发送恶意SQL负载
→ 应用程序存在漏洞
→ 可能导致数据库被攻破

WAF帮助在恶意请求到达应用程序之前进行拦截.

OCI WAF架构

用户


OCI WAF

流量检查


OCI负载均衡器


应用服务器

理解第7层安全

传统防火墙主要关注网络流量。
WAF 主要关注 HTTP/HTTPS 应用流量。

->OCI WAF 在 OSI 模型的第 7 层运行。

第7层示例

✔ URL地址
✔ HTTP头信息
✔ 曲奇饼干
✔ 请求负载
✔ API请求
✔ 用户代理

请求检查工作流

流量流

  1. 用户发送HTTPS请求
  2. 请求到达OCI WAF
  3. WAF评估规则
  4. 执行威胁情报检查
  5. 检测到恶意载荷
  6. 请求被阻止或允许
  7. 安全交通转发

OCI WAF 安全策略

WAF 策略定义了如何检查和过滤流量.

示例
✔ 访问规则
✔ IP 阻止
✔ 国家过滤
✔ 威胁防护
✔ 流量限制
✔ 机器人管理
✔ 验证码挑战

速率限制

速率限制控制过度的流量请求.

实际案例:

机器人发送10,000次登录尝试
→ WAF速率限制阻止滥用

机器人防护

并非所有流量都来自真实用户.

机器人示例
✔ 凭证填充机器人
✔ 抓取机器人
✔ 伪造流量生成器
✔ 自动化攻击工具

-> OCI WAF 帮助区分合法流量与自动化恶意行为.

OCI WAF 部署模式

OCI WAF 可以根据流量、安全需求和应用程序设计部署在不同的架构中.

边缘 WAF

在流量到达 OCI 基础设施之前,在靠近互联网边缘的位置进行更近的检查.

区域 WAF

流量检查发生在 OCI 区域部署架构内.

附加负载均衡器的 WAF

OCI WAF直接集成到OCI负载均衡器,用于后端应用保护.

WAF + 负载均衡器集成

用户


OCI WAF


OCI负载均衡器


后端应用

WAF 在流量到达后端基础设施之前保护应用程序.

真实企业场景

示例:

电子商务平台

用户
→ WAF
→ 负载均衡器
→ Web服务器
→ 支付应用程序
→ 数据库

攻击示例

攻击者发送恶意登录流量
→ WAF阻止可疑请求
→ 后端保持安全

WAF常见挑战

✔ 假阳性
✔ 合法流量被阻止
✔ 规则调优不佳
✔ SSL配置错误
✔ 缺少排除项
✔ 过于严格的策略

理解误报

有时合法的应用流量可能会匹配安全规则而被意外阻止

示例:

✔ 复杂的API负载
✔ 编码请求
✔ 含特殊字符的搜索查询
✔ 自定义应用参数

-> 高效的WAF部署需要在安全性和应用程序可用性之间取得平衡.

WAF与传统防火墙

传统防火墙 WAF
网络流量 HTTP/HTTPS流量
IP/端口过滤 应用程序检查
第 3/4 层 第 7 层
基础设施保护 应用保护

可观测性 与 监控

WAF 可见性对于安全操作至关重要.

监控范围

✔ 被阻止的请求
✔ 攻击模式
✔ 机器人流量
✔ 请求趋势
✔ 安全事件
✔ 超出速率限制

企业最佳实践

✔ 启用 HTTPS 检查
✔ 持续调整规则
✔ 监控误报
✔ 将 WAF 与负载均衡器结合使用
✔ 启用日志记录
✔ 审查攻击趋势
✔ 定期测试安全策略

理解WAF局限性

尽管OCI WAF提供强大的第7层保护,但它并不能完全替代安全的应用程序设计.

✔ 仅限HTTP/HTTPS流量
✔ 需要规则调优
✔ 无法完全阻止业务逻辑滥用
✔ 安全编码仍然需要
✔ 高级攻击可能绕过薄弱策略

深度防御安全架构

企业安全应结合多个安全层,而不是依赖单一的保护机制.

✔ OCI WAF
✔ OCI 网络防火墙
✔ NSGs
✔ IAM 策略
✔ 安全编码
✔ 漏洞扫描
✔ 日志&监控
✔ 威胁检测

结论

OCI WAF通过在流量到达后端应用之前进行检查、过滤和保障HTTP/HTTPS流量,提供第7层应用保护。

通过结合威胁防护、速率限制、机器人缓解和流量检查,OCI WAF帮助组织在现代云环境中提升应用安全性和运营弹性。