Analysis of Cyberattack Trends and Proactive Defense Approaches Using Web Application Firewall Data

Main Article Content

Amorn Juatee

Abstract

This study aimed to 1) analyze the trends and characteristics of cyberattacks based on real incident data recorded by a Web Application Firewall (WAF); 2) assess risk levels and prioritize cyber threats affecting web application systems; and 3) propose proactive defense strategies aligned with the assessed risk levels. The dataset consisted of cyberattack logs collected from the WAF deployed at Kanchanaburi Rajabhat University between September and December 2025,


comprising 40,934 attack events categorized by attack type and 58,777 events categorized by system security status. Descriptive statistics and trend analysis were employed to examine attack frequency, distribution, patterns, and their impacts on the system.


The results indicated that SQL injection was the most prevalent attack type, accounting for 31.42% of all incidents, followed by web shell uploads and system command attacks. Analysis of system security status revealed that most events were classified as attacked; however, incidents categorized as compromised, infected, and bot-controlled, although fewer in number, caused substantially more severe impacts on the system. The findings suggest that effective cyber threat assessment should adopt a multidimensional perspective, taking into account the number of incidents, attack status, number of affected systems, and impact severity. Such an approach supports the design of proactive cyber defense strategies that are aligned with the organization’s operational context and enhances the systematic and effective management of web application security

Article Details

How to Cite
Juatee, A. (2025). Analysis of Cyberattack Trends and Proactive Defense Approaches Using Web Application Firewall Data. Journal of Applied Information Technology, 11(2), 173–185. retrieved from https://ph02.tci-thaijo.org/index.php/project-journal/article/view/256566
Section
Articles

References

Immadisetti, K. M., Datta, D. V., & Raveendran, L. S. (2025). Website Vulnerability Scanning System. Indian Scientific Journal Of Research In Engineering And Management, 9(03), 1–9. https://doi.org/10.55041/ijsrem43079

Yaddala, M. N. K., & Sunkara, Y. R. (2024). Comprehensive Survey of Web Security Threats in 2024. Indian Scientific Journal Of Research In Engineering And Management, 8(11), 1–7. https://doi.org/10.55041/ijsrem38614

Rathod, J. A., Gowda, D. S., M, K., Talekar, P., Daddi, N., Bhairanallikar, A., & G, G. (2024). The Cross-Site Scripting (XSS) Attack: A Comprehensive Review. International Journal of Advanced Research in Science, Communication and Technology. https://doi.org/10.48175/ijarsct-19230

Babaey, V., & Ravindran, A. (2025). GenXSS: an AI-Driven Framework for Automated Detection of XSS Attacks in WAFs. Preprints. https://doi.org/10.20944/preprints202503.0313.v1

Yelkoti, N. K. K. R. (2025). Beyond Traditional WAFs: Behavioral Analytics for Advanced API Threat Detection and Response. European Journal of Computer Science and Information Technology, 13(46), 10–19. https://doi.org/10.37745/ejcsit.2013/vol13n461019

Leka, E., Lamani, L., Aliti, A., & Hoxha, E. (2024). Web Application Firewall for Detecting and Mitigation of Based DDoS Attacks Using Machine Learning and Blockchain. TEM Journal, 13(4), 2802–2811. https://doi.org/10.18421/tem134-17

Annas, M., Adek, R. T., & Afrillia, Y. (2024). Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications. Deleted Journal, 1(3), 52. https://doi.org/10.29103/jacka.v1i3.16315

Yaddala, M. N. K., & Sunkara, Y. R. (2024). Comprehensive Survey of Web Security Threats in 2024. Indian Scientific Journal Of Research In Engineering And Management, 8(11), 1–7. https://doi.org/10.55041/ijsrem38614

Zaki, A., & Mohammed, S. (2024). Artificial Intelligence for Web Application Firewall (WAF): A Comprehensive Review. International Research Journal of Innovations in Engineering and Technology, 8(11), 219–224. https://doi.org/10.47001/irjiet/2024.811027

ศูนย์เทคโนโลยีสารสนเทศ. (2025). รายงานเหตุการณ์การโจมตีระบบสารสนเทศ. https://itcenter.kru.ac.th/report_attacked

Incesu, E., & Orhan, F. (2018). An analysis of security reporting system data in a public hospital: A retrospective research. Journal of Academic Research in Health Sciences, 5(2), 79. https://doi.org/10.5455/SAD.13-1525867323

Kumar, Y., Satyanarayana, A. S., Kumar, A., & Sharma, V. (2021). Risks and Threats to Web Applications and Their Preventions: A Theoretical Study on Vital Risks and Threats. International Journal of Computer Science and Engineering Technology, 7(2), 432–438. https://doi.org/10.32628/CSEIT217281

Rawther, S., & Sathyalakshmi, S. (2023). The Spread of Malicious Activity in a Computer Network. In Proceedings of the International Conference on Computing, Communication and Networking Technologies (pp. 1–6). IEEE. https://doi.org/10.1109/icccnt56998.2023.10307246

Malik, A. K., Gehlot, S., & Aggarwal, A. (2023). Attacks on Web Applications. In Cybersecurity threats and solutions (pp. 31–62). IGI Global. https://doi.org/10.4018/978-1-6684-8218-6.ch002