Analysis of Cyberattack Trends and Proactive Defense Approaches Using Web Application Firewall Data
Main Article Content
Abstract
This study aimed to 1) analyze the trends and characteristics of cyberattacks based on real incident data recorded by a Web Application Firewall (WAF); 2) assess risk levels and prioritize cyber threats affecting web application systems; and 3) propose proactive defense strategies aligned with the assessed risk levels. The dataset consisted of cyberattack logs collected from the WAF deployed at Kanchanaburi Rajabhat University between September and December 2025,
comprising 40,934 attack events categorized by attack type and 58,777 events categorized by system security status. Descriptive statistics and trend analysis were employed to examine attack frequency, distribution, patterns, and their impacts on the system.
The results indicated that SQL injection was the most prevalent attack type, accounting for 31.42% of all incidents, followed by web shell uploads and system command attacks. Analysis of system security status revealed that most events were classified as attacked; however, incidents categorized as compromised, infected, and bot-controlled, although fewer in number, caused substantially more severe impacts on the system. The findings suggest that effective cyber threat assessment should adopt a multidimensional perspective, taking into account the number of incidents, attack status, number of affected systems, and impact severity. Such an approach supports the design of proactive cyber defense strategies that are aligned with the organization’s operational context and enhances the systematic and effective management of web application security
Article Details
References
Immadisetti, K. M., Datta, D. V., & Raveendran, L. S. (2025). Website Vulnerability Scanning System. Indian Scientific Journal Of Research In Engineering And Management, 9(03), 1–9. https://doi.org/10.55041/ijsrem43079
Yaddala, M. N. K., & Sunkara, Y. R. (2024). Comprehensive Survey of Web Security Threats in 2024. Indian Scientific Journal Of Research In Engineering And Management, 8(11), 1–7. https://doi.org/10.55041/ijsrem38614
Rathod, J. A., Gowda, D. S., M, K., Talekar, P., Daddi, N., Bhairanallikar, A., & G, G. (2024). The Cross-Site Scripting (XSS) Attack: A Comprehensive Review. International Journal of Advanced Research in Science, Communication and Technology. https://doi.org/10.48175/ijarsct-19230
Babaey, V., & Ravindran, A. (2025). GenXSS: an AI-Driven Framework for Automated Detection of XSS Attacks in WAFs. Preprints. https://doi.org/10.20944/preprints202503.0313.v1
Yelkoti, N. K. K. R. (2025). Beyond Traditional WAFs: Behavioral Analytics for Advanced API Threat Detection and Response. European Journal of Computer Science and Information Technology, 13(46), 10–19. https://doi.org/10.37745/ejcsit.2013/vol13n461019
Leka, E., Lamani, L., Aliti, A., & Hoxha, E. (2024). Web Application Firewall for Detecting and Mitigation of Based DDoS Attacks Using Machine Learning and Blockchain. TEM Journal, 13(4), 2802–2811. https://doi.org/10.18421/tem134-17
Annas, M., Adek, R. T., & Afrillia, Y. (2024). Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications. Deleted Journal, 1(3), 52. https://doi.org/10.29103/jacka.v1i3.16315
Yaddala, M. N. K., & Sunkara, Y. R. (2024). Comprehensive Survey of Web Security Threats in 2024. Indian Scientific Journal Of Research In Engineering And Management, 8(11), 1–7. https://doi.org/10.55041/ijsrem38614
Zaki, A., & Mohammed, S. (2024). Artificial Intelligence for Web Application Firewall (WAF): A Comprehensive Review. International Research Journal of Innovations in Engineering and Technology, 8(11), 219–224. https://doi.org/10.47001/irjiet/2024.811027
ศูนย์เทคโนโลยีสารสนเทศ. (2025). รายงานเหตุการณ์การโจมตีระบบสารสนเทศ. https://itcenter.kru.ac.th/report_attacked
Incesu, E., & Orhan, F. (2018). An analysis of security reporting system data in a public hospital: A retrospective research. Journal of Academic Research in Health Sciences, 5(2), 79. https://doi.org/10.5455/SAD.13-1525867323
Kumar, Y., Satyanarayana, A. S., Kumar, A., & Sharma, V. (2021). Risks and Threats to Web Applications and Their Preventions: A Theoretical Study on Vital Risks and Threats. International Journal of Computer Science and Engineering Technology, 7(2), 432–438. https://doi.org/10.32628/CSEIT217281
Rawther, S., & Sathyalakshmi, S. (2023). The Spread of Malicious Activity in a Computer Network. In Proceedings of the International Conference on Computing, Communication and Networking Technologies (pp. 1–6). IEEE. https://doi.org/10.1109/icccnt56998.2023.10307246
Malik, A. K., Gehlot, S., & Aggarwal, A. (2023). Attacks on Web Applications. In Cybersecurity threats and solutions (pp. 31–62). IGI Global. https://doi.org/10.4018/978-1-6684-8218-6.ch002