Skip to content

EitanGayor/openrasp

This branch is 2526 commits behind baidu/openrasp:master.

Folders and files

NameName
Last commit message
Last commit date
Feb 7, 2018
Jan 3, 2019
Jan 3, 2019
Sep 1, 2018
Jul 23, 2018
Jan 10, 2019
Jan 3, 2019
Jan 4, 2019
Oct 10, 2018
Sep 10, 2018
Dec 18, 2018
Nov 8, 2018
Dec 18, 2017
Oct 26, 2018
Dec 12, 2018
Dec 16, 2018
Apr 25, 2018
Dec 5, 2018
Dec 19, 2018
Dec 28, 2018
Dec 18, 2018
Oct 29, 2018

Repository files navigation

OpenRASP

Build Status Build Status

Introduction

Unlike perimeter control solutions like WAF, OpenRASP directly integrates its protection engine into the application server by instrumentation. It can monitor various events including database queries, file operations and network requests etc.

When an attack happens, WAF matches the malicious request with its signatures and blocks it. OpenRASP takes a different approach by hooking sensitive functions and examines/blocks the inputs fed into them. As a result, this examination is context-aware and in-place. It brings in the following benefits:

  1. Only successful attacks can trigger alarms, resulting in lower false positive and higher detection rate;
  2. Detailed stack trace is logged, which makes the forensic analysis easier;
  3. Insusceptible to malformed protocol.

Quick Start

See detailed installation instructions here

We also provide a few test cases that are corresponding to OWASP TOP 10 attacks, download here

FAQ

1. List of supported web application servers

We've fully tested OpenRASP on the following application servers for Linux platforms:

  • Java
    • Tomcat 6-8
    • JBoss 4.X
    • Jetty 7-9
    • Resin 3-4
    • SpringBoot 1-2
    • IBM WebSphpere 8.5, 9.0
  • PHP
    • 5.3-5.6, 7.0-7.2

The support of other web application servers will also be soon included in the coming releases.

2. Performance impact on application servers

We ran multiple intense and long-lasting stress tests prior to release. Even in the worst-case scenario (where the hook point got continuously triggered) the server’s performance was only reduced by 1~4%

3. Integration with existing SIEM or SOC

OpenRASP logs alarms in JSON format, which can be easily picked up by LogStash, rsyslog or Flume.

4. How to develop a new plugin?

A plugin receives a callback when an event occurs. It then determines if the current behavior is malicious or not and blocks the associated request if necessary.

Detailed plugin development instructions can be found here

Contact

Technical support:

Business inquires, comments, concenrs and opinions:

  • General email: fuxi-pm # baidu.com

About

Open source RASP solution

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • JavaScript 43.0%
  • C++ 23.3%
  • Java 12.8%
  • CSS 7.1%
  • PHP 4.1%
  • Go 3.8%
  • Other 5.9%