Create a Custom Application Signature
Follow these steps to build a custom application.
To create a custom application signature, you must do the following:
- Research the application using packet capture and analyzer tools
- Identify patterns in the packet captures
- Build your signature
- Validate your signature
Custom application signatures require you to specify the
Scope—how your signature is applied to the traffic,
Context—the portion of the file or protocol where you expect to find your pattern, the
Pattern, and the
Pattern Matchfor string contexts and
Less Than, or
Equal Tofor integer-based contexts).
- Research the application using packet capture and/or analyzer tools.
- You should understand how you’d like to control the application before all else. Do you want to limit application functionality? Create a usage report? You’ll want to examine the contents of packet captures to gather context and identify unique characteristics of the application.
- Perform multiple packet captures between the client system and web server.Generate traffic for various application scenarios once you have launched the capture tool. For example, if you wanted to create a signature for ‘uploading’ on uploading.com, you would upload a file on that site.Multiple sessions might be created for the different actions performed in the application. You will need to locate and inspect each type of session in the resulting packet captures.
- Inspect packet captures for values or patterns that uniquely identify the application or application function.For example, after you uploaded a file to uploading.com, you would look for HTTP POST request packets in the sessions captured by your packet analyzer tool. Then, you would examine the packet contents for patterns.
- Create the custom application.
- Selectand clickObjectsApplicationsAdd.
- UnderConfiguration, enter a name and optional description for the application. Specify the application’s Properties and Characteristics.
- If your custom application has no Parent App that can be identified by regular App-ID or is used in an application override, the application cannot be scanned for threats.
- If the custom application has scanning options unchecked, the threat engine will stop inspecting the traffic as soon as the custom application is identified.
- UnderAdvanced, define settings that will allow the firewall to identify the application protocol:
- Specify the default ports or protocol that the application uses. To specify signatures independent of protocol, select None.
- Specify the session timeout values. If you don’t specify timeout values, the default timeout values will be used.
- Indicate any type of additional scanning you plan to perform on the application traffic.
- Define your signature.Multiple signatures may be necessary to account for all traffic specific to the application.
- UnderSignatures, clickAddand enter aSignature Nameand optional description.
- Specify theScope—Select betweenTransaction(e.g. HTTP request and response) orSession(e.g. a single POST request).
- Specify the matching conditions by clickingAdd And ConditionorAdd Or Condition.
- Select anOperatorto define the conditions that must be true for a signature to match traffic.
- If you selectPattern Match, select aContextand then use a regular expression to specify thePattern. Optionally,Adda qualifier/value pair.
- Qualifiers are context-dependent and limit the match condition for the given context. For example, you might use the http-method qualifier to specify that a http-req-uri-path only matters if it is found inside an HTTP GET method.
- If you selectEqual To,Less Than, orGreater Than, select an integerContext, and enter aValue.
- If you leaveOrdered Condition Matchselected, make sure the condition or group of conditions is in the desired order. The most specific conditions should come first. To order the conditions: Select a condition or a group and clickMove UporMove Down.You cannot move conditions from one group to another.
- Save the custom signature.
- ClickOKto save your signature definition.
- Commityour signature.
Recommended For You
Recommended videos not found.