Wallarm AI Engine: How It Works

The main task of the run-time application security is to protect modern applications and APIs. In this endeavor the solutions face a number of challenges:

  • Applications are different both in structure and in content. Things that are harmful to one application may be perfectly normal for another.
  • User behavior varies between both the applications and the individual application functions. For example several login calls every second may indicate a credential stuffing attack, while several data layer queries per second may be a normal function of building a correlated data set.
  • The number of known attacks keeps growing, with attack patterns (or signatures) sometimes being hidden within nested protocols
  • Straightforward implementation of attack detection based on signatures often results in a high rate of false positives and false negatives.

Download this whitepaper to learn how Wallarm solves the difficult task of effective application security by relying on AI and machine learning including a unique combination of hierarchical clusterization, statistical n-gram based models, recurrent neural networks and reinforcement learning.

panasonic logo
miro logo
rappi logo
semrush logo
tipalti logo
wargaming logo
gannett logo
acronis logo
uz leuven logo
workforce logo
sunquest logo
omio logo
Ready to protect your APIs?

Sign up for free. Get started in minutes.