nehonix-uri-processor
Version:
A powerful URI processor for encoding, decoding, and analyzing URI data securely.
78 lines • 2.78 kB
TypeScript
import { WAFMaliciousPatternOptions as MaliciousPatternOptions } from "../types/v2.2.0";
/**
* Web Application Firewall (WAF) service for detecting and preventing encoded attack patterns
* Provides advanced pattern matching and heuristic analysis for security protection
*/
export declare class NehonixWAFService {
private static readonly DEFAULT_CONFIDENCE_THRESHOLD;
private static readonly DEFAULT_PATTERN_MATCH_THRESHOLD;
/**
* Detects if a string contains encoded attack patterns
*
* @param input - The string to analyze
* @param options - Configuration options for detection
* @returns Object with detection result and confidence score
*/
static detectEncodedAttacks(input: string, options?: {
confidenceThreshold?: number;
patternMatchThreshold?: number;
detectionOptions?: MaliciousPatternOptions;
}): {
isAttack: boolean;
confidenceScore: number;
detectedPatterns: string[];
patternMatches: number;
error?: undefined;
} | {
isAttack: boolean;
confidenceScore: number;
detectedPatterns: never[];
patternMatches: number;
error: any;
};
/**
* Checks if a string contains common malicious patterns
*
* @param input - The string to check
* @param options - Optional configuration for pattern detection
* @returns True if malicious patterns are detected
*/
static containsMaliciousPatterns(input: string, options?: MaliciousPatternOptions): boolean;
/**
* Detects common obfuscation techniques in the input
*
* @private
* @param input - The string to analyze
* @returns True if obfuscation is detected
*/
private static detectsObfuscationTechniques;
/**
* Detects anomalies in encoding patterns that might indicate attacks
*
* @private
* @param input - The string to analyze
* @returns True if encoding anomalies are detected
*/
private static detectsEncodingAnomalies;
/**
* Detects common WAF evasion techniques
*
* @private
* @param input - The string to analyze
* @returns True if evasion techniques are detected
*/
private static detectsEvasionTechniques;
/**
* Generates WAF configuration recommendations based on detected patterns
*
* @param detectionResults - Results from detectEncodedAttacks
* @returns Array of configuration recommendations
*/
static generateWAFRecommendations(detectionResults: {
isAttack: boolean;
confidenceScore: number;
detectedPatterns: string[];
}): string[];
}
export declare const NWAF: typeof NehonixWAFService;
//# sourceMappingURL=NehonixWAF.service.d.ts.map