From Regular Expressions to AI

Three generations of attack detection methodology

The oldest and well-studied approach is based on signatures and heuristics.

From before the internet times, this approach was implemented in most kinds of detection systems from firewalls to anti-viruses. The second genera-
tion represents an improvement over the regular expression-based signatures by replacing them with specific parsers or tokenizers.

As a third generation solution, we have decided to dive deeper into the examples of attacks that can and can not be detected by the methods of different generations. While simple issues (simple true negatives) are detectable even by the legacy first generation solutions, eliminating false positives and dealing with multiple encoding requires understanding the application context. See the table below for some of the common examples.

The innovation in the 3rd generation of detection logic is to apply machine learning techniques to bring the detection grammar as close as possible to the
real SQL/HTML/JS grammar of the protected system.

We have recently published a whitepaper on Evolution of Detection Logic where we take a closer look at the grammar models that lie in the foundation of different detection approaches.

The 3rd generation detection logic should be able to approximate a Turing machine to cover recursively enumerable grammars.

This task of creating an adaptable Turing machine was unsolvable up until 2010th when the first researches of neural Turing machines were published.

Read the full whitepaper to get a better understanding of the machine learning algorithms involved, models and approaches, that are applicable to the logic of detection not only in WAFs but also in other security solutions from IPS and DAST to compliance signatures.

Recent Posts

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

2 weeks ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

2 weeks ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

3 weeks ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

1 month ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

1 month ago

CISO Spotlight: Craig Riddell on Curiosity, Translation, and Why API Security is the New Business Imperative

It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…

1 month ago