Network security monitoring excels at traffic analysis and perimeter defense, yet research shows WAF alerts generate overwhelming noise with minimal correlation to actual exploit attempts. The gap exists because network tools operate at the packet level or network edge, while application attacks exploit vulnerabilities during code execution. Runtime application security through Application Detection and Response (ADR) complements network monitoring by adding visibility into application-layer attacks that bypass perimeter defenses.
Network security teams monitor every packet crossing the perimeter. Firewalls filter traffic. IDS/IPS systems scan for known attack signatures. SIEM platforms correlate millions of events.
Yet despite these sophisticated defenses, applications face an average of 81 viable attacks per month that reach exploitable code.
The visibility gap exists not because network tools fail in their purpose, but because application-layer attacks exploit vulnerabilities in code execution, a domain that network monitoring cannot observe at the architectural level.
Network security monitoring provides essential capabilities at the network perimeter:
These tools deliver critical value through ease of deployment and the ability to block high-volume threats before they cross the network perimeter. Organizations rely on network security as an essential first line of defense.
But operating at the network edge creates an architectural limitation. These tools cannot observe what happens inside application code after requests pass network inspection. Network monitoring sees the container (HTTP requests, headers, parameters) but cannot see how the application processes that data once it arrives.
Application-layer attacks succeed by exploiting vulnerabilities during code execution using requests that appear legitimate at the network level. Three common patterns demonstrate this bypass:
When applications deserialize data from requests, malicious payloads execute during object reconstruction. This process occurs in application memory after requests pass network inspection.
Attackers manipulate HTTP parameters to alter application behavior, such as changing POST requests to PUT to bypass restrictions or modifying hidden form fields. These requests conform to HTTP protocol standards and pass network validation, yet exploit logic that the network layer cannot evaluate.
These attacks exploit flaws in how applications validate credentials or manage sessions. Network tools see valid HTTP authentication headers, but the vulnerability exists in application code decisions made after network inspection completes.
Web Application Firewalls (WAFs) provide critical first-line defense, but research shows a fundamental challenge to alert accuracy. Contrast Security research tested three major WAF solutions against thousands of benign requests mixed with genuine exploitation attempts.
|
WAF metric |
Finding |
|---|---|
|
Alerts generated |
836 to 1,297 per WAF solution |
|
Actual exploits identified |
2 to 3 attempts |
|
Correlation rate |
Less than 0.25% |
This low correlation exists because WAFs, positioned at the network boundary, cannot determine whether blocked requests would have actually exploited vulnerabilities in application code. They analyze request patterns and signatures but lack visibility into the application's internal state, data flows and execution context.
The mathematical reality is stark: For every thousand WAF alerts generated during Contrast's research, fewer than three represent actual exploitation attempts.
Security teams investigating these alerts face a signal-to-noise challenge that network-layer tools cannot solve. The WAF sees potentially malicious patterns in network traffic, but cannot see:
This is not a WAF failure. It is an architectural reality of perimeter-based detection.
Different architectural layers require different monitoring approaches for complete defense in depth.
Network security monitoring provides essential visibility at the network perimeter. Application Detection and Response (ADR) extends that visibility into application runtime. Together, they create comprehensive coverage.
ADR operates inside applications to confirm which attacks successfully reach exploitable code. This helps security teams distinguish real threats from false positives. By monitoring code execution and data flows, ADR provides context that network tools cannot access:
These represent common patterns among a broader range of application-layer attacks that evade network detection, including SQL injection, command injection, OGNL injection and unsafe file uploads.
This runtime intelligence enriches existing security infrastructure rather than replacing it.
Network monitoring continues to provide perimeter defense and traffic analysis. ADR adds application-layer verification to confirm which threats warrant investigation. The combination delivers accuracy that neither layer achieves alone.
Organizations implementing this layered approach gain three critical advantages:
No. Runtime security complements network monitoring rather than replacing it. Network security tools like firewalls, IDS/IPS systems, and WAFs provide essential perimeter defense and traffic analysis. Runtime security adds application-layer visibility that network tools cannot provide at the architectural level, creating a comprehensive defense when both layers work together.
WAFs operate at the network perimeter, analyzing HTTP/HTTPS traffic before it reaches applications. They examine request headers, parameters and payloads, but cannot observe how applications process the data upon receipt. Application execution occurs inside the application runtime environment, beyond the architectural boundary where WAFs operate.
Attacks that exploit business logic vulnerabilities during code execution often evade network detection. These include untrusted deserialization (exploits occur during object reconstruction in memory), method tampering (manipulates application logic using valid HTTP requests), authentication bypass (exploits access control flaws in application code), SQL injection (malicious database queries), command injection (arbitrary system command execution), OGNL injection (object graph navigation exploitation) and path traversal (unauthorized file access).
ADR sends runtime-verified attack data to SIEM platforms through standard integrations. This enriches SIEM correlation with application context, helping distinguish real threats from false positives. The SIEM continues to aggregate signals from network tools, endpoints and other sources, while ADR adds an application runtime perspective, enabling more accurate threat correlation.
Network security tools can detect some application-layer attacks, particularly those using known signatures or suspicious patterns. However, they cannot verify whether detected patterns actually exploit vulnerabilities in application code. Research analyzing WAF behavior shows minimal correlation between alerts and actual exploits (less than 0.25% in Contrast Security testing across thousands of mixed benign and malicious requests) because network tools lack visibility into application runtime and business-logic execution.
Organizations typically see ROI within 3-6 months through reduced developer hours spent on security investigations (an average 70% reduction in false-positive investigations), faster mean time to remediation (immediate visibility into exploitation attempts), and avoided breach costs. Security teams focus on confirmed threats rather than investigating thousands of low-correlation alerts from network tools.
Jake Milstein is Vice President of Corporate Marketing & Communications at Contrast Security, where he drives awareness of Application Security and Application Detection & Response (ADR). Before entering cybersecurity, Jake spent much of his career leading newsrooms and newscasts at CBS, Fox, NBC, and ABC affiliates nationwide, earning multiple Emmy and Edward R. Murrow awards. He has since led sales and marketing teams at leading cybersecurity companies, helping customers stop breaches with Managed Detection and Response (MDR), Application Detection and Response (ADR), and a wide range of consulting services.
Get the latest content from Contrast directly to your mailbox. By subscribing, you will stay up to date with all the latest and greatest from Contrast.