All Products
Search
Document Center

Security Center:Application protection FAQ

Last Updated:Apr 01, 2026

This topic answers frequently asked questions about the application protection feature in Security Center.

Application protection vs. WAF

Application Protection RASP (Runtime Application Self-Protection) and Web Application Firewall (WAF) are two different technologies that protect applications. RASP excels at protecting against attacks that target servers, such as zero-day attacks and attacks over encrypted traffic. WAF excels at defending against traffic-based attacks at the front end. The security capabilities of these two technologies are complementary, and we recommend that you configure both Application Protection and WAF.

Item

Application protection (RASP)

WAF

Focus

Secures the application internally, regardless of the traffic source.

Filters and blocks attacks based on traffic signatures at the network layer.

Common protection scope

Both provide defense against common web vulnerabilities, such as SQL injection, remote code execution, file inclusion, and webshells.

Specialization

Protects against zero-day vulnerabilities, attacks in complex encoded or encrypted traffic, in-memory webshells, non-HTTP protocol threats, and lateral movement within an internal network.

Protects against Denial-of-Service (DoS) attacks, web scrapers, and scanners, and provides access control and API security.

Detection method

Analyzes application behavior to detect attacks.

Matches and filters traffic based on attack signatures.

Deployment

On the server, integrated directly into the application runtime.

At the network edge, typically as a reverse proxy or in-line before the server. It is not installed on the application server.

Performance impact

Consumes a small amount of server resources.

Consumes WAF resources. No performance impact on the application or origin server.

Remediation

Applies a virtual patch and can pinpoint the exact line of code being exploited.

Applies a virtual patch and reports the signature of the exploit attempt.

Zero-day vulnerability prevention

Supported by default.

Requires custom rules based on the specific exploit pattern.

Verify application protection

  1. Log on to the Security Center console.

  2. In the left-side navigation pane, choose Protection Configuration > Application Protection. In the upper-left corner of the console, select your asset region: Chinese Mainland or Outside Chinese Mainland.

  3. On the Application Protection page, click the Application Configurations tab. Find the target application group and click the number in the Authorized Process column.

  4. In the instance details panel, view the list of protected applications.

  5. If the process ID (PID) of your application appears in the list, your application is protected.

    image.png

Performance impact

Application protection has minimal impact on system performance, compatibility, and stability. In performance tests, enabling application protection resulted in a CPU overhead of less than 1%, less than 50 MB of additional memory usage, and an application latency increase of less than 1 millisecond.

To further ensure stability, application protection includes safeguards such as a soft circuit-breaking mechanism. For more information, see Enable application protection.

Choose a protection mode

Attacks detected by application protection represent real security threats. Unlike traditional traffic-based detection, the false positive rate is extremely low. Therefore, treat all detected attacks seriously. By default, application protection operates in Monitor mode. After you verify that your application runs stably, you can switch to Block mode.

Why is no attack data displayed?

This may occur for two main reasons:

  • The target application is not fully integrated. Try enabling protection for the application process again. For more information, see Enable application protection.

  • No real attacks have occurred. Unlike a traditional firewall that alerts on malicious signatures, application protection only reports verified attacks that have a real impact. For example, an attack that exploits a PHP vulnerability is harmless in a Java environment and would not be reported. A verified attack from application protection means an attacker has likely bypassed your perimeter defenses. While you may not see a high volume of these attacks, each one is a critical event that requires immediate attention. You should block the attack or patch the underlying vulnerability.

Weakness detection vs. baseline checks

The weakness detection feature analyzes an application's runtime behavior and memory to identify potential risks. The baseline check feature scans for security risks in system configurations, such as compliance with CIS Benchmarks, and detects issues in static files.

Why protection enablement fails

Protection can fail for the following reasons:

  • If anti-virus software is installed on the host, it may quarantine the Security Center agent or the RASP agent. Check the quarantine log of your anti-virus software.

  • On a Linux server, check if the password for the root account has expired.

Identifying service blocks

If you find a AliCloudRaspSecurityException runtime exception in your service logs, it means RASP has detected a potential security threat and blocked the corresponding process. If this block is a false positive and you want to allow this behavior, add the process to a whitelist. For more information, see Create whitelist rules.