For my final year project, I wanted to do a comparative analysis of 2 WAF's ModSec/Shadow Daemon and web-based honeypot SNARE/TANNER.
I wanted to find out if there are any benefits of placing WAF in line with a web-based honeypot. Does it defeat the purpose of a honeypot by placing WAF inline? Can WAF add value in terms of deception capabilities or aid in the development of future mitigation techniques? For instance, determine what attacks bypass WAF. If so, what attacks will be caught by the honeypot? I know this boils down to the honeypot's limitations as it's low-interaction and applies vulnerability type emulation rather than actual vulnerabilities.
Would an inline WAF make the honeypot appear more attractive by making it more difficult to attack?
Can consolidating WAF and honeypot attack vector logs through SIEM help add context to the data generated?
The first approach requires a live deployment, which I currently don't have time to test. The second approach would be ideal because I could use WAF testing frameworks such as WA3F, Web Goat, Imperva, etc., which can be tested in a virtual environment.
I don't know why this research topic hasn't been researched before. I just want to confirm whether it's a waste of time or whether I’m doing it wrong.