SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Research Director, Enterprise Management Associates
Twitter: @SecurityMonahan
Distil Networks 2017 Bad Bot Report:
6 High Risk Lessons
for Website Defenders
Rami Essaid
CEO, Distil Networks
Twitter: @ramiessaid
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Featured Speakers
David Monahan, Research Director, Risk & Security Management, EMA
David has over 20 years of IT security experience and has organized and
managed both physical and information security programs, including Security and
Network Operations (SOCs and NOCs) for organizations ranging from Fortune
100 companies to local government and small public and private companies.
Rami Essaid, CEO, Distil Networks
Rami is the CEO and co-founder of Distil Networks, the first easy and accurate
way to identify and police malicious website traffic, blocking 99.9% of bad bots
without impacting legitimate users.
With over 15 years in telecommunications, network security, and cloud
infrastructure management, Rami continues to advise enterprise companies
around the world, helping them embrace the cloud to improve their scalability and
reliability while maintaining a high level of security. Follow Rami at @RamiEssaid
Slide 2 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics for Today’s Webinar
Slide 3 © 2017 Enterprise Management Associates, Inc.Slide 3 © 2016 Enterprise Management Associates, Inc.
An archived version of the event recording will be
available at www.enterprisemanagement.com
• Log questions in the chat panel located on the lower
left-hand corner of your screen
• Questions will be addressed during the Q&A session
of the event
QUESTIONS
EVENT RECORDING
A PDF of the speaker slides will be distributed
to all attendees
PDF SLIDES
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Research Director of Security and Risk Management
Enterprise Management Associates
dmonahan@emausa.com
@SecurityMonahan
Bad Bot Report:
Six Risky Lessons
for Website Defenders
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Bot- a.k.a. “Internet Bot,” “Internet
Robot,” or “Web Robot”
Automated systems using various programs to perform
relatively simple, repetitive tasks on behalf of their owners
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Bots are Part of Internet Life
 The web, e-commerce, and bots are here to stay
 Good bots are used by all major web presence
companies:
 Facebook, Google, Microsoft, Yahoo, etc.
 Used to index/manage websites, measure app
performance, and other maintenance tasks
 Bad bots are used by nefarious organizations
worldwide
 Bad bots are created, not born
 Free cloud accounts
 Compromised systems
Slide 6 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Good, the Bad, and the Ugly About Bots
 Bots are estimated to be between 40% and 55%
of total Internet traffic
 Bad bots are estimated to be between 19% and
31% of Internet traffic
 Bot control is voluntary without additional
technology
 Robots.txt is the only “integrated” protection method in
html
 Require “tests” or thorough vetting to stop
Slide 7 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 8
When Bots Attack (Application and API Flaws)
 Token Cracking
 Carding
 Ad Fraud
 Fingerprinting
 Scalping Obtain
 Expediting
 Credential Cracking
 Credential Stuffing
 CAPTCHA Bypass
 Card Cracking
© 2017 Enterprise Management Associates, Inc.
More at OWASP Automated Threat Handbook
 Scraping
 Cashing Out
 Sniping
 Vulnerability Scanning
 (Distributes) Denial of Service
 Footprinting
 Skewing
 Spamming
 Account Creation
 Account Aggregation
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Why Bots can be Tough for Applications to
Detect
 Bots masquerade as users
 Page browsing
 Mouse movement and clicks
 Adaptive content presentation/responses
 Bots masquerading as other devices
 Lies that it is a mobile device
 Lies about its browser engine/version
 Lies about its OS
 Application APIs deliver micro-services,
exposing numerous interfaces to the
Internet
 Net effect: provides opportunity to attack each
micro-service
Slide 9 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Techniques to Stop Application Attacks
 Better application coding practices
 Input filtering
 Safer functions
 HIPS (Human Interactive Proofs)
 (re)CAPTCHA
 Hidden fields
 HOPS (Human Observation Proofs)
 Mouse movement
 Page movement (selection rate, usage patterns)
 Clicks
 Web Application Firewall
 Bots or bad programming – life lesson
Slide 10 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Attacks Against Business Logic
Slide 11 © 2017 Enterprise Management Associates, Inc.
 Exploit various facets of operation rather than programming
flaws
 Require a greater understanding of operation than
programming
 No single part of the application or normal Internet filtering has
enough visibility/context
Business logic attacks are not trivial in their consequences and are
successful on even the largest organizations. A few of the large organizations
that fell victim to business logic flaws are Facebook, Nokia, and Vimeo.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
 Modification of authentication flags and privilege escalations
 Business constraint exploitation/modification or business logic
bypass to generate fraudulent transactions
 Requested parameter modification
 Developer’s cookie tampering and business process/logic
bypass
 Exploiting clients’ side business routines embedded in
JavaScript, Flash, or Silverlight
 Identity or profile extraction
 LDAP parameter identification and critical infrastructure
access
Slide 12 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Attacks Against Business Logic
Examples
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Thoughts
Cloud and IoT have done for bots what Paypal and
cryptocurrency has done for ransomware
Bad bots are at epidemic proportions and will continue
expanding if left unchecked
Bot activity will continue to become more invasive and
burdensome to application delivery
Bot sophistication is increasing. Machine learning and AI
will do for bots what they did for malware detection
Automation of Internet attacks will likely have the same
impacts on the hacking industry that it has on other
production line manufacturing (bots replacing humans)
3 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Defeating Advanced Bots
Continuous monitoring and prevention are necessary: but with WHAT?!
Must “see” full context
• API and business logic awareness is crucial
• Advanced fingerprinting (sees through the lies)
 More than IP, OS, browser, reputation
 Pull data from client, not rely on push
• Adaptive learning (unsupervised machine learning)
• Behavioral analysis
• Enhanced API authentication
• Dynamic rate limiting to protect API scraping
• Browser validation
Slide 14 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Next Steps
Slide 15 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
• Learn more about bots!
• Take your time in evaluating solutions
• Ask the right questions
(Check out the paper)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Distil Networks 2017 Bad Bot Report:
6 High Risk Lessons
for Website Defenders
Rami Essaid
CEO, Distil Networks
Twitter: @ramiessaid
2017 Bad Bot Report Methodology
Study based on anonymized data
Hundreds of billions of bot requests
Thousands of domains
Plus 17 global data centers
Key Findings
Key Findings
Bad Bot, Good Bot, and Human Traffic, 2016
Good
Bots
Humans
Bad Bots
19.9% of Web Traffic Causes Problems
The Four Key Website Attributes that Attract Bad Bots
Signup and Login
Payment Processor
Web Forms
Pricing Information
Proprietary Content
The Four Attributes By the Numbers
The Bad Bot Landscape
Size Matters: The Bigger The Site, The Bigger the Bad Bot Problem
Largest sites most
attractive to bad bots
Bad bot traffic on large
sites up 36.43% YOY
Small and tiny sites have
more bots than humans
*Websites grouped by Alexa rank
More Bad Bots Than Good on Large and Medium Sites
Small and tiny sites
have more good
bots than bad bots
37.5% more bad
bots than good on
large sites
Uncle Sam’s Bot Army
More bad bots come from the US than
the rest of the world...combined
The US originates 5 times more bad bot
traffic than The Netherlands (2nd Place)
Countries with the Highest “Bad Bot GDP”
Dominica has 3,348 bad bots per
internet user
Seychelles ranked third, which is
also the alleged home of the owner
of BitTorrent site Pirate Bay
US only 5th on bad bot GDP list
with 446
Bad Bots Lie About Their Identity
75.9% of bad bots claim they are
Chrome, Internet Explorer,
Firefox, or Safari
38.61% of bad bots claim they
are Chrome
More bad bots claim to be Safari
Mobile than Safari OSX for the
first time
8% of bad bots claim to be good
bots like search engine crawlers
More Bad Bots Claim to Be Mobile
The amount of bad bots claiming to be
mobile browsers jumped 42.78% in 2016
Mobile: The Undefended Frontier
9.4% of bad bot traffic
originates from mobile ISPs
T-Mobile and AT&T Wireless
top US based Mobile ISPs for
bad bot traffic
China Mobile third on the list
Data Centers are the Biggest Threat
Two out of three bad bots come from a data center
Amazon AWS is responsible for 4x the amount of bad
bot traffic as second place (OVH SAS)
Bad Bots Know What They Want
You’ve Been Scraped
OWASP AUTOMATED THREAT: SCRAPING
Scraper bot sophistication
What Gets Scraped?
Data Scraping Price Scraping
AggregatorsCompetitive Intel
Bad Bots Love Login Pages
OWASP AUTOMATED THREATS:
CREDENTIAL CRACKING, CREDENTIAL STUFFING
Account takeover bot sophistication
How Credential Stuffing Works
Credential stuffing exploits our
propensity to reuse passwords
across multiple sites.
Protecting Your Login Page Is Not Enough
Account Based Fraud
OWASP AUTOMATED THREATS:
CARDING, CARD CRACKING, CASHING OUT
Account exploitation bot sophistication
Account Takeover Attacks: Why?
Financial fraud
Targets are accounts at financial or
e-commerce services that store
users’ banking details. The attackers
perform unauthorized withdrawal
from bank accounts or fraudulent
transactions using the credit/debit
cards on file.
This includes virtual currency such
as bitcoin, in-game currency, and
rewards programs. This is all worth
real money.
Spam
Spam can appear in any service
feature that accepts user-
generated content, including
discussion forums, direct
messages, and reviews/ratings,
degrading platform integrity and
brand reputation.
Phishing
Attackers can assume a
compromised user’s identity and
launch phishing attacks on
others in his/her social circle to
steal their credentials, personal
information, or sensitive data.
Spamming Bots Are Annoying
OWASP AUTOMATED THREAT: SPAMMING
Spamming bot sophistication
Application Denial of Service
OWASP AUTOMATED THREAT: DENIAL OF
SERVICE
Denial of service bot
sophistication
What’s the Difference Between Application Denial of Service and DDoS?
Application Denial of Service
Attacks the application directly
Hard to spot because it won’t show up
as an anomaly on your firewall and may
not impact load balancer
DDoS
Attacks the ISP hosting your application
Easier to spot because it floods
upstream infrastructure to point where
packets never arrive at the web server
All Your Web Analytics Are Wrong
OWASP AUTOMATED THREAT: SKEWING
Sophistication level of bots
that skew analytics
Skewed Conversion Tracking
“The number of conversions were
greatly deflated because of bad bot
traffic. Now that we’re filtering bad
bot traffic out, we’re able to see
what the real data is and make
decisions based on real visitors.”
Marty Boos
CIO, StubHub
Advice for Web Security Professionals
Geofence Your Website from Offending Countries
*Measuring customer block requests by geographical region
China and Russia
accounted for 79.9%
of country-specific
block requests
Dominica, Netherlands,
and Seychelles all
generate more than a
thousand bad bots per
internet user
Only Allow Browsers on Your Site
25% of bad bots are simple scripts running
in the command line interface
If you block users that aren’t connecting
with browsers, you will prevent simple bad
bots from attacking your site
Block Old User Agents and Browsers
9.45% of bad bots claim to be
browser versions that are 5
years old or older
Blocking old browsers and user
agents will stop bad bots from
reaching your site
The top 10 Oldest Self-Reported Browsers by Bad Bots, 2016
Mobile is a Growing Bad Bot Attack Vector
Rate-limit mobile traffic
Consider carefully when IP
blocking within mobile because
it blocks too many real users
Try to generate tokens, in a
secure way, to identify and
rate-limit users
Having a login, data, pricing information,
payment processing, and/or forms means you
have bad bots
Take action, don’t just ignore the problem
Don’t do it yourself, because you’ll be stuck in an
endless cycle of IP whack-a-mole
Understand the problem, read the OWASP
handbook on automated threats
Don’t Ignore the Problem
What to Look for in a Bot Mitigation Solution
Blocks all automated threats including scraping,
account takeover, spamming, and payment
processor fraud
Uses hi-definition digital fingerprints to ID bad bots,
not just IPs
Enables geofencing from offending nations and ISP
fencing from offending ISPs
Detects scripts, headless browsers, and browser
automation that imitates legitimate users
Applies behavioral analysis using machine learning
Protects APIs
Advanced Persistent Bots
APBs
75%
Basic scripts running
in command line
Headless browsers,
more human-like
Browser automation,
most human-like
https://resources.distilnetworks.com/whitepapers/2017-bad-bot-report
Download the Report
QUESTIONS….COMMENTS
?I N F O @ D I S T I L N E T W O R K S . C O M
OR CALL US ON
1.866.423.0606
www.distilnetworks.com
Thank You for Participating!
To learn more about Distil Networks, visit us at:
http://www.distilnetworks.com
Or contact us at: 415-423-0831

Mais conteúdo relacionado

Mais procurados

White Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad FraudWhite Ops
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaPriyanka Aash
 
Bot Benchmark study - White Ops & DCN
Bot Benchmark study - White Ops & DCNBot Benchmark study - White Ops & DCN
Bot Benchmark study - White Ops & DCNWhite Ops
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANAWhite Ops
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!FitCEO, Inc. (FCI)
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Wossname
 
Understanding corporate networks the open data way
Understanding corporate networks the open data wayUnderstanding corporate networks the open data way
Understanding corporate networks the open data wayChris Taggart
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleShailin Dhar
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 

Mais procurados (20)

Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Ground Truth real safari vs fake safari
Ground Truth real safari vs fake safariGround Truth real safari vs fake safari
Ground Truth real safari vs fake safari
 
IAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud FinalIAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud Final
 
White Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops & Videology Whitepaper
White Ops & Videology Whitepaper
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad Fraud
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Bot Benchmark study - White Ops & DCN
Bot Benchmark study - White Ops & DCNBot Benchmark study - White Ops & DCN
Bot Benchmark study - White Ops & DCN
 
4As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 20144As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 2014
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)
 
Ad fraud is cash out for hacking
Ad fraud is cash out for hackingAd fraud is cash out for hacking
Ad fraud is cash out for hacking
 
Understanding corporate networks the open data way
Understanding corporate networks the open data wayUnderstanding corporate networks the open data way
Understanding corporate networks the open data way
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 

Destaque

Doing More With Less: The Economics of Open Source Database Adoption
Doing More With Less: The Economics of Open Source Database AdoptionDoing More With Less: The Economics of Open Source Database Adoption
Doing More With Less: The Economics of Open Source Database AdoptionEDB
 
What's New in Postgres 9.4
What's New in Postgres 9.4What's New in Postgres 9.4
What's New in Postgres 9.4EDB
 
Final exam qnt 351
Final exam qnt 351Final exam qnt 351
Final exam qnt 351Carmen Smith
 
Manager's Guide To Oracle Cost Containment
Manager's Guide To Oracle Cost ContainmentManager's Guide To Oracle Cost Containment
Manager's Guide To Oracle Cost ContainmentEDB
 
Postgres Relevance: Guidepost to the Future
Postgres Relevance: Guidepost to the Future Postgres Relevance: Guidepost to the Future
Postgres Relevance: Guidepost to the Future EDB
 
Kubernetes Meetup: CNI, Flex Volume, and Scheduler
Kubernetes Meetup: CNI, Flex Volume, and SchedulerKubernetes Meetup: CNI, Flex Volume, and Scheduler
Kubernetes Meetup: CNI, Flex Volume, and SchedulerKatie Crimi
 

Destaque (6)

Doing More With Less: The Economics of Open Source Database Adoption
Doing More With Less: The Economics of Open Source Database AdoptionDoing More With Less: The Economics of Open Source Database Adoption
Doing More With Less: The Economics of Open Source Database Adoption
 
What's New in Postgres 9.4
What's New in Postgres 9.4What's New in Postgres 9.4
What's New in Postgres 9.4
 
Final exam qnt 351
Final exam qnt 351Final exam qnt 351
Final exam qnt 351
 
Manager's Guide To Oracle Cost Containment
Manager's Guide To Oracle Cost ContainmentManager's Guide To Oracle Cost Containment
Manager's Guide To Oracle Cost Containment
 
Postgres Relevance: Guidepost to the Future
Postgres Relevance: Guidepost to the Future Postgres Relevance: Guidepost to the Future
Postgres Relevance: Guidepost to the Future
 
Kubernetes Meetup: CNI, Flex Volume, and Scheduler
Kubernetes Meetup: CNI, Flex Volume, and SchedulerKubernetes Meetup: CNI, Flex Volume, and Scheduler
Kubernetes Meetup: CNI, Flex Volume, and Scheduler
 

Semelhante a Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders

The Imitation Game: Detecting and Thwarting Automated Bot Attacks
The Imitation Game: Detecting and Thwarting Automated Bot AttacksThe Imitation Game: Detecting and Thwarting Automated Bot Attacks
The Imitation Game: Detecting and Thwarting Automated Bot AttacksEnterprise Management Associates
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityDistil Networks
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015BMDS3416
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceIJAEMSJORNAL
 
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...vmblog
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...Career Communications Group
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayAWS Germany
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117Graham Clark
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
Digital Revolution 4.0 is Here Today
Digital Revolution 4.0 is Here TodayDigital Revolution 4.0 is Here Today
Digital Revolution 4.0 is Here TodayDr. Mazlan Abbas
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Evaluating the opportunity for embedded ai in data productivity tools
Evaluating the opportunity for embedded ai in data productivity toolsEvaluating the opportunity for embedded ai in data productivity tools
Evaluating the opportunity for embedded ai in data productivity toolsNeil Raden
 
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mcAccenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mcPaperjam_redaction
 
Industrial Revolution 4.0 is Here Today
Industrial Revolution 4.0 is Here TodayIndustrial Revolution 4.0 is Here Today
Industrial Revolution 4.0 is Here TodayDr. Mazlan Abbas
 

Semelhante a Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders (20)

The Imitation Game: Detecting and Thwarting Automated Bot Attacks
The Imitation Game: Detecting and Thwarting Automated Bot AttacksThe Imitation Game: Detecting and Thwarting Automated Bot Attacks
The Imitation Game: Detecting and Thwarting Automated Bot Attacks
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015Tech Update Summary from Blue Mountain Data Systems June 2015
Tech Update Summary from Blue Mountain Data Systems June 2015
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial Intelligence
 
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...
VMblog - 2018 Artificial Intelligence and Machine Learning Predictions from 3...
 
The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...The Next Big Thing in Technology: What innovations will have the biggest impa...
The Next Big Thing in Technology: What innovations will have the biggest impa...
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
Digital Revolution 4.0 is Here Today
Digital Revolution 4.0 is Here TodayDigital Revolution 4.0 is Here Today
Digital Revolution 4.0 is Here Today
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Evaluating the opportunity for embedded ai in data productivity tools
Evaluating the opportunity for embedded ai in data productivity toolsEvaluating the opportunity for embedded ai in data productivity tools
Evaluating the opportunity for embedded ai in data productivity tools
 
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mcAccenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
Accenture tech vision 2018 slideshare trend3_data_veracity_aw_a_mc
 
Industrial Revolution 4.0 is Here Today
Industrial Revolution 4.0 is Here TodayIndustrial Revolution 4.0 is Here Today
Industrial Revolution 4.0 is Here Today
 

Mais de Distil Networks

The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency ImperativeDistil Networks
 
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?Distil Networks
 
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry Ecosystem
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry EcosystemHow the BOTS Act Impacts Premium Onsales and the Ticketing Industry Ecosystem
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry EcosystemDistil Networks
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramDistil Networks
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Distil Networks
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersDistil Networks
 

Mais de Distil Networks (8)

The Website Resiliency Imperative
The Website Resiliency ImperativeThe Website Resiliency Imperative
The Website Resiliency Imperative
 
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
 
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry Ecosystem
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry EcosystemHow the BOTS Act Impacts Premium Onsales and the Ticketing Industry Ecosystem
How the BOTS Act Impacts Premium Onsales and the Ticketing Industry Ecosystem
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security Program
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!Tune in for the Ultimate WAF Torture Test: Bots Attack!
Tune in for the Ultimate WAF Torture Test: Bots Attack!
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammers
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING David Monahan Research Director, Enterprise Management Associates Twitter: @SecurityMonahan Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders Rami Essaid CEO, Distil Networks Twitter: @ramiessaid
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Featured Speakers David Monahan, Research Director, Risk & Security Management, EMA David has over 20 years of IT security experience and has organized and managed both physical and information security programs, including Security and Network Operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. Rami Essaid, CEO, Distil Networks Rami is the CEO and co-founder of Distil Networks, the first easy and accurate way to identify and police malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. With over 15 years in telecommunications, network security, and cloud infrastructure management, Rami continues to advise enterprise companies around the world, helping them embrace the cloud to improve their scalability and reliability while maintaining a high level of security. Follow Rami at @RamiEssaid Slide 2 © 2017 Enterprise Management Associates, Inc.
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Logistics for Today’s Webinar Slide 3 © 2017 Enterprise Management Associates, Inc.Slide 3 © 2016 Enterprise Management Associates, Inc. An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left-hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING A PDF of the speaker slides will be distributed to all attendees PDF SLIDES
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING David Monahan Research Director of Security and Risk Management Enterprise Management Associates dmonahan@emausa.com @SecurityMonahan Bad Bot Report: Six Risky Lessons for Website Defenders
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Bot- a.k.a. “Internet Bot,” “Internet Robot,” or “Web Robot” Automated systems using various programs to perform relatively simple, repetitive tasks on behalf of their owners
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Bots are Part of Internet Life  The web, e-commerce, and bots are here to stay  Good bots are used by all major web presence companies:  Facebook, Google, Microsoft, Yahoo, etc.  Used to index/manage websites, measure app performance, and other maintenance tasks  Bad bots are used by nefarious organizations worldwide  Bad bots are created, not born  Free cloud accounts  Compromised systems Slide 6 © 2017 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Good, the Bad, and the Ugly About Bots  Bots are estimated to be between 40% and 55% of total Internet traffic  Bad bots are estimated to be between 19% and 31% of Internet traffic  Bot control is voluntary without additional technology  Robots.txt is the only “integrated” protection method in html  Require “tests” or thorough vetting to stop Slide 7 © 2017 Enterprise Management Associates, Inc.
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 8 When Bots Attack (Application and API Flaws)  Token Cracking  Carding  Ad Fraud  Fingerprinting  Scalping Obtain  Expediting  Credential Cracking  Credential Stuffing  CAPTCHA Bypass  Card Cracking © 2017 Enterprise Management Associates, Inc. More at OWASP Automated Threat Handbook  Scraping  Cashing Out  Sniping  Vulnerability Scanning  (Distributes) Denial of Service  Footprinting  Skewing  Spamming  Account Creation  Account Aggregation
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Why Bots can be Tough for Applications to Detect  Bots masquerade as users  Page browsing  Mouse movement and clicks  Adaptive content presentation/responses  Bots masquerading as other devices  Lies that it is a mobile device  Lies about its browser engine/version  Lies about its OS  Application APIs deliver micro-services, exposing numerous interfaces to the Internet  Net effect: provides opportunity to attack each micro-service Slide 9 © 2017 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Techniques to Stop Application Attacks  Better application coding practices  Input filtering  Safer functions  HIPS (Human Interactive Proofs)  (re)CAPTCHA  Hidden fields  HOPS (Human Observation Proofs)  Mouse movement  Page movement (selection rate, usage patterns)  Clicks  Web Application Firewall  Bots or bad programming – life lesson Slide 10 © 2017 Enterprise Management Associates, Inc.
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Attacks Against Business Logic Slide 11 © 2017 Enterprise Management Associates, Inc.  Exploit various facets of operation rather than programming flaws  Require a greater understanding of operation than programming  No single part of the application or normal Internet filtering has enough visibility/context Business logic attacks are not trivial in their consequences and are successful on even the largest organizations. A few of the large organizations that fell victim to business logic flaws are Facebook, Nokia, and Vimeo.
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING  Modification of authentication flags and privilege escalations  Business constraint exploitation/modification or business logic bypass to generate fraudulent transactions  Requested parameter modification  Developer’s cookie tampering and business process/logic bypass  Exploiting clients’ side business routines embedded in JavaScript, Flash, or Silverlight  Identity or profile extraction  LDAP parameter identification and critical infrastructure access Slide 12 © 2017 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Attacks Against Business Logic Examples
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Thoughts Cloud and IoT have done for bots what Paypal and cryptocurrency has done for ransomware Bad bots are at epidemic proportions and will continue expanding if left unchecked Bot activity will continue to become more invasive and burdensome to application delivery Bot sophistication is increasing. Machine learning and AI will do for bots what they did for malware detection Automation of Internet attacks will likely have the same impacts on the hacking industry that it has on other production line manufacturing (bots replacing humans) 3 © 2017 Enterprise Management Associates, Inc.
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Defeating Advanced Bots Continuous monitoring and prevention are necessary: but with WHAT?! Must “see” full context • API and business logic awareness is crucial • Advanced fingerprinting (sees through the lies)  More than IP, OS, browser, reputation  Pull data from client, not rely on push • Adaptive learning (unsupervised machine learning) • Behavioral analysis • Enhanced API authentication • Dynamic rate limiting to protect API scraping • Browser validation Slide 14 © 2017 Enterprise Management Associates, Inc.
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Next Steps Slide 15 © 2017 Enterprise Management Associates, Inc. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING • Learn more about bots! • Take your time in evaluating solutions • Ask the right questions (Check out the paper)
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders Rami Essaid CEO, Distil Networks Twitter: @ramiessaid
  • 17. 2017 Bad Bot Report Methodology Study based on anonymized data Hundreds of billions of bot requests Thousands of domains Plus 17 global data centers
  • 19. Bad Bot, Good Bot, and Human Traffic, 2016 Good Bots Humans Bad Bots 19.9% of Web Traffic Causes Problems
  • 20. The Four Key Website Attributes that Attract Bad Bots Signup and Login Payment Processor Web Forms Pricing Information Proprietary Content
  • 21. The Four Attributes By the Numbers
  • 22. The Bad Bot Landscape
  • 23. Size Matters: The Bigger The Site, The Bigger the Bad Bot Problem Largest sites most attractive to bad bots Bad bot traffic on large sites up 36.43% YOY Small and tiny sites have more bots than humans *Websites grouped by Alexa rank
  • 24. More Bad Bots Than Good on Large and Medium Sites Small and tiny sites have more good bots than bad bots 37.5% more bad bots than good on large sites
  • 25. Uncle Sam’s Bot Army More bad bots come from the US than the rest of the world...combined The US originates 5 times more bad bot traffic than The Netherlands (2nd Place)
  • 26. Countries with the Highest “Bad Bot GDP” Dominica has 3,348 bad bots per internet user Seychelles ranked third, which is also the alleged home of the owner of BitTorrent site Pirate Bay US only 5th on bad bot GDP list with 446
  • 27. Bad Bots Lie About Their Identity 75.9% of bad bots claim they are Chrome, Internet Explorer, Firefox, or Safari 38.61% of bad bots claim they are Chrome More bad bots claim to be Safari Mobile than Safari OSX for the first time 8% of bad bots claim to be good bots like search engine crawlers
  • 28. More Bad Bots Claim to Be Mobile The amount of bad bots claiming to be mobile browsers jumped 42.78% in 2016
  • 29. Mobile: The Undefended Frontier 9.4% of bad bot traffic originates from mobile ISPs T-Mobile and AT&T Wireless top US based Mobile ISPs for bad bot traffic China Mobile third on the list
  • 30. Data Centers are the Biggest Threat Two out of three bad bots come from a data center Amazon AWS is responsible for 4x the amount of bad bot traffic as second place (OVH SAS)
  • 31. Bad Bots Know What They Want
  • 32. You’ve Been Scraped OWASP AUTOMATED THREAT: SCRAPING Scraper bot sophistication
  • 33. What Gets Scraped? Data Scraping Price Scraping AggregatorsCompetitive Intel
  • 34. Bad Bots Love Login Pages OWASP AUTOMATED THREATS: CREDENTIAL CRACKING, CREDENTIAL STUFFING Account takeover bot sophistication
  • 35. How Credential Stuffing Works Credential stuffing exploits our propensity to reuse passwords across multiple sites.
  • 36. Protecting Your Login Page Is Not Enough
  • 37. Account Based Fraud OWASP AUTOMATED THREATS: CARDING, CARD CRACKING, CASHING OUT Account exploitation bot sophistication
  • 38. Account Takeover Attacks: Why? Financial fraud Targets are accounts at financial or e-commerce services that store users’ banking details. The attackers perform unauthorized withdrawal from bank accounts or fraudulent transactions using the credit/debit cards on file. This includes virtual currency such as bitcoin, in-game currency, and rewards programs. This is all worth real money. Spam Spam can appear in any service feature that accepts user- generated content, including discussion forums, direct messages, and reviews/ratings, degrading platform integrity and brand reputation. Phishing Attackers can assume a compromised user’s identity and launch phishing attacks on others in his/her social circle to steal their credentials, personal information, or sensitive data.
  • 39. Spamming Bots Are Annoying OWASP AUTOMATED THREAT: SPAMMING Spamming bot sophistication
  • 40. Application Denial of Service OWASP AUTOMATED THREAT: DENIAL OF SERVICE Denial of service bot sophistication
  • 41. What’s the Difference Between Application Denial of Service and DDoS? Application Denial of Service Attacks the application directly Hard to spot because it won’t show up as an anomaly on your firewall and may not impact load balancer DDoS Attacks the ISP hosting your application Easier to spot because it floods upstream infrastructure to point where packets never arrive at the web server
  • 42. All Your Web Analytics Are Wrong OWASP AUTOMATED THREAT: SKEWING Sophistication level of bots that skew analytics
  • 43. Skewed Conversion Tracking “The number of conversions were greatly deflated because of bad bot traffic. Now that we’re filtering bad bot traffic out, we’re able to see what the real data is and make decisions based on real visitors.” Marty Boos CIO, StubHub
  • 44. Advice for Web Security Professionals
  • 45. Geofence Your Website from Offending Countries *Measuring customer block requests by geographical region China and Russia accounted for 79.9% of country-specific block requests Dominica, Netherlands, and Seychelles all generate more than a thousand bad bots per internet user
  • 46. Only Allow Browsers on Your Site 25% of bad bots are simple scripts running in the command line interface If you block users that aren’t connecting with browsers, you will prevent simple bad bots from attacking your site
  • 47. Block Old User Agents and Browsers 9.45% of bad bots claim to be browser versions that are 5 years old or older Blocking old browsers and user agents will stop bad bots from reaching your site The top 10 Oldest Self-Reported Browsers by Bad Bots, 2016
  • 48. Mobile is a Growing Bad Bot Attack Vector Rate-limit mobile traffic Consider carefully when IP blocking within mobile because it blocks too many real users Try to generate tokens, in a secure way, to identify and rate-limit users
  • 49. Having a login, data, pricing information, payment processing, and/or forms means you have bad bots Take action, don’t just ignore the problem Don’t do it yourself, because you’ll be stuck in an endless cycle of IP whack-a-mole Understand the problem, read the OWASP handbook on automated threats Don’t Ignore the Problem
  • 50. What to Look for in a Bot Mitigation Solution Blocks all automated threats including scraping, account takeover, spamming, and payment processor fraud Uses hi-definition digital fingerprints to ID bad bots, not just IPs Enables geofencing from offending nations and ISP fencing from offending ISPs Detects scripts, headless browsers, and browser automation that imitates legitimate users Applies behavioral analysis using machine learning Protects APIs
  • 51. Advanced Persistent Bots APBs 75% Basic scripts running in command line Headless browsers, more human-like Browser automation, most human-like
  • 53. QUESTIONS….COMMENTS ?I N F O @ D I S T I L N E T W O R K S . C O M OR CALL US ON 1.866.423.0606 www.distilnetworks.com Thank You for Participating! To learn more about Distil Networks, visit us at: http://www.distilnetworks.com Or contact us at: 415-423-0831