The State of Application Security: Hackers On Steroids

Imperva
ImpervaMarketing Communications Manager à Imperva
© 2015 Imperva, Inc. All rights reserved.
The State of Application Security:
Hackers On Steroids
Itsik Mantin, Director of Security Research, Imperva
© 2015 Imperva, Inc. All rights reserved.
“Study the past if you would define the
future” (Confucius)
© 2015 Imperva, Inc. All rights reserved.
Speaker
• Director of Security Research at Imperva
• 15 years experience in the security industry
• An inventor of 15 patents in these fields
• Holds an M.Sc. in Applied Math and Computer Science
• Presenter in Blackhat Asia, OWASP IL, EuroCrypt and other
conferences
Itsik Mantin
3
© 2015 Imperva, Inc. All rights reserved.
Making the Report
4
Attack Detection Mechanisms
Application
Profiling
5
Attack Types
6
Attack Incidents
Attack Type Min Ratio
#Alert/5min
SQLi 20
HTTP 10
XSS 5
DT 5
Spam 1
RCE 1
FU 1
Incident
Collection of alerts
Same attack type
Same target
Essentially same time
Not necessarily same IP
Incident Alert RatioIncident Alert Ratio
7
© 2015 Imperva, Inc. All rights reserved.
Attack Trends
1
8
© 2015 Imperva, Inc. All rights reserved.
Chance of Getting Attacked
9
© 2015 Imperva, Inc. All rights reserved.
Chance of Getting Attacked
Everyone’s at risk
3/4 apps attacked for
every attack type
10
© 2015 Imperva, Inc. All rights reserved.
Chance of Getting Attacked “Perfect” RCE Coverage
All applications were attacked
11
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
12
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
75th
Percentile
Median
25th
percentile
13
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
RCE and Spam are the most
popular
RCE: Median of 273
14
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
Inequality Measure
Ratio between 3rd
and 2nd
quartiles
15
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
Inequality Measure
Ratio between 3rd
and 2nd
quartiles
RCE Blind Scans
All applications suffer equally
16
© 2015 Imperva, Inc. All rights reserved.
Number of Attack Incidents
Spam is discriminatory
Spoiler – some industries suffer
more
17
© 2015 Imperva, Inc. All rights reserved.
SQL Injection and Cross-Site Scripting
18
© 2015 Imperva, Inc. All rights reserved.
SQL Injection and Cross-Site Scripting
Most Applications see SQLi and
XSS every other week
Median of 12-13 for 6-month period
3-5 days for topQ applications
19
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Up-Trends
#Incidents
20
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Up-Trends
SQLi Persistent Growth
100% increase in 2014
200% increase in 2015
#Incidents
XSS Persistent Growth
100% increase in 2014
150% increase in 2015
21
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Up-Trends
#Incidents
22
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Up-Trends
23
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Up-Trends
24
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Down-Trends
#Incidents
25
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Down-Trends
#Incidents
RFI was on fire in 2014
Super-popular attack vector in 2014
Back to “normal” in 2015
26
© 2015 Imperva, Inc. All rights reserved.
Year-over-Year Down-Trends
#Incidents
DT Decrease
2014 trend changed
Spoiler – in one industry DT is still
the attack of choice
27
© 2015 Imperva, Inc. All rights reserved.
Magnitude of Attacks
28
© 2015 Imperva, Inc. All rights reserved.
Magnitude of Attacks
SQLi Attacks are most Intensive
72-204 alerts for quartile 3 (of the incidents)
300K alerts in most intensive attack
29
© 2015 Imperva, Inc. All rights reserved.
Reputation
2
30
Reputation
31
Reputation
32
Reputation
Serial Attackers – 70%
Anonymous Browsing – 8%
33
© 2015 Imperva, Inc. All rights reserved.
Serial Attackers Vs. Anonymous Browsing
34
© 2015 Imperva, Inc. All rights reserved.
Serial Attackers Vs. Anonymous Browsing
35
© 2015 Imperva, Inc. All rights reserved.
Serial Attackers Vs. Anonymous Browsing
140,000 anonymous browsing
1,800,000 detect-by-content
12,500,000 serial attackers
1,700,000 anonymous browsing
280,000 detect-by-content
28,000 serial attackers
36
© 2015 Imperva, Inc. All rights reserved.
Industry Trends
3
37
© 2015 Imperva, Inc. All rights reserved.
Per-Industry Trends
Health
Food
Travel
Leisure
Shopping
Business
Financial
Computer
DT FU HTTP RFI SQLi XSSSpamRCE
38
© 2015 Imperva, Inc. All rights reserved.
Per-Industry Trends
Health
Food
Travel
Leisure
Shopping
Business
Financial
Computer
DT FU HTTP RFI SQLi XSSSpamRCE
Massive Spam/RCE
Campaigns
39
© 2015 Imperva, Inc. All rights reserved.
Per-Industry Trends
Health
Food
Travel
Leisure
Shopping
Business
Financial
Computer
DT FU HTTP RFI SQLi XSSSpamRCE
RCE blind scans
Massive Spam/RCE
Campaigns
40
© 2015 Imperva, Inc. All rights reserved.
Per-Industry Trends
Health
Food
Travel
Leisure
Shopping
Business
Financial
Computer
DT FU HTTP RFI SQLi XSSSpamRCE
RCE blind scans
Spam focused on travel
applications
Massive Spam/RCE
Campaigns
41
© 2015 Imperva, Inc. All rights reserved.
Attack Types
42
© 2015 Imperva, Inc. All rights reserved.
Attack Types
43
© 2015 Imperva, Inc. All rights reserved.
Attack Types
57% XSS incidents
on Health
44
© 2015 Imperva, Inc. All rights reserved.
Attack Types
37% DT incidents on
Food
45
© 2015 Imperva, Inc. All rights reserved.
Web Framework Trends
4
46
© 2015 Imperva, Inc. All rights reserved.
Content Management Systems
47
© 2015 Imperva, Inc. All rights reserved.
CMS Trends
All CMS
Non CMS
Applications
48
© 2015 Imperva, Inc. All rights reserved.
CMS Trends
All CMS
Non CMS
Applications
CMS At Risk
CMS applications are attacked 3 Times more often
Trend consistent for all attack types
49
© 2015 Imperva, Inc. All rights reserved.
WordPress Trends
Other CMS
Non CMS
WordPress
50
© 2015 Imperva, Inc. All rights reserved.
WordPress Trends
Other CMS
Non CMS
WordPress
WordPress at More Risk
3.5 times more attacks than non-CMS Applications
7 times more RFI and Spam Attacks
51
© 2015 Imperva, Inc. All rights reserved.
WordPress Trends
Other CMS
Non CMS
WordPress
WordPress at More Risk
3.5 times more attacks than non-CMS Applications
7 times more RFI and Spam Attacks
WordPress at More Risk
3.5 times more attacks than non-CMS Applications
7 times more RFI and Spam Attacks
52
© 2015 Imperva, Inc. All rights reserved.
Geographic Trends
53
© 2015 Imperva, Inc. All rights reserved.
Geographic Attack Trends
Country Absolute
#Requests
Internet Users
US 17,671,816 278,553,524
China 8,227,498 672,585,110
UK 2,224,749 59,097,955
54
© 2015 Imperva, Inc. All rights reserved.
Geographic Attack – Year-over-Year
55
© 2015 Imperva, Inc. All rights reserved.
Case Studies
6
56
© 2015 Imperva, Inc. All rights reserved.
Shellshock Mega-Trend
57
© 2015 Imperva, Inc. All rights reserved.
Shellshock Mega-Trend 75,000 incidents
189 applications
26,000 incidents
137 applications
23,000 incidents
174 applications
57,500 incidents
193 applications
58
© 2015 Imperva, Inc. All rights reserved.
SQLi Cases Study
59
© 2015 Imperva, Inc. All rights reserved.
SQLi Cases Study 6,800 alerts
per hour
60
© 2015 Imperva, Inc. All rights reserved.
Scraping Case Study
• TOR Massive Scraping attack
• 2 million requests
• 777 TOR Ips
• User-Agent faking
61
© 2015 Imperva, Inc. All rights reserved.
Scraping Case Study
62
© 2015 Imperva, Inc. All rights reserved.
Scraping Case Study
63
© 2015 Imperva, Inc. All rights reserved.
Conclusions
64
© 2015 Imperva, Inc. All rights reserved.
Recommendations
65
© 2015 Imperva, Inc. All rights reserved.
Q&A
7
66
© 2015 Imperva, Inc. All rights reserved.
Download 2015 Web Application Attack Report
67
http://www.imperva.com/DefenseCenter/WAAR
The State of Application Security: Hackers On Steroids
1 sur 68

Recommandé

Why Network and Endpoint Security Isn’t Enough par
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
2.1K vues32 diapositives
Sophisticated Incident Response Requires Sophisticated Activity Monitoring par
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringImperva
995 vues23 diapositives
Anatomy of the Compromised Insider par
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
1.6K vues25 diapositives
The Non-Advanced Persistent Threat par
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatImperva
1.9K vues22 diapositives
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus par
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
1.2K vues31 diapositives
Hackers, Cyber Crime and Espionage par
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
2.4K vues18 diapositives

Contenu connexe

Tendances

An Inside Look at a Sophisticated, Multi-vector DDoS Attack par
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
1.7K vues39 diapositives
Database monitoring - First and Last Line of Defense par
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
1.7K vues19 diapositives
Stop Account Takeover Attacks, Right in their Tracks par
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
2.9K vues22 diapositives
The Anatomy of Comment Spam par
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
1.4K vues35 diapositives
Protect Your Data and Apps in the Public Cloud par
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
2.9K vues27 diapositives
DDos Attacks and Web Threats: How to Protect Your Site & Information par
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon
1.7K vues61 diapositives

Tendances(20)

An Inside Look at a Sophisticated, Multi-vector DDoS Attack par Imperva
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Imperva1.7K vues
Database monitoring - First and Last Line of Defense par Imperva
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
Imperva1.7K vues
Stop Account Takeover Attacks, Right in their Tracks par Imperva
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva2.9K vues
The Anatomy of Comment Spam par Imperva
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
Imperva1.4K vues
Protect Your Data and Apps in the Public Cloud par Imperva
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
Imperva2.9K vues
DDos Attacks and Web Threats: How to Protect Your Site & Information par jenkoon
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
jenkoon1.7K vues
Extend Enterprise Application-level Security to Your AWS Environment par Imperva
Extend Enterprise Application-level Security to Your AWS EnvironmentExtend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS Environment
Imperva2.9K vues
Web Application Attack Report (Edition #1 - July 2011) par Imperva
Web Application Attack Report (Edition #1 - July 2011)Web Application Attack Report (Edition #1 - July 2011)
Web Application Attack Report (Edition #1 - July 2011)
Imperva1.3K vues
Beyond takeover: stories from a hacked account par Imperva
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
Imperva1.7K vues
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities par Imperva
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Imperva1.8K vues
Top Five Security Must-Haves for Office 365 par Imperva
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
Imperva2.6K vues
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a... par Shah Sheikh
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh2.5K vues
Detect and Respond to Threats Better with IBM Security App Exchange Partners par IBM Security
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security956 vues
State of the Internet: Mirai, IOT and History of Botnets par Rahul Neel Mani
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
Rahul Neel Mani767 vues
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber... par centralohioissa
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa858 vues
Network Security Trends for 2016: Taking Security to the Next Level par Skybox Security
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
Skybox Security2.7K vues

Similaire à The State of Application Security: Hackers On Steroids

An Inside Look at a Sophisticated Multi-Vector DDoS Attack par
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
737 vues40 diapositives
Top Cyber Security Trends for 2016 par
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
20K vues42 diapositives
2022 APIsecure_A day in the life of an API; Fighting the odds par
2022 APIsecure_A day in the life of an API; Fighting the odds2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_A day in the life of an API; Fighting the oddsAPIsecure_ Official
63 vues24 diapositives
April 2015 Webinar: Cyber Hunting with Sqrrl par
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlSqrrl
576 vues37 diapositives
State of the Phish Webinar 2015 par
State of the Phish Webinar 2015State of the Phish Webinar 2015
State of the Phish Webinar 2015ThreatSim
525 vues18 diapositives
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015) par
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
2.1K vues34 diapositives

Similaire à The State of Application Security: Hackers On Steroids(20)

An Inside Look at a Sophisticated Multi-Vector DDoS Attack par Imperva Incapsula
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Top Cyber Security Trends for 2016 par Imperva
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva20K vues
2022 APIsecure_A day in the life of an API; Fighting the odds par APIsecure_ Official
2022 APIsecure_A day in the life of an API; Fighting the odds2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_A day in the life of an API; Fighting the odds
April 2015 Webinar: Cyber Hunting with Sqrrl par Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
Sqrrl576 vues
State of the Phish Webinar 2015 par ThreatSim
State of the Phish Webinar 2015State of the Phish Webinar 2015
State of the Phish Webinar 2015
ThreatSim525 vues
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015) par Jeremiah Grossman
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Jeremiah Grossman2.1K vues
Deconstructing website attacks - Eric Vanderburg par Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg492 vues
The Art and Science of Alert Triage par Sqrrl
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
Sqrrl1.2K vues
Webinar: Cloud-Based Web Security as First/Last Line of Defense par Cyren, Inc
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Cyren, Inc449 vues
WinOps Conf 2015 - John Rakowski - Militarise It for #DevOps success par WinOps Conf
WinOps Conf 2015 - John Rakowski - Militarise It for #DevOps successWinOps Conf 2015 - John Rakowski - Militarise It for #DevOps success
WinOps Conf 2015 - John Rakowski - Militarise It for #DevOps success
WinOps Conf540 vues
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook par Cyren, Inc
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Cyren, Inc863 vues
Black Duck & IBM Present: Application Security in the Age of Open Source par Black Duck by Synopsys
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
Security Alert - Expert Uncovers the "Dirty Little Secret" of IBM i Security par HelpSystems
Security Alert - Expert Uncovers the "Dirty Little Secret" of IBM i SecuritySecurity Alert - Expert Uncovers the "Dirty Little Secret" of IBM i Security
Security Alert - Expert Uncovers the "Dirty Little Secret" of IBM i Security
HelpSystems283 vues
Webinar: CYREN WebSecurity for Healthcare par Cyren, Inc
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
Cyren, Inc598 vues
Building a Next-Generation Security Operations Center (SOC) par Sqrrl
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl5.1K vues
Structuring and Scaling an Application Security Program par Denim Group
Structuring and Scaling an Application Security ProgramStructuring and Scaling an Application Security Program
Structuring and Scaling an Application Security Program
Denim Group1.5K vues
15 Years of Web Security: The Rebellious Teenage Years par Jeremiah Grossman
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman2.6K vues
Experian and 41st Parameter - 2015 CNP Expo Session par Experian
Experian and 41st Parameter - 2015 CNP Expo SessionExperian and 41st Parameter - 2015 CNP Expo Session
Experian and 41st Parameter - 2015 CNP Expo Session
Experian1.8K vues
Leveraging Compliance to “Help” Prevent a Future Breach par Kevin Murphy
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
Kevin Murphy52 vues

Plus de Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey par
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
10.2K vues15 diapositives
API Security Survey par
API Security SurveyAPI Security Survey
API Security SurveyImperva
7.4K vues14 diapositives
Imperva ppt par
Imperva pptImperva ppt
Imperva pptImperva
4K vues9 diapositives
Research: From zero to phishing in 60 seconds par
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
2K vues26 diapositives
Making Sense of Web Attacks: From Alerts to Narratives par
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
1.7K vues23 diapositives
How We Blocked a 650Gb DDoS Attack Over Lunch par
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
5.7K vues17 diapositives

Plus de Imperva(20)

Cybersecurity and Healthcare - HIMSS 2018 Survey par Imperva
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
Imperva10.2K vues
API Security Survey par Imperva
API Security SurveyAPI Security Survey
API Security Survey
Imperva7.4K vues
Imperva ppt par Imperva
Imperva pptImperva ppt
Imperva ppt
Imperva4K vues
Research: From zero to phishing in 60 seconds par Imperva
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
Imperva2K vues
Making Sense of Web Attacks: From Alerts to Narratives par Imperva
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
Imperva1.7K vues
How We Blocked a 650Gb DDoS Attack Over Lunch par Imperva
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
Imperva5.7K vues
Survey: Insider Threats and Cyber Security par Imperva
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
Imperva1.5K vues
Companies Aware, but Not Prepared for GDPR par Imperva
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
Imperva3.1K vues
Rise of Ransomware par Imperva
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
Imperva1.5K vues
7 Tips to Protect Your Data from Contractors and Privileged Vendors par Imperva
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
Imperva1.1K vues
SEO Botnet Sophistication par Imperva
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
Imperva1K vues
Phishing Made Easy par Imperva
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
Imperva1.2K vues
Imperva 2017 Cyber Threat Defense Report par Imperva
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
Imperva705 vues
Combat Payment Card Attacks with WAF and Threat Intelligence par Imperva
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
Imperva915 vues
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially par Imperva
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Imperva373 vues
Get Going With Your GDPR Plan par Imperva
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
Imperva476 vues
Cyber Criminal's Path To Your Data par Imperva
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
Imperva464 vues
Combat Today's Threats With A Single Platform For App and Data Security par Imperva
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
Imperva514 vues
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation par Imperva
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Imperva2.5K vues
Gartner MQ for Web App Firewall Webinar par Imperva
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva2.6K vues

Dernier

Advanced_Recommendation_Systems_Presentation.pptx par
Advanced_Recommendation_Systems_Presentation.pptxAdvanced_Recommendation_Systems_Presentation.pptx
Advanced_Recommendation_Systems_Presentation.pptxneeharikasingh29
5 vues9 diapositives
VoxelNet par
VoxelNetVoxelNet
VoxelNettaeseon ryu
7 vues21 diapositives
Survey on Factuality in LLM's.pptx par
Survey on Factuality in LLM's.pptxSurvey on Factuality in LLM's.pptx
Survey on Factuality in LLM's.pptxNeethaSherra1
6 vues9 diapositives
Data about the sector workshop par
Data about the sector workshopData about the sector workshop
Data about the sector workshopinfo828217
12 vues27 diapositives
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docx par
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxRIO GRANDE SUPPLY COMPANY INC, JAYSON.docx
RIO GRANDE SUPPLY COMPANY INC, JAYSON.docxJaysonGarabilesEspej
6 vues3 diapositives
3196 The Case of The East River par
3196 The Case of The East River3196 The Case of The East River
3196 The Case of The East RiverErickANDRADE90
16 vues4 diapositives

Dernier(20)

Advanced_Recommendation_Systems_Presentation.pptx par neeharikasingh29
Advanced_Recommendation_Systems_Presentation.pptxAdvanced_Recommendation_Systems_Presentation.pptx
Advanced_Recommendation_Systems_Presentation.pptx
Data about the sector workshop par info828217
Data about the sector workshopData about the sector workshop
Data about the sector workshop
info82821712 vues
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation par DataScienceConferenc1
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
SUPER STORE SQL PROJECT.pptx par khan888620
SUPER STORE SQL PROJECT.pptxSUPER STORE SQL PROJECT.pptx
SUPER STORE SQL PROJECT.pptx
khan88862012 vues
Short Story Assignment by Kelly Nguyen par kellynguyen01
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyen
kellynguyen0119 vues
Data Journeys Hard Talk workshop final.pptx par info828217
Data Journeys Hard Talk workshop final.pptxData Journeys Hard Talk workshop final.pptx
Data Journeys Hard Talk workshop final.pptx
info82821710 vues
CRM stick or twist.pptx par info828217
CRM stick or twist.pptxCRM stick or twist.pptx
CRM stick or twist.pptx
info82821710 vues
Chapter 3b- Process Communication (1) (1)(1) (1).pptx par ayeshabaig2004
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptx
UNEP FI CRS Climate Risk Results.pptx par pekka28
UNEP FI CRS Climate Risk Results.pptxUNEP FI CRS Climate Risk Results.pptx
UNEP FI CRS Climate Risk Results.pptx
pekka2811 vues
CRIJ4385_Death Penalty_F23.pptx par yvettemm100
CRIJ4385_Death Penalty_F23.pptxCRIJ4385_Death Penalty_F23.pptx
CRIJ4385_Death Penalty_F23.pptx
yvettemm1006 vues
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M... par DataScienceConferenc1
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
Organic Shopping in Google Analytics 4.pdf par GA4 Tutorials
Organic Shopping in Google Analytics 4.pdfOrganic Shopping in Google Analytics 4.pdf
Organic Shopping in Google Analytics 4.pdf
GA4 Tutorials14 vues

The State of Application Security: Hackers On Steroids

  • 1. © 2015 Imperva, Inc. All rights reserved. The State of Application Security: Hackers On Steroids Itsik Mantin, Director of Security Research, Imperva
  • 2. © 2015 Imperva, Inc. All rights reserved. “Study the past if you would define the future” (Confucius)
  • 3. © 2015 Imperva, Inc. All rights reserved. Speaker • Director of Security Research at Imperva • 15 years experience in the security industry • An inventor of 15 patents in these fields • Holds an M.Sc. in Applied Math and Computer Science • Presenter in Blackhat Asia, OWASP IL, EuroCrypt and other conferences Itsik Mantin 3
  • 4. © 2015 Imperva, Inc. All rights reserved. Making the Report 4
  • 7. Attack Incidents Attack Type Min Ratio #Alert/5min SQLi 20 HTTP 10 XSS 5 DT 5 Spam 1 RCE 1 FU 1 Incident Collection of alerts Same attack type Same target Essentially same time Not necessarily same IP Incident Alert RatioIncident Alert Ratio 7
  • 8. © 2015 Imperva, Inc. All rights reserved. Attack Trends 1 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Chance of Getting Attacked 9
  • 10. © 2015 Imperva, Inc. All rights reserved. Chance of Getting Attacked Everyone’s at risk 3/4 apps attacked for every attack type 10
  • 11. © 2015 Imperva, Inc. All rights reserved. Chance of Getting Attacked “Perfect” RCE Coverage All applications were attacked 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents 12
  • 13. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents 75th Percentile Median 25th percentile 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents RCE and Spam are the most popular RCE: Median of 273 14
  • 15. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents Inequality Measure Ratio between 3rd and 2nd quartiles 15
  • 16. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents Inequality Measure Ratio between 3rd and 2nd quartiles RCE Blind Scans All applications suffer equally 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Number of Attack Incidents Spam is discriminatory Spoiler – some industries suffer more 17
  • 18. © 2015 Imperva, Inc. All rights reserved. SQL Injection and Cross-Site Scripting 18
  • 19. © 2015 Imperva, Inc. All rights reserved. SQL Injection and Cross-Site Scripting Most Applications see SQLi and XSS every other week Median of 12-13 for 6-month period 3-5 days for topQ applications 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Up-Trends #Incidents 20
  • 21. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Up-Trends SQLi Persistent Growth 100% increase in 2014 200% increase in 2015 #Incidents XSS Persistent Growth 100% increase in 2014 150% increase in 2015 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Up-Trends #Incidents 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Up-Trends 23
  • 24. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Up-Trends 24
  • 25. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Down-Trends #Incidents 25
  • 26. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Down-Trends #Incidents RFI was on fire in 2014 Super-popular attack vector in 2014 Back to “normal” in 2015 26
  • 27. © 2015 Imperva, Inc. All rights reserved. Year-over-Year Down-Trends #Incidents DT Decrease 2014 trend changed Spoiler – in one industry DT is still the attack of choice 27
  • 28. © 2015 Imperva, Inc. All rights reserved. Magnitude of Attacks 28
  • 29. © 2015 Imperva, Inc. All rights reserved. Magnitude of Attacks SQLi Attacks are most Intensive 72-204 alerts for quartile 3 (of the incidents) 300K alerts in most intensive attack 29
  • 30. © 2015 Imperva, Inc. All rights reserved. Reputation 2 30
  • 33. Reputation Serial Attackers – 70% Anonymous Browsing – 8% 33
  • 34. © 2015 Imperva, Inc. All rights reserved. Serial Attackers Vs. Anonymous Browsing 34
  • 35. © 2015 Imperva, Inc. All rights reserved. Serial Attackers Vs. Anonymous Browsing 35
  • 36. © 2015 Imperva, Inc. All rights reserved. Serial Attackers Vs. Anonymous Browsing 140,000 anonymous browsing 1,800,000 detect-by-content 12,500,000 serial attackers 1,700,000 anonymous browsing 280,000 detect-by-content 28,000 serial attackers 36
  • 37. © 2015 Imperva, Inc. All rights reserved. Industry Trends 3 37
  • 38. © 2015 Imperva, Inc. All rights reserved. Per-Industry Trends Health Food Travel Leisure Shopping Business Financial Computer DT FU HTTP RFI SQLi XSSSpamRCE 38
  • 39. © 2015 Imperva, Inc. All rights reserved. Per-Industry Trends Health Food Travel Leisure Shopping Business Financial Computer DT FU HTTP RFI SQLi XSSSpamRCE Massive Spam/RCE Campaigns 39
  • 40. © 2015 Imperva, Inc. All rights reserved. Per-Industry Trends Health Food Travel Leisure Shopping Business Financial Computer DT FU HTTP RFI SQLi XSSSpamRCE RCE blind scans Massive Spam/RCE Campaigns 40
  • 41. © 2015 Imperva, Inc. All rights reserved. Per-Industry Trends Health Food Travel Leisure Shopping Business Financial Computer DT FU HTTP RFI SQLi XSSSpamRCE RCE blind scans Spam focused on travel applications Massive Spam/RCE Campaigns 41
  • 42. © 2015 Imperva, Inc. All rights reserved. Attack Types 42
  • 43. © 2015 Imperva, Inc. All rights reserved. Attack Types 43
  • 44. © 2015 Imperva, Inc. All rights reserved. Attack Types 57% XSS incidents on Health 44
  • 45. © 2015 Imperva, Inc. All rights reserved. Attack Types 37% DT incidents on Food 45
  • 46. © 2015 Imperva, Inc. All rights reserved. Web Framework Trends 4 46
  • 47. © 2015 Imperva, Inc. All rights reserved. Content Management Systems 47
  • 48. © 2015 Imperva, Inc. All rights reserved. CMS Trends All CMS Non CMS Applications 48
  • 49. © 2015 Imperva, Inc. All rights reserved. CMS Trends All CMS Non CMS Applications CMS At Risk CMS applications are attacked 3 Times more often Trend consistent for all attack types 49
  • 50. © 2015 Imperva, Inc. All rights reserved. WordPress Trends Other CMS Non CMS WordPress 50
  • 51. © 2015 Imperva, Inc. All rights reserved. WordPress Trends Other CMS Non CMS WordPress WordPress at More Risk 3.5 times more attacks than non-CMS Applications 7 times more RFI and Spam Attacks 51
  • 52. © 2015 Imperva, Inc. All rights reserved. WordPress Trends Other CMS Non CMS WordPress WordPress at More Risk 3.5 times more attacks than non-CMS Applications 7 times more RFI and Spam Attacks WordPress at More Risk 3.5 times more attacks than non-CMS Applications 7 times more RFI and Spam Attacks 52
  • 53. © 2015 Imperva, Inc. All rights reserved. Geographic Trends 53
  • 54. © 2015 Imperva, Inc. All rights reserved. Geographic Attack Trends Country Absolute #Requests Internet Users US 17,671,816 278,553,524 China 8,227,498 672,585,110 UK 2,224,749 59,097,955 54
  • 55. © 2015 Imperva, Inc. All rights reserved. Geographic Attack – Year-over-Year 55
  • 56. © 2015 Imperva, Inc. All rights reserved. Case Studies 6 56
  • 57. © 2015 Imperva, Inc. All rights reserved. Shellshock Mega-Trend 57
  • 58. © 2015 Imperva, Inc. All rights reserved. Shellshock Mega-Trend 75,000 incidents 189 applications 26,000 incidents 137 applications 23,000 incidents 174 applications 57,500 incidents 193 applications 58
  • 59. © 2015 Imperva, Inc. All rights reserved. SQLi Cases Study 59
  • 60. © 2015 Imperva, Inc. All rights reserved. SQLi Cases Study 6,800 alerts per hour 60
  • 61. © 2015 Imperva, Inc. All rights reserved. Scraping Case Study • TOR Massive Scraping attack • 2 million requests • 777 TOR Ips • User-Agent faking 61
  • 62. © 2015 Imperva, Inc. All rights reserved. Scraping Case Study 62
  • 63. © 2015 Imperva, Inc. All rights reserved. Scraping Case Study 63
  • 64. © 2015 Imperva, Inc. All rights reserved. Conclusions 64
  • 65. © 2015 Imperva, Inc. All rights reserved. Recommendations 65
  • 66. © 2015 Imperva, Inc. All rights reserved. Q&A 7 66
  • 67. © 2015 Imperva, Inc. All rights reserved. Download 2015 Web Application Attack Report 67 http://www.imperva.com/DefenseCenter/WAAR

Notes de l'éditeur

  1. Motivation Target audience Tradition
  2. 198 WAF customers 103,455,308 security events The team - ADC led by CTO Next slide - The alerts were gathered with …
  3. Positive Negative vs. Positive security model Crowd sourcing Distinction – content vs. reputation Next slide – this distinction
  4. Focus on attack types Reputation-based detection vs. Content-based detection
  5. Incident – collection of requests which seem to belong to the same attack The IP dilemma
  6. # of attacks within the report period
  7. Most prominent - Everyone’s at risk For every attack type (RCE), at least 3/4 applications (100%) were attacked If you expose your application to the Internet – you will get attacked
  8. If you expose your application to the Internet – you will get attacked Next slide - How many attacks…..
  9. Explain the diagram Explain the quartiles notion
  10. Explain the diagram Explain the quartiles notion
  11. RCE – 273-591 for the Q3 (Shellshock) Spam: 24-276 attacks on Q3 Notice the difference between RCE and Spam
  12. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  13. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  14. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  15. Explain the diagram – attacks during 6 months Next slide – year over year
  16. Explain the diagram – attacks during 6 months Next slide – year over year
  17. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  18. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  19. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  20. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  21. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  22. Next slide – from number of attacks to the intern of attacks - magnitude
  23. Next slide – from number of attacks to the intern of attacks - magnitude
  24. Next slide – from number of attacks to the intern of attacks - magnitude
  25. Attacks mounted by scanners Typical SQLi attack includes more than 70 requests, usually arriving in bursts over a short period The most intensive SQLi attack spanned 300,000 malicious requests
  26. Attacks mounted by scanners Typical SQLi attack includes more than 70 requests, usually arriving in bursts over a short period The most intensive SQLi attack spanned 300,000 malicious requests
  27. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  28. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  29. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  30. Zoom into the data X/Y-axis. Limit 2M Different points in time different mitigations are more effective
  31. Zoom into the data X/Y-axis. Limit 2M Different points in time different mitigations are more effective
  32. Insights on the different industries => show the percent of incidents for each attack type The dominance of RCE and Spam => zoom in
  33. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  34. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  35. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  36. 3 groups WordPress is popular
  37. Normalized the absolute # requests by the internet users published by the world bank The bigger the bubble the traffic is more malicious
  38. Netherlands and USA in the top five second 2 year in a row Cyprus, Costa Rica, Switzerland were dominant last year and are not dominant anymore.
  39. One of the most significant security event Zoom into the Shellshock incidents Week-by-week analysis Remind you – 2015 period while Shellshock was published during September 2014 2 waves: the first is during September 2014, right after the publication – not in the report The second is during weeks 14-19 – April 2015 Seven month after the publication, attackers hit again
  40. One of the most significant security event Zoom into the Shellshock incidents Week-by-week analysis Remind you – 2015 period while Shellshock was published during September 2014 2 waves: the first is during September 2014, right after the publication – not in the report The second is during weeks 14-19 – April 2015 Seven month after the publication, attackers hit again
  41. Focus on one application that was highly attacked. The attack lasted 4 days with high SQLi activity. 6,800 Alerts per hour, The attacks had similar patterns Blocked by content and by reputation, negative security model, signatures, policies 2 waves – the first one faded away on the third day and a new wave on the 4th day We believe that the first wave faded away due to our blocking mechanisms and the second wave was used with a new pool of Ips to try to avoid blocking
  42. Focus on one application that was highly attacked. The attack lasted 4 days with high SQLi activity. 6,800 Alerts per hour, The attacks had similar patterns Blocked by content and by reputation, negative security model, signatures, policies 2 waves – the first one faded away on the third day and a new wave on the 4th day We believe that the first wave faded away due to our blocking mechanisms and the second wave was used with a new pool of Ips to try to avoid blocking
  43. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  44. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  45. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  46. 3 out of 4 applications are attacked Crowd sourcing is effective – 4 out of 5 Shellshock mega-trend influenced cyberspace Y2Y increase
  47. Mega trend vulnerabilities spread like wildfire: keep updated with new vulnerabilities mitigations Be part of a community defense: it prevents attacks and saves CPU