SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
Abuse in the Globally Distributed Economy
                                Shyam Mittur
                               June 26, 2012
Welcome to the Global Economy – how
to create new jobs




                  2              6/23/12
Welcome to the Global Economy –
let’s go crack Y! accounts




                  3               6/23/12
Outline
    History – What is abuse and how did we deal with it?
    Evolution of abuse
    Keeping up with abuse – our strategy and tools
    Continuing challenges




                                     4
What is Abuse?
Abuse is – “Something you’re allowed to do, but in a way that is
not allowed”
  Service abuse: primarily overuse
  ›    Mass registration
  ›    Account and credentials compromise attempts
  Content abuse: undesirable user-generated content
  ›    Spam: “go to stockmarketvideo.com it 5o bucks a month i subscribe there the guy is
       good ., stop doin wat ur doin”
  ›    Offensive posts: “****WHY IS YOUR SXXX WXXX CXXX MOTHER CXXXXXX
       OVER MY HOUSE TONIGHT?****”
  ›    Solicitations: “!!!!!!`"[Seek¯ing¯R¯ich .C¯0M]],(remove'¯'),,,,,,,,where to find educated
       men! where to find women with inner and outer beauty....”
  ›    Offensive images




                                                 6
The view from the inside
  High-rate abuse is still present
  Content abuse is everywhere
  ›    Commercial spam: solicitations, stock scams, etc.
  ›    Off-topic postings: politics, bigotry, baiting, harassment
  ›    Image abuse: porn sites, webcams, URLs
  Account compromise is up
  ›    Every merchant wants you to register
  ›    Many have poor back-end infrastructure, user databases are compromised and sold
  ›    Users use the same id/pw/questions in many locations
  ›    Baffled family and friends: “I got this e-mail from you … ”
  ›    Leads to: “Help, my account has been hacked!”




                                                7
Example – registration attempts
  5-25% of attempts in one colo were deemed abusive and denied




                                 8
Junk Account Registrations
  Over 50% of successful registrations are suspected to be abusive




   Black: Total Registrations
   Yellow: Suspected abusive registrations
   Blue: Likely good registrations

                                              9
Login attempts
  20-40% of the attempts in one colo were deemed abusive and denied




                                 10
Service Requests
  12-20% of all service requests were denied




                                  11
CAPTCHA Challenges
  50% of CAPTCHAs are not attempted
  40% of those attempted are successful




                                  12
How we deal with Abuse
Prevention and Mitigation
 Overuse-detection and service-denial at the edge
 ›  Common base rules and conservative limits everywhere
 ›  Additional custom rules and aggressive limits in select locations
    (high activity and/or high risk)
 Liberal registration (sign-up)
 ›    Biased in favor of quick and easy sign-up for new users
 Widespread use of CAPTCHA
 Aggressive action on detected abusive activity
 ›  Wide range of sophistication in detection techniques and strategies
 ›  Blacklists and regular expressions to machine learning approaches


                                    14
Platform Tools and Solutions
 Rate limiting and filtering
 ›    YDoD
 Challenge/response validation
 ›    CAPTCHA service
 Content classification
 ›    Anti-spam (Mail, Messenger), Standard Moderation
      Platform (other contexts)
 ›    URL database and services
 Account action
 ›    Warn, Rehab, Suspend, Trap, Delete

                              15
YDoD – A self-aggregating blacklist
manager and rate limiter




                    16
YDoD works with “filters”
  A filter describes the criteria for identifying abuse
     ›    Preconditions and descriptions of the information to be used for tracking abuse
          (what kind of activity am I interested in watching and/or blocking?)
     ›    Limits and descriptions of the table used to track abuse
          (how much of that am I willing to take?)
     ›    Response (what do I do when I’ve had enough?)
    Like a set of configuration files in a custom language
    Filters are installed on client hosts and central “clusterhosts”
    The clusterhost cares about the limits
    The client cares about the preconditions and responses
     ›    On “overlimit” condition, a configurable set of responses (actions) are invoked




                                                 17
What a YDoD table looks like




                   18
CAPTCHA over the years
                 2001


        February 2004


        February 2008


            April 2008


       September 2010




                         19
Content Abuse
  Standard Moderation Platform
 ›    A framework for classification and moderation of user-generated content
  Web service interface, provides a synchronous judgment
 ›    Uses a configured stack of classifiers
      •  Blacklists
      •  Regular expressions
      •  Obscenity word lists (with variants)
      •  Image analysis
      •  Signature/hash matching
      •  Machine learning algorithm implementations

  Abusive or “suspect” content can be forwarded to human moderation
   (generally asynchronous)



                                                20
The Evolution of Abuse
Data Entry Job?




                  22
Another “Data Entry Job” recruiter




                    23               6/23/12
A few “record holders” here




                   24         6/23/12
When $0.75/day solving CAPTCHAs is
the alternative




                  25             6/23/12
Need a few Yahoo! accounts?
  This one seems to be out of business, there are many such providers




                                  26
Rent-a-botnet
  http://www.zdnet.com/blog/security/study-finds-the-average-price-for-renting-a-botnet/6528




                                                 27
From hacking/fun/malice to business/profit
  There is money to be made
   ›  Jan 30, 2012: “It is estimated that financial institutions have lost $15 billion in the past five
      years” – NPR All Things Considered1
   ›  Sept 14, 2011: “The FBI is currently investigating over 400 reported cases of corporate
      account takeovers in which cyber criminals have initiated unauthorized ACH and wire
      transfers from the bank accounts of U.S. businesses. These cases involve the attempted
      theft of over $255 million and have resulted in the actual loss of approximately $85
      million.”2
  Globalization
   ›     Specialized services that source knowledge and manpower from low-cost locations
   ›     Examples: Registration, CAPTCHA solving, Spam pushing
  Botnets, malware and data breaches
   ›     Botnets are available for rental by-the-hour or for entire campaigns
   ›     Malware propagation, key logging, identity theft, account compromise/takeover
  “Multi-level marketing” at its best!
 1.     Original source unknown
 2.     http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector



                                                                                           28
A global market and ecosystem




                  29            6/23/12
Kolotibablo.com: A “full-service” offering
  Registration, CAPTCHA-solving, spam campaigns




                                30
Funny – they use CAPTCHA, too!
  Not very good either




                          31
Xrumer – another full-service solution
  ‘The system of “Antispam” – correct spam’




                                  32
decaptcher.net – a CAPTCHA solving
service (busted?)
 Hi. I need to crack captcha. Do you provide a captcha decoders? DeCaptcher CAPTCHA solving is processed by humans.
 So the accuracy is much better than an automated captcha solver ones

 Hi guys. Can you make an advert program for me for *****.com? Contact us and we'll discuss it.

 Can I solve captchas in many threads? Yes, you can. CAPTCHA solving can be parallelized.
 Just make sure in every thread you do like follows:
 login
 solve as many captchas as you need
 logout.




                                                                     33
More on this at …
  “The Commercial Malware Industry”
   by Peter Gutman, University of Auckland
  “Krebs on Security” blog by Brian Krebs
  Stefan Savage and his team’s work at UC San Diego




                                 34                    6/23/12
Evolution of our strategy and tools
Going forward: a two-pronged strategy
  General approach: more detection and mitigation at the edge
  Classification of every request
  ›    Good – service, abusive – deny, not sure – service or challenge
  ›    Algorithmic approaches, beyond just counting
  Presentation of graded challenges
  ›    Simple CAPTCHAs still work well in many situations
  ›    In-line and out-of-band
  ›    All kinds of other ideas, too
  Special handling of account compromise
  ›    More notification (mostly opt-in, some not)
  ›    The account is placed in a trap state
  ›    Challenge/verify at next opportunity


                                               36
Project Blackbird: a new framework
  Why we need this
  ›    Operating at a much higher scale (of requests, deployments, services)
  ›    Up against highly capable adversaries
  ›    Who they are and where they are coming from are not meaningful or relevant
  ›    What they do is what matters
  ›    Tight performance budget for synchronous detection
  ›    Quick reaction time for deployment and customization
  Approach
  ›  Plug-in deployment of blacklists, exemptions, classifiers
  ›  Encapsulation of detection techniques as classifiers
  ›  Abstraction of classifiers as algorithm (code) + model (data)
  ›  Support for automatic data sampling, retraining, model building and updates
  ›  Central control of the framework (development and deployment)
  ›  Distributed ownership of classifiers (development, deployment and customization)




                                               37
Blackbird design: front-end




                    38
Blackbird design: support infrastructure




                    39
CAPTCHA: not just those squiggly characters
  We generalized and abstracted the CAPTCHA framework
  Changed integration and delivery to a service model
 ›    Create challenge (the “test”)
 ›    Present challenge
 ›    Validate response
  Made the challenge techniques configurable and
   selectable
 ›    Several graphical presentations
 ›    Non-graphical challenges
 ›    Out-of-band challenges: Voice, SMS, E-mail, Postcard (yes)
 ›    Difficulty levels


                                        40
New visual variants

  Overlap Text



  Background Clutter



  Floating Screen: Demo




                           41
New CAPTCHA Challenges

  3D-Wave: Demo



  OverlapTextWave: Demo



  DelayedAnimation: Demo




                            42
Telephone Voice/SMS Challenge
  Generate a phone call or text message
 ›    With a one-time numeric code

  Why this is effective:
 ›    We check on phone numbers and exclude those available in bulk for abuse
 ›    We can watch for overuse




                                             43
Continuing challenges
  New user acquisition
  ›    Ease of sign-up vs. challenge/validation friction
  Anonymity vs. verifiable personal data
  ›    Users have “learned” to not provide real information
  Use of activity data, building and using reputation
  ›    “I can’t believe you track this!”
  Abuse/compromise mitigation in “free” vs. “at-risk” environments
   (e.g., banks)
  Account/credentials compromise
  ›    Id/password overloading
  ›    Mobile devices and apps
  ›    Reverting to risky behavior


                                               44
Shyam Mittur
Yahoo! Abuse Engineering

Weitere ähnliche Inhalte

Andere mochten auch

Domain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf NoktalarıDomain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf Noktalarıdomain OM
 
Yönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonYönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonCRM Institute
 
Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016fpasoneja
 
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Leonardo Duran
 
Características técnicas carpas mastertent
Características técnicas carpas mastertentCaracterísticas técnicas carpas mastertent
Características técnicas carpas mastertentMastertent
 
Gardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestGardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestFujita64g
 
Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1ApeironEstudios
 
Implemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamImplemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamWalter Mareovich
 

Andere mochten auch (16)

Kund 2.0
Kund 2.0Kund 2.0
Kund 2.0
 
Domain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf NoktalarıDomain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf Noktaları
 
Yönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonYönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - Segmentasyon
 
¿Te apuntas al #evento facua
¿Te apuntas al #evento facua¿Te apuntas al #evento facua
¿Te apuntas al #evento facua
 
March Event
March EventMarch Event
March Event
 
Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016
 
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
 
Plano instalacion elect
Plano instalacion electPlano instalacion elect
Plano instalacion elect
 
Características técnicas carpas mastertent
Características técnicas carpas mastertentCaracterísticas técnicas carpas mastertent
Características técnicas carpas mastertent
 
Jazz RicardoFalendys
Jazz RicardoFalendysJazz RicardoFalendys
Jazz RicardoFalendys
 
Gardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestGardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific Northwest
 
Monografia
Monografia Monografia
Monografia
 
Ppt ch09 marien_4_e-205398
Ppt ch09 marien_4_e-205398Ppt ch09 marien_4_e-205398
Ppt ch09 marien_4_e-205398
 
Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1
 
Implemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamImplemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wam
 
Sintesis renata
Sintesis renataSintesis renata
Sintesis renata
 

Ähnlich wie Abuse in the Globally Distributed Economy: Evolution and Strategies

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Societyrhoddavies1
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...Eoin Keary
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditingNatalino Busa
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Francesca Lazzeri, PhD
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through AnalyticsSrinath Perera
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the RyeImperva
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & InnovationDavid Koosis
 
Defending Netflix from Abuse
Defending Netflix from AbuseDefending Netflix from Abuse
Defending Netflix from AbuseJason Chan
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger LandscapeTim Swanson
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoAlpha Momentum Indonesia
 
CFO Half-Day Conference
CFO Half-Day ConferenceCFO Half-Day Conference
CFO Half-Day Conferencegppcpa
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNeo4j
 
Defeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionDefeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionThoughtworks
 
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyPayment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyThe Partnership For Safe Medicines
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingFrosmo
 

Ähnlich wie Abuse in the Globally Distributed Economy: Evolution and Strategies (20)

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Society
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through Analytics
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & Innovation
 
Defending Netflix from Abuse
Defending Netflix from AbuseDefending Netflix from Abuse
Defending Netflix from Abuse
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger Landscape
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
 
CFO Half-Day Conference
CFO Half-Day ConferenceCFO Half-Day Conference
CFO Half-Day Conference
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
Defeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionDefeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in action
 
AI_finance_Module-3.pptx
AI_finance_Module-3.pptxAI_finance_Module-3.pptx
AI_finance_Module-3.pptx
 
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyPayment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online betting
 

Mehr von Justin Dorfman

Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Justin Dorfman
 
Wisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationWisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationJustin Dorfman
 
Solving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationSolving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationJustin Dorfman
 
Preview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationPreview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationJustin Dorfman
 
Predicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationPredicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationJustin Dorfman
 
One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...Justin Dorfman
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Justin Dorfman
 
Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Justin Dorfman
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insightsJustin Dorfman
 
A new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationA new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationJustin Dorfman
 
Understanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationUnderstanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationJustin Dorfman
 
Michelin starred cooking with chef presentation
Michelin starred cooking with chef presentationMichelin starred cooking with chef presentation
Michelin starred cooking with chef presentationJustin Dorfman
 
Benchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersBenchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersJustin Dorfman
 
Stability patterns presentation
Stability patterns presentationStability patterns presentation
Stability patterns presentationJustin Dorfman
 
A web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationA web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationJustin Dorfman
 
WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11Justin Dorfman
 

Mehr von Justin Dorfman (16)

Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014
 
Wisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationWisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentation
 
Solving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationSolving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentation
 
Preview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationPreview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentation
 
Predicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationPredicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentation
 
One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1
 
Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insights
 
A new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationA new era at GoDaddy.com presentation
A new era at GoDaddy.com presentation
 
Understanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationUnderstanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentation
 
Michelin starred cooking with chef presentation
Michelin starred cooking with chef presentationMichelin starred cooking with chef presentation
Michelin starred cooking with chef presentation
 
Benchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersBenchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbers
 
Stability patterns presentation
Stability patterns presentationStability patterns presentation
Stability patterns presentation
 
A web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationA web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentation
 
WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11
 

Kürzlich hochgeladen

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Kürzlich hochgeladen (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Abuse in the Globally Distributed Economy: Evolution and Strategies

  • 1. Abuse in the Globally Distributed Economy Shyam Mittur June 26, 2012
  • 2. Welcome to the Global Economy – how to create new jobs 2 6/23/12
  • 3. Welcome to the Global Economy – let’s go crack Y! accounts 3 6/23/12
  • 4. Outline   History – What is abuse and how did we deal with it?   Evolution of abuse   Keeping up with abuse – our strategy and tools   Continuing challenges 4
  • 6. Abuse is – “Something you’re allowed to do, but in a way that is not allowed”   Service abuse: primarily overuse ›  Mass registration ›  Account and credentials compromise attempts   Content abuse: undesirable user-generated content ›  Spam: “go to stockmarketvideo.com it 5o bucks a month i subscribe there the guy is good ., stop doin wat ur doin” ›  Offensive posts: “****WHY IS YOUR SXXX WXXX CXXX MOTHER CXXXXXX OVER MY HOUSE TONIGHT?****” ›  Solicitations: “!!!!!!`"[Seek¯ing¯R¯ich .C¯0M]],(remove'¯'),,,,,,,,where to find educated men! where to find women with inner and outer beauty....” ›  Offensive images 6
  • 7. The view from the inside   High-rate abuse is still present   Content abuse is everywhere ›  Commercial spam: solicitations, stock scams, etc. ›  Off-topic postings: politics, bigotry, baiting, harassment ›  Image abuse: porn sites, webcams, URLs   Account compromise is up ›  Every merchant wants you to register ›  Many have poor back-end infrastructure, user databases are compromised and sold ›  Users use the same id/pw/questions in many locations ›  Baffled family and friends: “I got this e-mail from you … ” ›  Leads to: “Help, my account has been hacked!” 7
  • 8. Example – registration attempts   5-25% of attempts in one colo were deemed abusive and denied 8
  • 9. Junk Account Registrations   Over 50% of successful registrations are suspected to be abusive   Black: Total Registrations   Yellow: Suspected abusive registrations   Blue: Likely good registrations 9
  • 10. Login attempts   20-40% of the attempts in one colo were deemed abusive and denied 10
  • 11. Service Requests   12-20% of all service requests were denied 11
  • 12. CAPTCHA Challenges   50% of CAPTCHAs are not attempted   40% of those attempted are successful 12
  • 13. How we deal with Abuse
  • 14. Prevention and Mitigation  Overuse-detection and service-denial at the edge ›  Common base rules and conservative limits everywhere ›  Additional custom rules and aggressive limits in select locations (high activity and/or high risk)  Liberal registration (sign-up) ›  Biased in favor of quick and easy sign-up for new users  Widespread use of CAPTCHA  Aggressive action on detected abusive activity ›  Wide range of sophistication in detection techniques and strategies ›  Blacklists and regular expressions to machine learning approaches 14
  • 15. Platform Tools and Solutions  Rate limiting and filtering ›  YDoD  Challenge/response validation ›  CAPTCHA service  Content classification ›  Anti-spam (Mail, Messenger), Standard Moderation Platform (other contexts) ›  URL database and services  Account action ›  Warn, Rehab, Suspend, Trap, Delete 15
  • 16. YDoD – A self-aggregating blacklist manager and rate limiter 16
  • 17. YDoD works with “filters”   A filter describes the criteria for identifying abuse ›  Preconditions and descriptions of the information to be used for tracking abuse (what kind of activity am I interested in watching and/or blocking?) ›  Limits and descriptions of the table used to track abuse (how much of that am I willing to take?) ›  Response (what do I do when I’ve had enough?)   Like a set of configuration files in a custom language   Filters are installed on client hosts and central “clusterhosts”   The clusterhost cares about the limits   The client cares about the preconditions and responses ›  On “overlimit” condition, a configurable set of responses (actions) are invoked 17
  • 18. What a YDoD table looks like 18
  • 19. CAPTCHA over the years 2001 February 2004 February 2008 April 2008 September 2010 19
  • 20. Content Abuse   Standard Moderation Platform ›  A framework for classification and moderation of user-generated content   Web service interface, provides a synchronous judgment ›  Uses a configured stack of classifiers •  Blacklists •  Regular expressions •  Obscenity word lists (with variants) •  Image analysis •  Signature/hash matching •  Machine learning algorithm implementations   Abusive or “suspect” content can be forwarded to human moderation (generally asynchronous) 20
  • 23. Another “Data Entry Job” recruiter 23 6/23/12
  • 24. A few “record holders” here 24 6/23/12
  • 25. When $0.75/day solving CAPTCHAs is the alternative 25 6/23/12
  • 26. Need a few Yahoo! accounts?   This one seems to be out of business, there are many such providers 26
  • 28. From hacking/fun/malice to business/profit   There is money to be made ›  Jan 30, 2012: “It is estimated that financial institutions have lost $15 billion in the past five years” – NPR All Things Considered1 ›  Sept 14, 2011: “The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers from the bank accounts of U.S. businesses. These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million.”2   Globalization ›  Specialized services that source knowledge and manpower from low-cost locations ›  Examples: Registration, CAPTCHA solving, Spam pushing   Botnets, malware and data breaches ›  Botnets are available for rental by-the-hour or for entire campaigns ›  Malware propagation, key logging, identity theft, account compromise/takeover   “Multi-level marketing” at its best! 1.  Original source unknown 2.  http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector 28
  • 29. A global market and ecosystem 29 6/23/12
  • 30. Kolotibablo.com: A “full-service” offering   Registration, CAPTCHA-solving, spam campaigns 30
  • 31. Funny – they use CAPTCHA, too!   Not very good either 31
  • 32. Xrumer – another full-service solution   ‘The system of “Antispam” – correct spam’ 32
  • 33. decaptcher.net – a CAPTCHA solving service (busted?) Hi. I need to crack captcha. Do you provide a captcha decoders? DeCaptcher CAPTCHA solving is processed by humans. So the accuracy is much better than an automated captcha solver ones Hi guys. Can you make an advert program for me for *****.com? Contact us and we'll discuss it. Can I solve captchas in many threads? Yes, you can. CAPTCHA solving can be parallelized. Just make sure in every thread you do like follows: login solve as many captchas as you need logout. 33
  • 34. More on this at …   “The Commercial Malware Industry” by Peter Gutman, University of Auckland   “Krebs on Security” blog by Brian Krebs   Stefan Savage and his team’s work at UC San Diego 34 6/23/12
  • 35. Evolution of our strategy and tools
  • 36. Going forward: a two-pronged strategy   General approach: more detection and mitigation at the edge   Classification of every request ›  Good – service, abusive – deny, not sure – service or challenge ›  Algorithmic approaches, beyond just counting   Presentation of graded challenges ›  Simple CAPTCHAs still work well in many situations ›  In-line and out-of-band ›  All kinds of other ideas, too   Special handling of account compromise ›  More notification (mostly opt-in, some not) ›  The account is placed in a trap state ›  Challenge/verify at next opportunity 36
  • 37. Project Blackbird: a new framework   Why we need this ›  Operating at a much higher scale (of requests, deployments, services) ›  Up against highly capable adversaries ›  Who they are and where they are coming from are not meaningful or relevant ›  What they do is what matters ›  Tight performance budget for synchronous detection ›  Quick reaction time for deployment and customization   Approach ›  Plug-in deployment of blacklists, exemptions, classifiers ›  Encapsulation of detection techniques as classifiers ›  Abstraction of classifiers as algorithm (code) + model (data) ›  Support for automatic data sampling, retraining, model building and updates ›  Central control of the framework (development and deployment) ›  Distributed ownership of classifiers (development, deployment and customization) 37
  • 39. Blackbird design: support infrastructure 39
  • 40. CAPTCHA: not just those squiggly characters   We generalized and abstracted the CAPTCHA framework   Changed integration and delivery to a service model ›  Create challenge (the “test”) ›  Present challenge ›  Validate response   Made the challenge techniques configurable and selectable ›  Several graphical presentations ›  Non-graphical challenges ›  Out-of-band challenges: Voice, SMS, E-mail, Postcard (yes) ›  Difficulty levels 40
  • 41. New visual variants   Overlap Text   Background Clutter   Floating Screen: Demo 41
  • 42. New CAPTCHA Challenges   3D-Wave: Demo   OverlapTextWave: Demo   DelayedAnimation: Demo 42
  • 43. Telephone Voice/SMS Challenge   Generate a phone call or text message ›  With a one-time numeric code   Why this is effective: ›  We check on phone numbers and exclude those available in bulk for abuse ›  We can watch for overuse 43
  • 44. Continuing challenges   New user acquisition ›  Ease of sign-up vs. challenge/validation friction   Anonymity vs. verifiable personal data ›  Users have “learned” to not provide real information   Use of activity data, building and using reputation ›  “I can’t believe you track this!”   Abuse/compromise mitigation in “free” vs. “at-risk” environments (e.g., banks)   Account/credentials compromise ›  Id/password overloading ›  Mobile devices and apps ›  Reverting to risky behavior 44