The State of Application Security: Hackers On Steroids

Marketing Communications Manager um Imperva
18. Nov 2015
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
1 von 68

Más contenido relacionado

Was ist angesagt?

An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon

Was ist angesagt?(20)

Similar a The State of Application Security: Hackers On Steroids

An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
2022 APIsecure_A day in the life of an API; Fighting the odds2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_A day in the life of an API; Fighting the oddsAPIsecure_ Official
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlSqrrl
State of the Phish Webinar 2015State of the Phish Webinar 2015
State of the Phish Webinar 2015ThreatSim
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman

Similar a The State of Application Security: Hackers On Steroids(20)

Más de Imperva

Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
API Security SurveyAPI Security Survey
API Security SurveyImperva
Imperva pptImperva ppt
Imperva pptImperva
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva

Último

Quantum Karnaugh map in NV-center Quantum ComputerQuantum Karnaugh map in NV-center Quantum Computer
Quantum Karnaugh map in NV-center Quantum Computerssuserb645ae
2019-06-21 YC Preso V5.pdf2019-06-21 YC Preso V5.pdf
2019-06-21 YC Preso V5.pdfYue Cathy Chang
Introduction to Graph Databases.pdfIntroduction to Graph Databases.pdf
Introduction to Graph Databases.pdfNeo4j
Dunning - SIGMOD - Data Economy.pptxDunning - SIGMOD - Data Economy.pptx
Dunning - SIGMOD - Data Economy.pptxTed Dunning
apidays London 2023 - Revolutionising fitness and well-being, David Turner, V...apidays London 2023 - Revolutionising fitness and well-being, David Turner, V...
apidays London 2023 - Revolutionising fitness and well-being, David Turner, V...apidays
Introduction to Cypher Introduction to Cypher
Introduction to Cypher Neo4j

The State of Application Security: Hackers On Steroids

Hinweis der Redaktion

  1. Motivation Target audience Tradition
  2. 198 WAF customers 103,455,308 security events The team - ADC led by CTO Next slide - The alerts were gathered with …
  3. Positive Negative vs. Positive security model Crowd sourcing Distinction – content vs. reputation Next slide – this distinction
  4. Focus on attack types Reputation-based detection vs. Content-based detection
  5. Incident – collection of requests which seem to belong to the same attack The IP dilemma
  6. # of attacks within the report period
  7. Most prominent - Everyone’s at risk For every attack type (RCE), at least 3/4 applications (100%) were attacked If you expose your application to the Internet – you will get attacked
  8. If you expose your application to the Internet – you will get attacked Next slide - How many attacks…..
  9. Explain the diagram Explain the quartiles notion
  10. Explain the diagram Explain the quartiles notion
  11. RCE – 273-591 for the Q3 (Shellshock) Spam: 24-276 attacks on Q3 Notice the difference between RCE and Spam
  12. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  13. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  14. Equality Measure Spam is outstanding RCE is lowest Next slide – zoomin to other attack types
  15. Explain the diagram – attacks during 6 months Next slide – year over year
  16. Explain the diagram – attacks during 6 months Next slide – year over year
  17. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  18. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  19. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  20. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  21. Diagram – we use the median Exponential growth Why: Reduce cost of computational power Availability of knowledge and tools Next slide – down trends
  22. Next slide – from number of attacks to the intern of attacks - magnitude
  23. Next slide – from number of attacks to the intern of attacks - magnitude
  24. Next slide – from number of attacks to the intern of attacks - magnitude
  25. Attacks mounted by scanners Typical SQLi attack includes more than 70 requests, usually arriving in bursts over a short period The most intensive SQLi attack spanned 300,000 malicious requests
  26. Attacks mounted by scanners Typical SQLi attack includes more than 70 requests, usually arriving in bursts over a short period The most intensive SQLi attack spanned 300,000 malicious requests
  27. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  28. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  29. What is reputation based mitigation? Crowed sourcing Reputation based mechanism saves the web-application server and the waf computing resources as the data is blocked in very early stages. Is reputation based mitigation effective? 4 out of 5 alerts are detected by reputation Serial attackers and anonymous browsing
  30. Zoom into the data X/Y-axis. Limit 2M Different points in time different mitigations are more effective
  31. Zoom into the data X/Y-axis. Limit 2M Different points in time different mitigations are more effective
  32. Insights on the different industries => show the percent of incidents for each attack type The dominance of RCE and Spam => zoom in
  33. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  34. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  35. Exclude Spam and RCE XSS are rare XSS are popular on the health industry, maybe to steal personal information DT are popular on restaurants applications. Not clear why
  36. 3 groups WordPress is popular
  37. Normalized the absolute # requests by the internet users published by the world bank The bigger the bubble the traffic is more malicious
  38. Netherlands and USA in the top five second 2 year in a row Cyprus, Costa Rica, Switzerland were dominant last year and are not dominant anymore.
  39. One of the most significant security event Zoom into the Shellshock incidents Week-by-week analysis Remind you – 2015 period while Shellshock was published during September 2014 2 waves: the first is during September 2014, right after the publication – not in the report The second is during weeks 14-19 – April 2015 Seven month after the publication, attackers hit again
  40. One of the most significant security event Zoom into the Shellshock incidents Week-by-week analysis Remind you – 2015 period while Shellshock was published during September 2014 2 waves: the first is during September 2014, right after the publication – not in the report The second is during weeks 14-19 – April 2015 Seven month after the publication, attackers hit again
  41. Focus on one application that was highly attacked. The attack lasted 4 days with high SQLi activity. 6,800 Alerts per hour, The attacks had similar patterns Blocked by content and by reputation, negative security model, signatures, policies 2 waves – the first one faded away on the third day and a new wave on the 4th day We believe that the first wave faded away due to our blocking mechanisms and the second wave was used with a new pool of Ips to try to avoid blocking
  42. Focus on one application that was highly attacked. The attack lasted 4 days with high SQLi activity. 6,800 Alerts per hour, The attacks had similar patterns Blocked by content and by reputation, negative security model, signatures, policies 2 waves – the first one faded away on the third day and a new wave on the 4th day We believe that the first wave faded away due to our blocking mechanisms and the second wave was used with a new pool of Ips to try to avoid blocking
  43. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  44. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  45. We looked at one application in a specific week with high activity from TOR 2 million requests from TOR 99% were targeted for 3 URLs: search and 2 shopping pages (different input parameters values for product ID) ~2,000 sessions IDs Usage of session ID from multiple Ips at the same time 3 main user-agents that were used in different permutations
  46. 3 out of 4 applications are attacked Crowd sourcing is effective – 4 out of 5 Shellshock mega-trend influenced cyberspace Y2Y increase
  47. Mega trend vulnerabilities spread like wildfire: keep updated with new vulnerabilities mitigations Be part of a community defense: it prevents attacks and saves CPU