Date post: | 18-Jan-2018 |
Category: |
Documents |
Upload: | hugo-stokes |
View: | 225 times |
Download: | 0 times |
BEWARE OF ROBOTS
HOW DO YOU IDENTIFY A ROBOT?
BOTS AND SECURITY
WHAT ARE BAD GUYS DOING WITH BOTNETS?
CLICK FRAUD
• Pay-per-click model• $23B in annual revenue• >$100K per minute• One main incentive• Many methods
A REAL EXAMPLE
CREATING A SUCCESSFUL BOT• To successfully imitate a crowd attackers need to vary• Screen resolution• Timezone• Browser version• Language• Fonts• Browser Plugins• Type of Pointing Device• Many other browser features
Source: http://www.infoq.com/
GENERALIZED ATTACK MITIGATION
Prevention
Removing Attack
incentives
Reducing AttackSurface
Disrupting &
Deflecting AttacksReal-
TimedDetection
Real-Time Detection
Near Real-Time
DetectionBatch Detection
& Invistigati
on
BatchDetection
Rules
ProactiveManual
InvestigationData Feeds
Reactive Manual
Investigation
Reactive Investigat
ion