Combatting Botnet Traffic with Behavioral Analysis: Part II

Posted by Will Woodson | Lead Security Engineer on Jun 28, 2018 11:28:17 AM

The previous post in this series discussed comment spam, one of the most pervasive forms of 'botnet' web traffic and accordingly, one of the least targeted varieties of attack. Part II will discuss a more serious form of botnet traffic: Targeted attacks that are coordinated centrally and distributed across multiple actors in an attempt to avoid security controls.

Read More

Topics: Threat Intelligence

Combatting Botnet Traffic with Behavioral Analysis: Part I

Posted by Will Woodson | Lead Security Engineer on Jun 6, 2018 7:25:47 AM

The following is the first post in a three-part series surrounding bot detection and neutralization based on botnet analysis. The series will begin by addressing commodity form/comment spam. 

One of the unfortunate realities of running a site on the Internet is the amount of "background noise" -- the automated, unsophisticated, poorly targeted attacks, which make up the bulk of malicious web traffic. For the sake of this series, we're calling this 'botnet' traffic. 

Botnet traffic can be a nuisance, no doubt, but it isn't necessarily interesting or deserving of action until viewed in aggregate. The posts in this series describe methods for identifying and blocking botnet traffic, and aggregating this data, each through a different case:
 
1. Identifying Bot Behavior - Form Spam 
2. Bot Behavior - Distributed Attacks
3. Behavioral Analysis - Grouping Bot Actors
 
Read More

Topics: Threat Intelligence

Unexpected Web Application Attacks: When Not to Trust Your Search Engine

Posted by Aaron Fosdick on May 31, 2018 8:13:19 AM

In today’s complex cybersecurity landscape, it is very apparent that threats can and will originate from virtually anywhere and hardly ever follow predictable patterns. We consistently share this knowledge with our customers and use these insights to drive our product updates and roadmap.

This fact alone makes the task of properly securing your applications even more challenging. To effectively secure your applications, it is critical to implement security controls using the zero-trust model. That means you should not rely solely on external reputation sources, threat feeds, or patches. In fact, we have found that many of the threats we identify using behavioral analysis methods go undetected when using the more traditional methods. More accurate and reliable detection is critical to effective application security, especially when attacks come from the most unsuspecting of sources.

Read More

Topics: Threat Intelligence

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part II

Posted by Aaron Fosdick on May 8, 2018 9:35:00 AM

Continued from part I. Credit card fraud is an increasingly prevalent issue for card holders, card issuers, and merchants alike. Traditional approaches to WAF technology may lack the intelligence to detect and neutralize credit card fraudsters, but there are new ways, such as ThreatX's contextual behavioral analysis, that are effective in neutralizing these attacks. 

Read More

Topics: Threat Intelligence

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part I

Posted by Aaron Fosdick on Apr 19, 2018 11:55:00 AM

In part I of this two-part series, we will discuss the growing issue of credit card fraud for card issuers, card holders, and merchants, including how card data is being obtained and used by today's advanced attackers.

Read More

Topics: Threat Intelligence

ThreatX Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me