SlideShare a Scribd company logo
Pro-actively Managing Web Application Abuse Al Huizenga Director of Product Management, Mykonos Software 29 June 2010
AGENDA  Defining Web App Abuse  Business Examples  Phases of Web App Abuse  E.g. Parameter Manipulation ,[object Object]
11 years experience releasing and marketing Web technology,[object Object]
SOME BUSINESS EXAMPLES CARD SERVICES EMAIL SERVICES GAMING Provider allows consumers to top up their credit online “Greenhat” developers abuse app logic to top up cards without paying, and automate the process Costs provider $50/K per month in “free” card credits  SAAS-based CMS  provider finds client sites are being slowed to a crawl by load induced from badly behaved spiders Query too frequently, ignore robots policy Support calls balloon, customer satisfaction impaired Online gamers write programs that top up their in-game virtual currency by abusing the the site API They avoid buying the currency directly, or clicking on commercial offers from advertising partners to get free currency Hurts the site’s ability to monetize effectively
Signatures play here. THE PHASES OF ABUSE Phase 2Attack Vector Establishment Phase 1Silent Introspection Phase 3Attack Implementation Phase 4AttackAutomation Phase 5Maintenance
SIGNATURE-BASED DETECTION Can it help? Effective at blocking known, syntax-level attacks: Injection, XSS, CSRF… Smart developers easily tailor attack vector to avoid pattern match Does not address logic abuse Does not address all phases of abuse Answer: Yes, it can filter out obvious bad stuff, but it’s not enough
EXAMPLE: PARAMETER MANIPULATION Silent Introspection Phase Abuse goals Manipulate data sent between the browser and the app using cookies, form fields, URL query strings, HTTP headers…. Make the application behave in unintended ways Impersonate users, change prices, bypass checkpoints…     App lets user select an account from a drop-down box and debit it. The browser sends the following request: http://www.victim.com/example?accountnumber=12345&debitamount=1      An abusive user could spoof an account number and up the amount:  http://www.victim.com/example?accountnumber=67891&creditamount=999999999 Example from “A Guide to Building Secure Web Applications”, OWASP, 2005
REMEDIATION OPTIONS Signatures don’t help here, so what can you do? Rewrite the application to be less permissive Ideal, but often not feasible Dev team has moved on, or the app is COTS Implement a fine-grained policy for every parameter that specifies allowable values Typically on a Web Application Firewall Very hard to write and maintain – apps are extremely complicated, IT staff don’t typically have deep enough knowledge Add intrusion detection hooks to flush out parameter tampering In the code itself (e.g. the OWASP AppSensor Project) At serve time (e.g. the Mykonos Security Appliance)
EARLY ABUSE DETECTION Pre-empting abuse in the silent introspection phase Malicious activity detected Attack vector established Number of Requests
RESPONDING TO ABUSE Block IP addresses An imperfect proxy for users Easy to spoof, easy to switch Not granular enough – good chance of hosing good users along with the bad User-based responses are better Warning: “Hey kid, get off my lawn!” User-level block: “No soup for you!” How do you block individual users? Need infrastructure for persistently re-identifying bad user sessions Emerging approaches: token checking, browser fingerprinting
SUMMARY Users (and their code) abuse Web applications To identify and fight back against abuse, you need to engage user behavior See it, analyze it, track it, respond to it in real time It’s not just about protecting the server It’s about understanding and managing how users (and user agents) behave in your application
Q&A Al Huizenga ahuizenga@mykonossoftware.com 650-329-9000 ext 1204 Mykonos Software

More Related Content

What's hot

The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
IMMUNIO
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
HackerOne
 
Snapcuff vs Others
Snapcuff vs OthersSnapcuff vs Others
Snapcuff vs Others
SnapCuff Inc.
 
Real-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul GhaniReal-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul Ghani
Abdul Ghani
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android appsJPINFOTECH JAYAPRAKASH
 
QA Club Kiev #20. Mobile Testing. Tips & Tricks
QA Club Kiev #20. Mobile Testing. Tips & TricksQA Club Kiev #20. Mobile Testing. Tips & Tricks
QA Club Kiev #20. Mobile Testing. Tips & Tricks
QA Club Kiev
 
traCOVID Sahayata Pitch PPT
traCOVID Sahayata Pitch PPTtraCOVID Sahayata Pitch PPT
traCOVID Sahayata Pitch PPT
Tanmaya Harichandan
 

What's hot (9)

The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 
Bug Bounty Basics
Bug Bounty BasicsBug Bounty Basics
Bug Bounty Basics
 
Snapcuff vs Others
Snapcuff vs OthersSnapcuff vs Others
Snapcuff vs Others
 
Secopy project A
Secopy project ASecopy project A
Secopy project A
 
Spyware
SpywareSpyware
Spyware
 
Real-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul GhaniReal-time Phishing Attack Detection using ML  - Abdul Ghani
Real-time Phishing Attack Detection using ML  - Abdul Ghani
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
 
QA Club Kiev #20. Mobile Testing. Tips & Tricks
QA Club Kiev #20. Mobile Testing. Tips & TricksQA Club Kiev #20. Mobile Testing. Tips & Tricks
QA Club Kiev #20. Mobile Testing. Tips & Tricks
 
traCOVID Sahayata Pitch PPT
traCOVID Sahayata Pitch PPTtraCOVID Sahayata Pitch PPT
traCOVID Sahayata Pitch PPT
 

Viewers also liked

5 generating profitable app ideas
5 generating profitable app ideas5 generating profitable app ideas
5 generating profitable app ideas
ismailbowers
 
OWASP Appsensor in action
OWASP Appsensor in actionOWASP Appsensor in action
OWASP Appsensor in action
LeszekMis
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real World
Brooks Garrett
 
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
jtmelton
 
AppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and ResponseAppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and Response
jtmelton
 
Owasp appsensor self-protecting applications
Owasp appsensor self-protecting applicationsOwasp appsensor self-protecting applications
Owasp appsensor self-protecting applications
Raphaël Taban
 
The Hacker's Guide To Session Hijacking
The Hacker's Guide To Session HijackingThe Hacker's Guide To Session Hijacking
The Hacker's Guide To Session Hijacking
Patrycja Wegrzynowicz
 
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
jtmelton
 
How to Create a Growth Framework
How to Create a Growth FrameworkHow to Create a Growth Framework
How to Create a Growth Framework
Sujan Patel
 
Want To Open A Small Business? Move To One Of These 25 Cities.
Want To Open A Small Business? Move To One Of These 25 Cities.Want To Open A Small Business? Move To One Of These 25 Cities.
Want To Open A Small Business? Move To One Of These 25 Cities.
When I Work
 

Viewers also liked (10)

5 generating profitable app ideas
5 generating profitable app ideas5 generating profitable app ideas
5 generating profitable app ideas
 
OWASP Appsensor in action
OWASP Appsensor in actionOWASP Appsensor in action
OWASP Appsensor in action
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real World
 
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
 
AppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and ResponseAppSensor - Near Real Time Event Detection and Response
AppSensor - Near Real Time Event Detection and Response
 
Owasp appsensor self-protecting applications
Owasp appsensor self-protecting applicationsOwasp appsensor self-protecting applications
Owasp appsensor self-protecting applications
 
The Hacker's Guide To Session Hijacking
The Hacker's Guide To Session HijackingThe Hacker's Guide To Session Hijacking
The Hacker's Guide To Session Hijacking
 
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
 
How to Create a Growth Framework
How to Create a Growth FrameworkHow to Create a Growth Framework
How to Create a Growth Framework
 
Want To Open A Small Business? Move To One Of These 25 Cities.
Want To Open A Small Business? Move To One Of These 25 Cities.Want To Open A Small Business? Move To One Of These 25 Cities.
Want To Open A Small Business? Move To One Of These 25 Cities.
 

Similar to Pro-actively Managing Web Application Abuse - Mykonos Software

Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
Jakub Kałużny
 
Java Application Development Vulnerabilities
Java Application Development VulnerabilitiesJava Application Development Vulnerabilities
Java Application Development Vulnerabilities
Narola Infotech
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
ColumnInformationSecurity
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
DatlaSravya1
 
C01461422
C01461422C01461422
C01461422
IOSR Journals
 
The Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docxThe Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docx
QACraft
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
sarah david
 
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Distil Networks
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
Mykonos Software
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
sarah david
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
Eoin Keary
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
Core defense mechanisms against security attacks on web applications
Core defense mechanisms against security attacks on web applicationsCore defense mechanisms against security attacks on web applications
Core defense mechanisms against security attacks on web applications
Karan Nagrecha
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
mobile app development tool-converted.pdf
mobile app development tool-converted.pdfmobile app development tool-converted.pdf
mobile app development tool-converted.pdf
KatieLeslove1
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
Mike Spaulding
 
AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
Narola Infotech
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
EMC
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays
 

Similar to Pro-actively Managing Web Application Abuse - Mykonos Software (20)

Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
 
Java Application Development Vulnerabilities
Java Application Development VulnerabilitiesJava Application Development Vulnerabilities
Java Application Development Vulnerabilities
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
Major Prc.pptx
Major Prc.pptxMajor Prc.pptx
Major Prc.pptx
 
C01461422
C01461422C01461422
C01461422
 
The Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docxThe Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docx
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
 
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
Are Bad Bots Destroying Your Conversion Rate and Costing You Money?
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
 
Security by the numbers
Security by the numbersSecurity by the numbers
Security by the numbers
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Core defense mechanisms against security attacks on web applications
Core defense mechanisms against security attacks on web applicationsCore defense mechanisms against security attacks on web applications
Core defense mechanisms against security attacks on web applications
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
mobile app development tool-converted.pdf
mobile app development tool-converted.pdfmobile app development tool-converted.pdf
mobile app development tool-converted.pdf
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Pro-actively Managing Web Application Abuse - Mykonos Software

  • 1. Pro-actively Managing Web Application Abuse Al Huizenga Director of Product Management, Mykonos Software 29 June 2010
  • 2.
  • 3.
  • 4. SOME BUSINESS EXAMPLES CARD SERVICES EMAIL SERVICES GAMING Provider allows consumers to top up their credit online “Greenhat” developers abuse app logic to top up cards without paying, and automate the process Costs provider $50/K per month in “free” card credits SAAS-based CMS provider finds client sites are being slowed to a crawl by load induced from badly behaved spiders Query too frequently, ignore robots policy Support calls balloon, customer satisfaction impaired Online gamers write programs that top up their in-game virtual currency by abusing the the site API They avoid buying the currency directly, or clicking on commercial offers from advertising partners to get free currency Hurts the site’s ability to monetize effectively
  • 5. Signatures play here. THE PHASES OF ABUSE Phase 2Attack Vector Establishment Phase 1Silent Introspection Phase 3Attack Implementation Phase 4AttackAutomation Phase 5Maintenance
  • 6. SIGNATURE-BASED DETECTION Can it help? Effective at blocking known, syntax-level attacks: Injection, XSS, CSRF… Smart developers easily tailor attack vector to avoid pattern match Does not address logic abuse Does not address all phases of abuse Answer: Yes, it can filter out obvious bad stuff, but it’s not enough
  • 7. EXAMPLE: PARAMETER MANIPULATION Silent Introspection Phase Abuse goals Manipulate data sent between the browser and the app using cookies, form fields, URL query strings, HTTP headers…. Make the application behave in unintended ways Impersonate users, change prices, bypass checkpoints… App lets user select an account from a drop-down box and debit it. The browser sends the following request: http://www.victim.com/example?accountnumber=12345&debitamount=1 An abusive user could spoof an account number and up the amount: http://www.victim.com/example?accountnumber=67891&creditamount=999999999 Example from “A Guide to Building Secure Web Applications”, OWASP, 2005
  • 8. REMEDIATION OPTIONS Signatures don’t help here, so what can you do? Rewrite the application to be less permissive Ideal, but often not feasible Dev team has moved on, or the app is COTS Implement a fine-grained policy for every parameter that specifies allowable values Typically on a Web Application Firewall Very hard to write and maintain – apps are extremely complicated, IT staff don’t typically have deep enough knowledge Add intrusion detection hooks to flush out parameter tampering In the code itself (e.g. the OWASP AppSensor Project) At serve time (e.g. the Mykonos Security Appliance)
  • 9. EARLY ABUSE DETECTION Pre-empting abuse in the silent introspection phase Malicious activity detected Attack vector established Number of Requests
  • 10. RESPONDING TO ABUSE Block IP addresses An imperfect proxy for users Easy to spoof, easy to switch Not granular enough – good chance of hosing good users along with the bad User-based responses are better Warning: “Hey kid, get off my lawn!” User-level block: “No soup for you!” How do you block individual users? Need infrastructure for persistently re-identifying bad user sessions Emerging approaches: token checking, browser fingerprinting
  • 11. SUMMARY Users (and their code) abuse Web applications To identify and fight back against abuse, you need to engage user behavior See it, analyze it, track it, respond to it in real time It’s not just about protecting the server It’s about understanding and managing how users (and user agents) behave in your application
  • 12. Q&A Al Huizenga ahuizenga@mykonossoftware.com 650-329-9000 ext 1204 Mykonos Software