SlideShare a Scribd company logo
1 of 16
Download to read offline
1 © Nokia 2016
Stopping Malicious
Automated Web Traffic
Public
AT&T Foundry+ Nokia Cybersecurity
Robert Mendelsohn
15-07-2016
2 © Nokia 2016
Automated Traffic:
Case Studies
Public
3 © Nokia 2016
Global Retailer Loses
Millions to Gift Card
Fraud
Gift card program worth $5 billion is
attacked by botnet, steals $25
million
Major Insurance
Website Crashed
Application-layer distributed denial
of service attack succeeds
Major Airline Has
Data Stolen
Airline webpage is attacked by a
botnet
Public
Case Studies
4 © Nokia 2016
Automated Traffic:
Current Methods
Public
5 © Nokia 2016
Per IP
How many requests from this IP
address per unit time?
• IP address is easy to fake
Per Content
How many times has this content
been submitted per unit time?
• Message can be modified
Per Account
How many requests from/for this
account per unit time?
• Attack multiple accounts
Public
Current Methods
6 © Nokia 2016
Automated Traffic:
Dissecting an Attack
Public
7 © Nokia 2016 Public
8 © Nokia 2016 Public
9 © Nokia 2016 Public
10 © Nokia 2016 Public
11 © Nokia 2016 Public
12 © Nokia 2016 Public
What is different between how a human
uses a website and a computer uses a
website?
13 © Nokia 2016
Polymorphism and
Obfuscation
Make it hard for an attacker to
navigate the code and find distinct
elements
Record User Input
Record time between keystrokes,
mouse X and Y coordinates, how
long a user has been on a page in
total
Public
Methods to Inhibit Malicious Automation
Forced Resource
Consumption
User must complete a
computationally expensive task,
making repeated accessing non-
cost-effective
14 © Nokia 2016 Public
Polymorphism and
Obfuscation
Make it hard for an attacker to
navigate the code and find distinct
elements
15 © Nokia 2016 Public
Forced Resource Consumption
Worst Best
Business considerations of
high-volume attacks:
• As a whole, earns
$200M/yr
• Sends out 50B pieces of
spam per day
• $0.00001/spam
$30k/
GFLOP
$30k/
GFLOP
$0.08/
GFLOP
$0.08/
GFLOP
Differences in FLOPS Differences in Memory Latency
8x375,000x
7 ns7 ns
0.6 ns0.6 ns
16 © Nokia 2016 Public
DEMO

More Related Content

What's hot

Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonForgeRock
 
Party Squasher: a party disaster solution
Party Squasher: a party disaster solutionParty Squasher: a party disaster solution
Party Squasher: a party disaster solutionFrederic Renard
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeGhostery, Inc.
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesPriyanka Aash
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - DusseldorfHermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowForgeRock
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkMohak Kaushik
 

What's hot (9)

Identity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley StevensonIdentity Live London 2017 | Ashley Stevenson
Identity Live London 2017 | Ashley Stevenson
 
Party Squasher: a party disaster solution
Party Squasher: a party disaster solutionParty Squasher: a party disaster solution
Party Squasher: a party disaster solution
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy Landscape
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ Websites
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - DusseldorfHermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
Hermann Wimmer - ForgeRock Identity Live 2017 - Dusseldorf
 
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowIoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 

Viewers also liked

Keeping the Chapter Active - Chapter Ops
Keeping the Chapter Active - Chapter Ops Keeping the Chapter Active - Chapter Ops
Keeping the Chapter Active - Chapter Ops Terrance McNichols
 
Reconstruction of Fire History in the National Key Deer Refuge M
Reconstruction of Fire History in the National Key Deer Refuge MReconstruction of Fire History in the National Key Deer Refuge M
Reconstruction of Fire History in the National Key Deer Refuge MDesiree Kocis, GISP
 
Daw disbon для архитекторов 2015
Daw disbon   для архитекторов 2015Daw disbon   для архитекторов 2015
Daw disbon для архитекторов 2015Roman Shcherbakov
 
Activision Blizzard Investment Proposal 2016
Activision Blizzard Investment Proposal 2016 Activision Blizzard Investment Proposal 2016
Activision Blizzard Investment Proposal 2016 Terrance McNichols
 
Why translation should be -reassuringly- expensive
Why translation should be -reassuringly- expensiveWhy translation should be -reassuringly- expensive
Why translation should be -reassuringly- expensiveArline Lyons
 
U8 Nitros Parent handbook- Letter_Landscape_
U8 Nitros Parent handbook- Letter_Landscape_ U8 Nitros Parent handbook- Letter_Landscape_
U8 Nitros Parent handbook- Letter_Landscape_ Beje Melamed - Turkish
 
Folheto_ASM_Energia
Folheto_ASM_EnergiaFolheto_ASM_Energia
Folheto_ASM_EnergiaNuno Sá
 
Diversity and Inclusion Presentation
Diversity and Inclusion PresentationDiversity and Inclusion Presentation
Diversity and Inclusion PresentationTerrance McNichols
 
Think You Know Oracle - Think Again!
Think You Know Oracle - Think Again!Think You Know Oracle - Think Again!
Think You Know Oracle - Think Again!Paul Ricketts
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network TechnologyMohmmad Azam
 

Viewers also liked (17)

TEMESGEN
TEMESGENTEMESGEN
TEMESGEN
 
Keeping the Chapter Active - Chapter Ops
Keeping the Chapter Active - Chapter Ops Keeping the Chapter Active - Chapter Ops
Keeping the Chapter Active - Chapter Ops
 
Reconstruction of Fire History in the National Key Deer Refuge M
Reconstruction of Fire History in the National Key Deer Refuge MReconstruction of Fire History in the National Key Deer Refuge M
Reconstruction of Fire History in the National Key Deer Refuge M
 
Temesgen2
Temesgen2Temesgen2
Temesgen2
 
TEMESGEN
TEMESGENTEMESGEN
TEMESGEN
 
Daw disbon для архитекторов 2015
Daw disbon   для архитекторов 2015Daw disbon   для архитекторов 2015
Daw disbon для архитекторов 2015
 
Activision Blizzard Investment Proposal 2016
Activision Blizzard Investment Proposal 2016 Activision Blizzard Investment Proposal 2016
Activision Blizzard Investment Proposal 2016
 
Case Study 2- June 14Ro 2016
Case Study 2-  June 14Ro  2016Case Study 2-  June 14Ro  2016
Case Study 2- June 14Ro 2016
 
Why translation should be -reassuringly- expensive
Why translation should be -reassuringly- expensiveWhy translation should be -reassuringly- expensive
Why translation should be -reassuringly- expensive
 
nss_12
nss_12nss_12
nss_12
 
U8 Nitros Parent handbook- Letter_Landscape_
U8 Nitros Parent handbook- Letter_Landscape_ U8 Nitros Parent handbook- Letter_Landscape_
U8 Nitros Parent handbook- Letter_Landscape_
 
Folheto_ASM_Energia
Folheto_ASM_EnergiaFolheto_ASM_Energia
Folheto_ASM_Energia
 
Diversity and Inclusion Presentation
Diversity and Inclusion PresentationDiversity and Inclusion Presentation
Diversity and Inclusion Presentation
 
Think You Know Oracle - Think Again!
Think You Know Oracle - Think Again!Think You Know Oracle - Think Again!
Think You Know Oracle - Think Again!
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network Technology
 
Signaling system 7 (ss7)
Signaling system 7 (ss7)Signaling system 7 (ss7)
Signaling system 7 (ss7)
 
Payment Hsm Payshield9000
Payment Hsm Payshield9000Payment Hsm Payshield9000
Payment Hsm Payshield9000
 

Similar to BotwallPresentation

The Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & InsightsThe Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & InsightsMediaPost
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summaryMiguel Angel
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryAkamai Technologies
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Internet Traffic 2009-2019
Internet Traffic 2009-2019Internet Traffic 2009-2019
Internet Traffic 2009-2019APNIC
 
The Emergence of Digital & Social Media On Mobile Platforms
The Emergence of Digital & Social Media On Mobile PlatformsThe Emergence of Digital & Social Media On Mobile Platforms
The Emergence of Digital & Social Media On Mobile PlatformsRandy Giusto
 
The Emergence of Digital and Social Media on Mobile Platforms
The Emergence of Digital and Social Media on Mobile PlatformsThe Emergence of Digital and Social Media on Mobile Platforms
The Emergence of Digital and Social Media on Mobile PlatformsIpsos Vantis
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry AnalysisRAJEEV RANJAN
 
November 2019 OpenFalklands presentation
November 2019 OpenFalklands presentation November 2019 OpenFalklands presentation
November 2019 OpenFalklands presentation Chris Gare
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected SocietyCOMPUTEX TAIPEI
 
Parallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteParallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteSoftLayer Technologies
 
The potential of digital publishing in an emerging market : John Wheeler
The potential of digital publishing in an emerging market : John WheelerThe potential of digital publishing in an emerging market : John Wheeler
The potential of digital publishing in an emerging market : John WheelerFootnote Summit
 
IDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
IDERA Live | Have No Fear the DBA is Here: Protecting Data ResourcesIDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
IDERA Live | Have No Fear the DBA is Here: Protecting Data ResourcesIDERA Software
 
IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationBrennan Hayden
 
Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009troyangrignon
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
SIPN Business Overview
SIPN Business OverviewSIPN Business Overview
SIPN Business OverviewKen Tola
 

Similar to BotwallPresentation (20)

The Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & InsightsThe Promise (and Perils) of the Blockchain in Media & Insights
The Promise (and Perils) of the Blockchain in Media & Insights
 
Akamai soti q213_exec_summary
Akamai soti q213_exec_summaryAkamai soti q213_exec_summary
Akamai soti q213_exec_summary
 
The State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive SummaryThe State of the Internet, 2nd Quarter, 2013 Executive Summary
The State of the Internet, 2nd Quarter, 2013 Executive Summary
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Internet Traffic 2009-2019
Internet Traffic 2009-2019Internet Traffic 2009-2019
Internet Traffic 2009-2019
 
The Emergence of Digital & Social Media On Mobile Platforms
The Emergence of Digital & Social Media On Mobile PlatformsThe Emergence of Digital & Social Media On Mobile Platforms
The Emergence of Digital & Social Media On Mobile Platforms
 
The Emergence of Digital and Social Media on Mobile Platforms
The Emergence of Digital and Social Media on Mobile PlatformsThe Emergence of Digital and Social Media on Mobile Platforms
The Emergence of Digital and Social Media on Mobile Platforms
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry Analysis
 
November 2019 OpenFalklands presentation
November 2019 OpenFalklands presentation November 2019 OpenFalklands presentation
November 2019 OpenFalklands presentation
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
 
Parallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteParallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby Keynote
 
The potential of digital publishing in an emerging market : John Wheeler
The potential of digital publishing in an emerging market : John WheelerThe potential of digital publishing in an emerging market : John Wheeler
The potential of digital publishing in an emerging market : John Wheeler
 
Marketing Plan For an Android App
Marketing Plan For an Android AppMarketing Plan For an Android App
Marketing Plan For an Android App
 
IDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
IDERA Live | Have No Fear the DBA is Here: Protecting Data ResourcesIDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
IDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
 
IQPC Mobile Payments Presentation
IQPC Mobile Payments PresentationIQPC Mobile Payments Presentation
IQPC Mobile Payments Presentation
 
Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
SIPN Business Overview
SIPN Business OverviewSIPN Business Overview
SIPN Business Overview
 
IDC Globalization Report
IDC Globalization ReportIDC Globalization Report
IDC Globalization Report
 

BotwallPresentation

  • 1. 1 © Nokia 2016 Stopping Malicious Automated Web Traffic Public AT&T Foundry+ Nokia Cybersecurity Robert Mendelsohn 15-07-2016
  • 2. 2 © Nokia 2016 Automated Traffic: Case Studies Public
  • 3. 3 © Nokia 2016 Global Retailer Loses Millions to Gift Card Fraud Gift card program worth $5 billion is attacked by botnet, steals $25 million Major Insurance Website Crashed Application-layer distributed denial of service attack succeeds Major Airline Has Data Stolen Airline webpage is attacked by a botnet Public Case Studies
  • 4. 4 © Nokia 2016 Automated Traffic: Current Methods Public
  • 5. 5 © Nokia 2016 Per IP How many requests from this IP address per unit time? • IP address is easy to fake Per Content How many times has this content been submitted per unit time? • Message can be modified Per Account How many requests from/for this account per unit time? • Attack multiple accounts Public Current Methods
  • 6. 6 © Nokia 2016 Automated Traffic: Dissecting an Attack Public
  • 7. 7 © Nokia 2016 Public
  • 8. 8 © Nokia 2016 Public
  • 9. 9 © Nokia 2016 Public
  • 10. 10 © Nokia 2016 Public
  • 11. 11 © Nokia 2016 Public
  • 12. 12 © Nokia 2016 Public What is different between how a human uses a website and a computer uses a website?
  • 13. 13 © Nokia 2016 Polymorphism and Obfuscation Make it hard for an attacker to navigate the code and find distinct elements Record User Input Record time between keystrokes, mouse X and Y coordinates, how long a user has been on a page in total Public Methods to Inhibit Malicious Automation Forced Resource Consumption User must complete a computationally expensive task, making repeated accessing non- cost-effective
  • 14. 14 © Nokia 2016 Public Polymorphism and Obfuscation Make it hard for an attacker to navigate the code and find distinct elements
  • 15. 15 © Nokia 2016 Public Forced Resource Consumption Worst Best Business considerations of high-volume attacks: • As a whole, earns $200M/yr • Sends out 50B pieces of spam per day • $0.00001/spam $30k/ GFLOP $30k/ GFLOP $0.08/ GFLOP $0.08/ GFLOP Differences in FLOPS Differences in Memory Latency 8x375,000x 7 ns7 ns 0.6 ns0.6 ns
  • 16. 16 © Nokia 2016 Public DEMO