SlideShare a Scribd company logo
1 of 31
Presented by:
Orion Cassetto, Sr. Product Marketing Manager, Incapsula
Understanding Web Bots and How They Hurt
Your Business
Incapsula Webinar
•Thanks for joining!
•The webinar is about 30 minutes long
•Questions will be answered after the session
•Please submit your questions using
> the chat window
>Or tweet them to @orionevolution
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.2
Speaker Bio – Orion Cassetto
• Sr. Product Marketing Manager for
Incapsula
• Previously held product marketing
positions at Imperva and Armorize
Technologies
• Experienced in Web app security, and
SaaS security solutions
• Holds degrees in Asian Studies, and
Chinese Language from Washington
State University
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.3
Overview
• An overview of Bot technology
• How bots are used for Hacking and Denial of Service Attacks
• The Impact of Content Scraping on Websites
• Suggestions for Bot detection and Mitigation
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.4
What is an Internet Bot?
• A bot is a software program that runs automated
tasks over the internet
• They typically perform simple, repetitive tasks
• Are able to operate at a higher rate of speed than
humans can achieve
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.5
Popular Legitimate Uses for Web Bots
Bots tend to visit websites in regular cycles performing
tasks like
• Search Engine Crawling
> Google
> Bing
> Yandex
> Baidu
• Website Health Monitoring
• Fetching Web Content
• Web vulnerability Scanning
• Operating APIs (Application Programming Interfaces)
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.6
Automated Clients are the Majority of Web Traffic
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.7
Over 61%of all website traffic is non-human.
61.5%
Non-Human Traffic
38.5%
Human Traffic
1/2
of that is malicious.
The Impact of Bots on Website Security
• DDoS
• Site Scraping
• Comment Spam
• SEO Spam
• Fraud
• Vulnerability
scanning
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.8
• Search Engine
Crawling
• Website Health
Monitoring
• Vulnerability
Scanning
• Fetching Content
• Powering APIs
Good Bots Bad Bots
Evolution of Bots
• Bots are increasingly able to imitate browser and human
behavior
• Browser-based bots which live inside of infected browsers are
becoming more sophisticated
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.9
Imposter Google Bots are on the Rise
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.10
Googlebots visit websites an
average of 187 times per day
24% of them are fake
Imposter Google Bots are on the Rise
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.11
Google Imposter Bots by Activity Type
How bots are used for Hacking
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.12
Bots and Comment Spam
• What is Comment Spam
> Posts in comment sections on websites allegedly linking to:
- Steams of popular TV shows
- Cheap Shoes
- Designer bags, etc.
• How bots are involved
> Bots are used to automatically find victim sites and insert spam
posts
• Why it matters
> Comment spam is frequently responsible for
- Worse user experiences
- Lower website conversions (links usually exit your site)
- Malware distribution (infecting your visitors)
Bots and Click Fraud
• What is click fraud?
> When a person, or automated script imitates a legitimate user of a
web browser clicking on a pay-per-click ad
• How bots are involved
> Bots are created which can click on ads with a rate unachievable
by humans
• Click fraud can be used as a weapon for
- Competitors of advertisers
- Competitors of publishers
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.14
SEO Referral Spam
What is it?
1. Semalt is a Ukrainian search engine optimization (SEO) “company”
2. They used malware to hijack computers and create a giant botnet
3. This Botnet visits sites across the internet with fake referral sources
What damage could this cause your website?
• Long term SEO Damage to your website’s rankings
• Complete search engine result page blacklisting and removal
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.15
Bots for Distributed Denial Of Service (DDoS) Attacks
• DDoS attack are attacks where many infected computers band
together to attack a single target
• These attacks exhaust network connections and server
resources causing website outages
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.16
How DDoS Attacks Impact Site Availability
• DDoS attacks make your website completely inaccessible
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.17
Legitimate
Traffic
Your Site
Your Internet
Connection
• If website availability is important to you, then DDoS
protection should be too
• Any application without a DDoS mitigation strategy is at risk
Your ISP
DDoS Bots
Bots as Website Reconnaissance
• Website Vulnerability Scanners
> Powered by bots
> Crawl websites searching for security flaws
> Typically used by website owners
> Provide operators with a list of website vulnerabilities
> Can also be used by Hackers
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.18
List of
Vulnerabilities
Websites Have Many Vulnerabilities
96% of web applications
have vulnerabilities
96%
WEB
APP
Sources: Cenzic, Inc. – Feb. 2014, Incapsula, Inc. –2013
13% of websites can be
compromised automatically
13%
The Impact Of Site Scraping Bots
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.20
Types of Scraping - Site Scraping
• Site Scraping is when a bot visits a website to copy or steal
content
• Usually done by reading and parsing web page source code
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.21
Your Site Their Site
<!DOCTYPE
<HTML>
<HEAD>
<TITLE>…
Your Code Your Content
Types of Scraping - Database Scraping
• Database Scraping is when bots enter all possible parameters into an
application to retrieve content from a database
> Example of an car Insurance site
- Male, 25, Honda $X / Month
- Male, 25, Toyota $Y / Month
- Male, 25, Ferrari $Z / Month
• Can be used to steal intellectual property, underwriting, pricelists,
customer lists, etc.
Bot
Your DB
Content
Your Site Your DB
Sanctioned Uses for Site Scraping
• Obtaining or Distributing Public information
> Weather data
> Government data
> Economic data
• Aggregator Sites
> Travel Sites
> Shopping Aggregators
> Hotel booking
> Concert Tickets
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.23
How Site Scraping Can Hurt Your Business
• Site Scraping can lead to IP theft or Competitive Disadvantage
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.24
Randy's Rental Car
$30/day $35/day $45/day
$50/day $65/day $85/day
Competitor Rental Car
$29/day $34/day $44/day
$49/day $64/day $84/day
Identifying and Mitigating Bots
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.25
Inspecting Website Traffic for Bots
• Static approach:
> Structure of web requests
> Header information
> Visitor browser agent info
• Progressive Challenge approach
> Cookies
> JS
> CAPTCHA
• Behavioral Approach
> Order and frequency of requests
> Interaction between clients and servers
> Javascript Injection to actively classify clients
What about using Robots.txt ?!?
• What is Robots.Txt?
> It is list of rules for the bots visiting your website
• Can’t I use it to block bad bots?
> In theory, yes. In reality, no.
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.
27
Bad bots ignore the rules!
Identify and Block Bad Bots
• Implement a solution which can block bad bots to prevent
> Comment Spam
> Site Scraping
> Vulnerability Scanning
> Automated SEO Poisoning
• Maintain site access for good Bots
• Bot Mitigation can be
> Standalone service
> Part of other tools like WAFs
or application delivery controllers
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.28
Website Security and Performance in Minutes with a Simple DNS Change
Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.29
By routing website traffic through the Incapsula network,
malicious traffic is blocked, and legitimate traffic is accelerated.
Incapsula Network Your Website
Legitimate Traffic
For a Free Trial of Incapsula visit us at
www.Incapsula.com
Please send follow up questions to info@incapsula.com
Thank you
31 Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.

More Related Content

What's hot

Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Akamai Technologies
 
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiBig Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiAkamai Technologies
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017Philippe Gamache
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerCiNPA Security SIG
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingCloudflare
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareCybereason
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiAkamai Technologies
 
Taking the Fear out of WAF
Taking the Fear out of WAFTaking the Fear out of WAF
Taking the Fear out of WAFBrian A. McHenry
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionAnant Shrivastava
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 

What's hot (20)

Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
 
Novinky F5 pro rok 2018
Novinky F5 pro rok 2018Novinky F5 pro rok 2018
Novinky F5 pro rok 2018
 
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, AkamaiBig Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
Big Data Intelligence - Or Katz, Akamai and Tsvika Klein, Akamai
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec Primer
 
OWASP Top Ten 2017
OWASP Top Ten 2017OWASP Top Ten 2017
OWASP Top Ten 2017
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Taking the Fear out of WAF
Taking the Fear out of WAFTaking the Fear out of WAF
Taking the Fear out of WAF
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
ClearPass Guest Overview
ClearPass Guest Overview ClearPass Guest Overview
ClearPass Guest Overview
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Viewers also liked

MY Orange Cloud - MyIX Peering Forum 2016
MY Orange Cloud - MyIX Peering Forum 2016MY Orange Cloud - MyIX Peering Forum 2016
MY Orange Cloud - MyIX Peering Forum 2016Jimmy Lim
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...Amazon Web Services LATAM
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...Indonesia Network Operators Group
 
Introduction to Amazon CloudFront - Pop-up Loft Tel Aviv
Introduction to Amazon CloudFront - Pop-up Loft Tel AvivIntroduction to Amazon CloudFront - Pop-up Loft Tel Aviv
Introduction to Amazon CloudFront - Pop-up Loft Tel AvivAmazon Web Services
 
Whole Site Delivery with Amazon CloudFront
Whole Site Delivery with Amazon CloudFrontWhole Site Delivery with Amazon CloudFront
Whole Site Delivery with Amazon CloudFrontAmazon Web Services
 
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)Amazon Web Services
 

Viewers also liked (11)

MY Orange Cloud - MyIX Peering Forum 2016
MY Orange Cloud - MyIX Peering Forum 2016MY Orange Cloud - MyIX Peering Forum 2016
MY Orange Cloud - MyIX Peering Forum 2016
 
CloudFront Partner Webinar
CloudFront Partner WebinarCloudFront Partner Webinar
CloudFront Partner Webinar
 
Business+ DDoS Protection
Business+ DDoS ProtectionBusiness+ DDoS Protection
Business+ DDoS Protection
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...
Usando Amazon CloudFront para aumentar performance, disponibilidade e cache n...
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Cloudflare
CloudflareCloudflare
Cloudflare
 
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
21 - IDNOG03 - Jimmy Halim (Cloudflare) - Brief Introduction of CloudFlare, t...
 
Introduction to Amazon CloudFront - Pop-up Loft Tel Aviv
Introduction to Amazon CloudFront - Pop-up Loft Tel AvivIntroduction to Amazon CloudFront - Pop-up Loft Tel Aviv
Introduction to Amazon CloudFront - Pop-up Loft Tel Aviv
 
Whole Site Delivery with Amazon CloudFront
Whole Site Delivery with Amazon CloudFrontWhole Site Delivery with Amazon CloudFront
Whole Site Delivery with Amazon CloudFront
 
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)
AWS re:Invent 2016: Introduction to Amazon CloudFront (CTD205)
 

Similar to Understanding Web Bots and How They Hurt Your Business

Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityDistil Networks
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
How to clean up travel website traffic from bots and spammers?
How to clean up travel website traffic from bots and spammers?How to clean up travel website traffic from bots and spammers?
How to clean up travel website traffic from bots and spammers?tnooz
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersDistil Networks
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityDistil Networks
 
Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 finalVindicoGroup
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03IABmembership
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27IABmembership
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW
 
SEO Tools For Marketers - Seo tools for you
SEO Tools For Marketers - Seo tools for youSEO Tools For Marketers - Seo tools for you
SEO Tools For Marketers - Seo tools for youUy Hoàng
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountDenim Group
 

Similar to Understanding Web Bots and How They Hurt Your Business (20)

Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
How to clean up travel website traffic from bots and spammers?
How to clean up travel website traffic from bots and spammers?How to clean up travel website traffic from bots and spammers?
How to clean up travel website traffic from bots and spammers?
 
Cleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammersCleaning up website traffic from bots & spammers
Cleaning up website traffic from bots & spammers
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 final
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
 
Toronto mule meetup #5
Toronto mule meetup #5Toronto mule meetup #5
Toronto mule meetup #5
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
 
Spam Wars
Spam WarsSpam Wars
Spam Wars
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
SEO Tools For Marketers - Seo tools for you
SEO Tools For Marketers - Seo tools for youSEO Tools For Marketers - Seo tools for you
SEO Tools For Marketers - Seo tools for you
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
 

More from Imperva Incapsula

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?Imperva Incapsula
 
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
 
D3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesD3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesImperva Incapsula
 
D3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserD3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserImperva Incapsula
 
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationImperva Incapsula
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnImperva Incapsula
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudImperva Incapsula
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityImperva Incapsula
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...Imperva Incapsula
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceImperva Incapsula
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedImperva Incapsula
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveImperva Incapsula
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...Imperva Incapsula
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionImperva Incapsula
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 

More from Imperva Incapsula (20)

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
 
D3TLV17- Keeping it Safe
D3TLV17-  Keeping it SafeD3TLV17-  Keeping it Safe
D3TLV17- Keeping it Safe
 
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
 
D3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesD3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation Techniques
 
D3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserD3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the Browser
 
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
 
D3LDN17 - Keynote
D3LDN17 - KeynoteD3LDN17 - Keynote
D3LDN17 - Keynote
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize Security
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access Control
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery Rules
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
 
Protect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS ProtectionProtect Your Assets with Single IP DDoS Protection
Protect Your Assets with Single IP DDoS Protection
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Understanding Web Bots and How They Hurt Your Business

  • 1. Presented by: Orion Cassetto, Sr. Product Marketing Manager, Incapsula Understanding Web Bots and How They Hurt Your Business
  • 2. Incapsula Webinar •Thanks for joining! •The webinar is about 30 minutes long •Questions will be answered after the session •Please submit your questions using > the chat window >Or tweet them to @orionevolution Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.2
  • 3. Speaker Bio – Orion Cassetto • Sr. Product Marketing Manager for Incapsula • Previously held product marketing positions at Imperva and Armorize Technologies • Experienced in Web app security, and SaaS security solutions • Holds degrees in Asian Studies, and Chinese Language from Washington State University Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.3
  • 4. Overview • An overview of Bot technology • How bots are used for Hacking and Denial of Service Attacks • The Impact of Content Scraping on Websites • Suggestions for Bot detection and Mitigation Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.4
  • 5. What is an Internet Bot? • A bot is a software program that runs automated tasks over the internet • They typically perform simple, repetitive tasks • Are able to operate at a higher rate of speed than humans can achieve Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.5
  • 6. Popular Legitimate Uses for Web Bots Bots tend to visit websites in regular cycles performing tasks like • Search Engine Crawling > Google > Bing > Yandex > Baidu • Website Health Monitoring • Fetching Web Content • Web vulnerability Scanning • Operating APIs (Application Programming Interfaces) Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.6
  • 7. Automated Clients are the Majority of Web Traffic Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.7 Over 61%of all website traffic is non-human. 61.5% Non-Human Traffic 38.5% Human Traffic 1/2 of that is malicious.
  • 8. The Impact of Bots on Website Security • DDoS • Site Scraping • Comment Spam • SEO Spam • Fraud • Vulnerability scanning Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.8 • Search Engine Crawling • Website Health Monitoring • Vulnerability Scanning • Fetching Content • Powering APIs Good Bots Bad Bots
  • 9. Evolution of Bots • Bots are increasingly able to imitate browser and human behavior • Browser-based bots which live inside of infected browsers are becoming more sophisticated Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.9
  • 10. Imposter Google Bots are on the Rise Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.10 Googlebots visit websites an average of 187 times per day 24% of them are fake
  • 11. Imposter Google Bots are on the Rise Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.11 Google Imposter Bots by Activity Type
  • 12. How bots are used for Hacking Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.12
  • 13. Bots and Comment Spam • What is Comment Spam > Posts in comment sections on websites allegedly linking to: - Steams of popular TV shows - Cheap Shoes - Designer bags, etc. • How bots are involved > Bots are used to automatically find victim sites and insert spam posts • Why it matters > Comment spam is frequently responsible for - Worse user experiences - Lower website conversions (links usually exit your site) - Malware distribution (infecting your visitors)
  • 14. Bots and Click Fraud • What is click fraud? > When a person, or automated script imitates a legitimate user of a web browser clicking on a pay-per-click ad • How bots are involved > Bots are created which can click on ads with a rate unachievable by humans • Click fraud can be used as a weapon for - Competitors of advertisers - Competitors of publishers Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.14
  • 15. SEO Referral Spam What is it? 1. Semalt is a Ukrainian search engine optimization (SEO) “company” 2. They used malware to hijack computers and create a giant botnet 3. This Botnet visits sites across the internet with fake referral sources What damage could this cause your website? • Long term SEO Damage to your website’s rankings • Complete search engine result page blacklisting and removal Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.15
  • 16. Bots for Distributed Denial Of Service (DDoS) Attacks • DDoS attack are attacks where many infected computers band together to attack a single target • These attacks exhaust network connections and server resources causing website outages Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.16
  • 17. How DDoS Attacks Impact Site Availability • DDoS attacks make your website completely inaccessible Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.17 Legitimate Traffic Your Site Your Internet Connection • If website availability is important to you, then DDoS protection should be too • Any application without a DDoS mitigation strategy is at risk Your ISP DDoS Bots
  • 18. Bots as Website Reconnaissance • Website Vulnerability Scanners > Powered by bots > Crawl websites searching for security flaws > Typically used by website owners > Provide operators with a list of website vulnerabilities > Can also be used by Hackers Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.18 List of Vulnerabilities
  • 19. Websites Have Many Vulnerabilities 96% of web applications have vulnerabilities 96% WEB APP Sources: Cenzic, Inc. – Feb. 2014, Incapsula, Inc. –2013 13% of websites can be compromised automatically 13%
  • 20. The Impact Of Site Scraping Bots Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.20
  • 21. Types of Scraping - Site Scraping • Site Scraping is when a bot visits a website to copy or steal content • Usually done by reading and parsing web page source code Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.21 Your Site Their Site <!DOCTYPE <HTML> <HEAD> <TITLE>… Your Code Your Content
  • 22. Types of Scraping - Database Scraping • Database Scraping is when bots enter all possible parameters into an application to retrieve content from a database > Example of an car Insurance site - Male, 25, Honda $X / Month - Male, 25, Toyota $Y / Month - Male, 25, Ferrari $Z / Month • Can be used to steal intellectual property, underwriting, pricelists, customer lists, etc. Bot Your DB Content Your Site Your DB
  • 23. Sanctioned Uses for Site Scraping • Obtaining or Distributing Public information > Weather data > Government data > Economic data • Aggregator Sites > Travel Sites > Shopping Aggregators > Hotel booking > Concert Tickets Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.23
  • 24. How Site Scraping Can Hurt Your Business • Site Scraping can lead to IP theft or Competitive Disadvantage Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.24 Randy's Rental Car $30/day $35/day $45/day $50/day $65/day $85/day Competitor Rental Car $29/day $34/day $44/day $49/day $64/day $84/day
  • 25. Identifying and Mitigating Bots Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.25
  • 26. Inspecting Website Traffic for Bots • Static approach: > Structure of web requests > Header information > Visitor browser agent info • Progressive Challenge approach > Cookies > JS > CAPTCHA • Behavioral Approach > Order and frequency of requests > Interaction between clients and servers > Javascript Injection to actively classify clients
  • 27. What about using Robots.txt ?!? • What is Robots.Txt? > It is list of rules for the bots visiting your website • Can’t I use it to block bad bots? > In theory, yes. In reality, no. Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved. 27 Bad bots ignore the rules!
  • 28. Identify and Block Bad Bots • Implement a solution which can block bad bots to prevent > Comment Spam > Site Scraping > Vulnerability Scanning > Automated SEO Poisoning • Maintain site access for good Bots • Bot Mitigation can be > Standalone service > Part of other tools like WAFs or application delivery controllers Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.28
  • 29. Website Security and Performance in Minutes with a Simple DNS Change Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.29 By routing website traffic through the Incapsula network, malicious traffic is blocked, and legitimate traffic is accelerated. Incapsula Network Your Website Legitimate Traffic For a Free Trial of Incapsula visit us at www.Incapsula.com
  • 30. Please send follow up questions to info@incapsula.com Thank you
  • 31. 31 Incapsula, Inc. / Proprietary and Confidential. All Rights Reserved.

Editor's Notes

  1. Thanks for joining! The webinar is about 30 minutes long Questions will be answered during the session Please submit your questions using the chat window
  2. My name is Orion Cassetto, I am the Sr. Product Marketing Manager at Incapsula Prior to Incapsula, I held product marketing positions at Imperva, and Armorize Technologies. My experience is in Web application Security and Software as a Service solutions.
  3. Today we will be talking about: An overview of Bot technology How bots are used for Hacking and Denial of Service Attacks The Impact of Content Scraping on Websites Suggestions for Bot detection and Mitigation
  4. Let’s begin by discussing what a bot is, and what isn’t. A bot, as pertains to the internet, isn’t a time travelling cyborg assassin sent back in time to kill Sarah Conner. All jokes aside, a bot is an software program which performs some task or function over the internet. They usually perform simple tasks in a highly repetitive and rapid manner, producing results at a speed unobtainable by humans.
  5. Bots are responsible for many small jobs that amount to critical tasks that we take for granted such as populating search engine results. [Click] Bots usually visit websites in regular patterns and do things like checking if websites are online, measuring their speed, and fetching content. They can also be used to scan websites to find security vulnerabilities, which we will talk more about later.
  6. Based on research by the Incapsula team, bots now make up as much as 61% of website traffic. While much of this traffic is legitimate it would be naive to assume that helping facilitate a better internet is all they are up to. Roughly 50% of the automated traffic we analyzed was malicious.
  7. We’ve talked about some of the great things that automated clients on the internet are responsible for like populating search engine results, powering APIs or application programming interfaces, and finding security flaws in our website code. But what about the bad bots? The malicious ones? What exactly are they up to and how does it affect websites? [Click] Bad bots are responsible for a host of malicious activity including: Site scraping to steal website content Comment spam which you commonly see on blogs and forums Fraud And even web application attacks. By blocking bad bots, website owners can significantly improve the security posture of their website. It is important to keep in mind that blocking good bots would be very disadvantageous to websites and thus, care should be to taken to create an ecosystem that is both bot friendly and also free of malicious automated clients.
  8. Over the last two decades, bots have evolved from simple scripts with minimal capabilities to complex programs which are sometimes able to convince websites and their security precautions that they are humans. According to Incapsula research, almost 30% of bots can now accept cookies and almost 1% of them are able to run Javascript. One example of highly sophisticated bot is that of browser-based bots. These bots exist within infected browsers and can thus perform all of the tasks the browser could. They can do so with access to the cookies and sessions available to that browser. This makes them a powerful tool for hackers looking to bypass security protocols that would identify a less sophisticated bot.
  9. Another example of how far bots have evolved is that of fake googlebots. A recent study published by the Incapsula labs found that an average website is visited by 187 Googlebots per day and each Googlebot visit averages 4 pages per visit. Of these Googlebot visits, 1 in 24 visits will be from a fake Googlebot.
  10. Why would a hacker create a fake google bot? Many websites are designed to permit google bots into areas of a website which other bots may not normally be able to access. It’s somewhat akin to bot version of a fake ID, or a backstage pass. Like you might expect, imposter google bots are typically up to no good. They usually perform malicious tasks like attacking websites, performing marketing intelligence, stealing webpage content, posting comment spam, and a host of other unwanted activities.
  11. Now that we’ve spent some time reviewing the basics of bots, I want to shift the focus of our discussion to how they are used for hacking.
  12. If you’ve spent any amount of time on blog sites or forums, you’ll likely have noticed suspicious looking posts for sneakers, designer bags, Viagra, Cialis etc. [click] This is comment spam and it is typically put there by purpose built bots which seek out websites which accept user comment and are not designed to defend against submissions made by automated clients. [click] Comment spam, while more of a nuisance than anything else does have several negative affects on web sites. From the user point of view these posts are annoying and result in a worse website viewing experience. They can also direct visitors of to potentially malicious sites where they may be infected with Malware. From the website operator point of view they drive traffic away from their websites, can link to competitors’ websites, and are burdensome to identify and clean off of comment sections.
  13. Another type of automated attack typically performed by bots is Clickfruad. Clickfraud is the act of illegitimately clicking on pay per click ads. Clickfraud is an insidious, and commonly overlooked weapon which usually manifests itself in two forms: Clickfraud as performed by competitors of advertisers, or by competitors of ad publishers (by publisher I mean the website showing the ad. When performed by Competitors of advertisers, bots are created which click on ads a high rate of speed thus forcing the advertisers to pay for fake ads which are never seen by humans. When performed by competitors of publishers click fraud seeks to making it appear that the owner has written a bot to click on their own ads. This would generally be in breach of contract with the ad networks and result in being banned as a publisher. For websites dependent on ad revenue this can be devastating.
  14. Another major bot related security issue is Search engine optimization (or SEO as it’s know) referral spam. An Excellent case study for SEO referral spam is that of Semalt, which happened earlier this year. Semalt is a Ukrainian based “SEO” Company which recently launched an enormous referral spam campaign. The campaign utilized a network of some 290,000 malware infected computers (also known as a botnet), to crawl the internet looking for vulnerable targets and then attacking them. [Click] Once a victim was found, the botnet visited them with a fake referral source. These referral sources belong to websites that Semalt was paid to improve search engine rankings for. Referral links are one of the criteria which Google uses to evaluate search engine rankings. When googles crawls the victim websites it will notice all of these fake referral links in the public logs of these websites and then increase the SEO ranking of Semalt’s “clients”. Why does that matter for you or any website owner? This referral spam needs to be identified and blocked because the presence of fake SEO referrals can cause long term damage to your website’s Search engine results and can result in complete blacklisting or removal from page results. Being blacklisted from Google search results would clearly have a large negative impact on your website.
  15. Another rising bot-related threat is the DDoS attack. DDoS stands for distributed Denial of Service and it is a type of attack where hundreds or thousands of infected computers band together into a single weapon, referred to as a “bot net”. This botnet is then used to attack a single target with the goal of overwhelming the network or server it is using, thus creating a website outage. DDoS attacks are quickly becoming a favorite weapon for attackers because they are relatively cheap to perform and difficult to defend against. One interesting campaign that happened earlier this year around February and March targeted high profile SaaS companies such as Meetup and Basecamp. These SaaS companies have built successful online applications that can scale to support million of users and deliver huge amounts of content. Still all of these examples, and many more, were brought down with DDoS attacks. It is frequently the case that DDoS attackers will request ransom for small amounts of money, like a couple hundred dollars in exchange for ending the attack and restoring the website’s availability. Although the dollars amount requested may be small, these attacks are typically large enough to bring down any company that does not have an active DDoS mitigation solution in place.
  16. Lets take a look at how DDoS attacks work, and the role Bots play in them. [Click] This network diagram shows an example of traffic flowing under normal conditions. Website visitors are routed across the internet, through a customer’s Internet service provider and to the destination website. Data is then sent back along this route to the website visitor. DDoS attacks interrupt this flow by overwhelming a internet connection or internet connected device. [Click] A common type of DDoS attack called a volumetric attack does this by banding together hundreds of thousands of infected computers into a botnet (short for bot network). Then using this botnet to attack a single target. On the way to the target website, the volume of this bot generated traffic becomes so immense that it cannot fit through the internet connection the web owner has purchased from it’s ISP. The result is that no legitimate web traffic will be able to use this conduit and thus the website will appear offline until the attack subsides. [Click] If website availability is important to you, then DDoS protection should be too [click] Any application without a DDoS mitigation strategy is at risk. DDoS mitigation is tricky to deal with because the volume and complexity of the attacks requires specialized tools or services to mitigate it.
  17. Bots can also be used as powerful reconnaissance tools for hackers. Web vulnerability scanners are programs which use special bots to crawl through a website and find security flaws. Typically these tools are used by website owners on their own websites with the goal of finding and fixing vulnerabilities in their applications. In the hands of hackers these tools turn into a weapon which is pointed at websites which they do not own. Combined with a web crawler, hackers can create tools which are able to troll the internet looking for vulnerable websites.
  18. Now that we know that hackers can use automated tools to find websites with vulnerabilities, you might be asking what chance is there than your website or application has such a vulnerability. According to a report by Cenzic, a leading vulnerability scanner – 96% of today’s web apps have vulnerabilities and 13% of websites can be compromised automatically. http://www.darkreading.com/vulnerabilities---threats/websites-harbor-fewer-flaws-but-most-have-at-least-one-serious-vulnerability/d/d-id/1139670?
  19. We’ve talked about several nefarious things that bots do to compromise the security of victim websites. One such activity is so wide spread it warrants its own discussion, that being Site Scraping. Over the next few slides we will explore what site scraping is, how it works, and why it’s a problem for website owners.
  20. The most common type of scraping is called site scaping. The goal of this activity is to copy or steal webpage content for use elsewhere. This repurposing of content may or may not be approved by the website owner. Typically bots do this by crawling a website, accessing the source code of the website and then parsing it to remove the key pieces of data they want. After obtaining content, they typically post it elsewhere on the internet.
  21. A more advanced type of scraping is database scraping. Conceptually this is similar to site scraping except that hackers will create a bot which interacts with a victims application to retrieve data from its database. Think about a website such as an insurance quoting website. A bot could be created which would try all possible combinations in an application to obtain quote prices for all scenarios. For example it could tell the application it was a 25 year old male trying to get a quote for a Honda, then for a Toyota, then a Ferrari. Each time I would get a different result back from the application. Given enough tries, It could be possible to obtain entire datasets. Clearly with the number of permutations available in this scenario, a bot would be preferable to a human. [Click] Database scraping can be used to steal intellectual property, price lists, customer lists, underwriting, etc.
  22. Scraping isn’t always malicious. There are many cases where the goal for data owners is to simply propagate data to as many people as possible. For example, many government websites provide data which is intended to be consumed by the general public. This data is frequently available over APIs but sometimes scrapers must be employed to gather that data. Another example of sites which may be powered by bots include aggregation websites such as travel sites, hotel booking websites, concert ticket websites and many others. Bots which distribute content form these sites, whether they obtain this content via an API or by scaping, tend to drive traffic toward the data owners’ websites. In this case bots may function as a critical part of their business model.
  23. Site scraping can be a powerful tool. In the right hands, it helps automate the gathering and spread of information. In the wrong hands, it can lead to the theft of intellectual property or an unfair competitive edge. [click] Consider the case of a rental car agency, if one company a created a bot which regularly checked the price of its competitor and slightly undercut them at every price point, it would have a competitive advantage. This lower price would appear in all aggregator sites which compare both companies, and would likely result in more care rental conversions and higher search engine rankings. When considering what to do with bots, its’ important to fully assess the impact of a specific bot before deciding whether or not to allow it to access your website. Does this automated client add or subtract value to your business? Is it driving traffic toward your webite, or away from your site?
  24. We’ve spent time talking about what bots are, how they are used for hacking and site scraping, now we will begin to discuss how to identify and mitigate them.
  25. The most effective way to identify bots is to use a specialized tool. Bot mitigation tools typically employ one or more of the following approaches: The static approach looks at readily available information about web visitors. This usually includes the structure of web requests, header information, browser agent info, and several other criteria. [Click] Another approach is a challenge-based approach, this checks to see what kind of support the visitor has. Most humans run an environment to browse the internet which is capable of supporting cookies and JavaScript. For visitors who are not, a CAPTCHA can be presented, thus providing humans a way to confirm their humanity. [click] Lastly, a behavioral approach can be taken. This will look at how a visitor is interacting with a website. It could include assessing how quickly and in what order a visitor is requesting information, and how it is interacting with the webserver. JavaScript injection can also be used to actively test clients for things like keyboard strokes and mouse clicks, which are typically indicative of humans. All of the information is then combined to determine whether or not a website visitor is human, to classify it by visiting purpose.
  26. A common thought is that Robots.txt can be used to protect against bad bots. Let’s look into what Robots.txt is, and what it’s capable of. First off, robots.txt is a list of rules which bots visiting a website are supposed to obey. Legitimate bots, including search engines like google carry these orders out. Bad bots on the other hand, ignore the rules. [click] If you knew the specific client of a bot, you could use robots.text to block it, but for the most part robots.txt is not a good tool for blocking against malicious bots. Instead it should be thought of as a tool to dictate what the good bots on your website are doing.
  27. In conclusion, Bad bots are responsible for a large number of serious security threats to websites. Website operators can greatly enhance their site’s security posture by analyzing traffic for bots, identifying malicious clients, and blocking them while maintaining site access for good bots. The easiest way to do this is through the use of third party tools which are commonly available as either stand alone products are as part of other solutions such as Web Application firewalls, or application delivery controllers.
  28. In closing I want to tell you briefly how Incapsula can help. Incapsula is a cloud based service that secures and accelerates websites. It works by using DNS redirection to route website traffic through the Incapsula Network. Once traffic is flowing through Incapsula, malicious traffic and bad bots are blocked, and legitimate traffic is accelerated. This leads to a more secure, faster loading website. For a free trial of Incapsula, visit us at www.incapsula.com