The importance of crowd-sourced threat intelligence
Posted on 23 April 2013.
Imperva analyzed real-world attack traffic against 60 web applications between January and March 2013 to identify common attack patterns.


Businesses can reduce the risk of successful attacks against their organizations by identifying and blocking attack sources, payloads and tools that are found to target multiple websites or organizations.

These attack sources made up a disproportionate amount of the overall traffic against enterprise organizations in the report, and can be identified only by analyzing crowd-sourced attack data from a broader community.

“Our report shows that businesses can greatly reduce the number of successful attacks against their organizations by identifying and blocking attack sources that are known to target multiple sites or applications. We’ve found that these attack sources are responsible for a disproportionate amount – up to six times – of the attack traffic affecting businesses. The only way to identify these types of attack sources, though, is by sharing attack data among the community,” said Amichai Shulman, CTO, Imperva.

“This report highlights the need for early identification of these types of attack sources and payloads across a community of web applications, so that organizations can leverage shared intelligence to better protect themselves and reduce risk,” Shulman added.

Imperva researchers analyzed the behavior of the most common web application attacks (SQL injection, remote and local file inclusion, and comment spam attacks) over time and across targets, cross-referencing the three most prevalent attack characteristics (attack source, payload, and tool), against known attack signatures.

Multiple targets are responsible for a disproportionate amount of attack traffic. SQL attackers targeting multiple sources generated nearly six times their share of the population in the report and accounted for 17% of all attacks, while spam attackers generated four times their share of the population in the report and multiple target RFI attackers generated nearly two times their share of the population, amounting to 56% and 73% of total attacks respectively.

Crowd-sourcing increases community protection against large-scale attacks. Multiple attacking sources and payloads gradually cover more and more targets, thus affecting larger parts of the community. Identifying a “noisy” attack source - an attacker, payload or tool that repeatedly attacks – is important. Security cooperation between organizations that suffer from Web attacks can create a “network effect” in which all members of the cooperating community can benefit by exchanging security and threat information.





Spotlight

New Zeus variant targets users of 150 banks

Posted on 19 December 2014.  |  A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Dec 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //