IDENTIFYING DEVICES MUST GO BEYOND THE IP ADDRESS
Four device identification methods
IP ADDRESS ONLY
BASIC BROWSER FINGERPRINT
THE FALSE POSITIVE EFFECT
Distil Networks analyzed how many devices are invisible when using each of the four identification methods. Each invisible device is a potential false positive because it shares the same ID as another device using that identification method.
|UNIQUE DEVICES IDENTIFIED|
|UNIQUE DEVICES INVISIBLE TO THIS IDENTIFICATION METHOD|
|BLOCK BAD BOTS WITH CERTAINTY?||NO
TOO MANY FALSE POSITIVES!
|Source: Distil Networks Data Science Fingerprinting Study - October 2016
Sample size: 378,894,368
The Rise of the Bot
As reported on Network Computing, advanced persistent bots use deception & evasion to avoid detection.
Other content in this Stream
New Year, New Threat: OWASP Denial of Inventory (OAT-021)
Last month, OWASP released an updated version of their Automated Threat Handbook that includes Denial of Inventory (OAT-021).
Full Transcript and Video: GiftGhostBot Explained
Distil's Edward Roberts, Director of Product Marketing and Anna Westilius, Senior Director of Security explain GiftGhostBot, a sophisticated bot attack on gift card balances.
The Rise Of Machine Learning In Fraud Detection
These days, automated attacks, and the speed with which attackers can modify their techniques to avoid detection, continue to put pressure on rule-based systems.
How to Block Bots From a Website
Bots can appear as normal users, with an IP address, browser and header data, and other seemingly identifiable information. But dig a bit deeper by collecting and reviewing in-depth analytics and othe
Gartner Report: How to Build an Effective API Security Strategy
An API security strategy that manages access and protects systems from attack while still engaging digital ecosystems is essential to any API program.
Distil Networks-Akamai Integration
The Distil Networks-Akamai Integration Guide, which provides general instructions for integrating Distil with Akamai’s CDN.
Biggest Holiday Season Concerns from Today’s Ecommerce Executives
Some serious threats to this are distributed intelligent crawling and DDoS attacks. This is especially a concern as it can severely stress your infrastructure during an already high traffic period.
The Dark Side of Vulnerability Scanning
Vulnerability scanners are used by security teams to find holes. But there’s a flip side - they can be used just as effectively (or even more so) by the “bad guys.”
Distil Networks: Block Bad Bots and Improve Web Security
Rami Essaid, Distil Networks’ CEO and co-founder, takes just three minutes to run through how Distil Networks can protect your web applications from bad bots, API abuse, and fraud.
Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”
Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”.
Stop Bots From Bypassing Captcha With Distil Networks
With the launch of Distil CAPTCHA, Distil customers have access to a modern CAPTCHA that’s harder for bots to bypass and easier for humans to solve.
Five Rules of Exceptional Customer Support
If you run a support team, at some point in your career you will encounter a critical customer impacting event. Have a game plan and good people in place and you will steer your company through.
Find Out If Bad Bots Are Gaming Your Websites And Apps
Gaming websites are one of the prime targets for bad bot attacks, so we recently took a closer look at the particular risks faced by these and other vulnerable businesses in an interactive webinar.
[Gartner Report] Begin Investing Now in Enhanced Machine-Learning Capabilities for Fraud Detection
Cut through the hype about machine learning and AI to make sound investment decisions in threat intelligence and website security. Distil Networks brings you a complimentary Gartner report.
Web Scraping Protection And The Wide Open Web
The world wide web is estimated to hold almost 50 billion indexed pages. These are pages that are accessible via search engines and therefore open to all.
Google Admitted Advertisers Paid for Ads Served to Bots
Google made a major announcement on August 28, saying it will provide refunds to advertisers whose ads were presented to bot traffic.
Overview of Bot Mitigation and Anti Scraping Services
There are a number of anti scraping services that can be taken to control web scrapers, some more effective than others.
Brute Force Attacks And The Non Human Internet
There are many reasons for wanting to takeover accounts and many types of accounts to takeover. These brute force attacks can be prevented, with the right understanding and security measures.
Five Ways Your Competition is Using Price Scraping Bots on Your E-commerce Site
Price scraping has made online retail incredibly competitive and unsafe. These are the two stark realities that have emerged for online retailers.
10 Ways Bad Bots Hurt Your Website