IDENTIFYING DEVICES MUST GO BEYOND THE IP ADDRESS
Four device identification methods
IP ADDRESS ONLY
BASIC BROWSER FINGERPRINT
THE FALSE POSITIVE EFFECT
Distil Networks analyzed how many devices are invisible when using each of the four identification methods. Each invisible device is a potential false positive because it shares the same ID as another device using that identification method.
|UNIQUE DEVICES IDENTIFIED|
|UNIQUE DEVICES INVISIBLE TO THIS IDENTIFICATION METHOD|
|BLOCK BAD BOTS WITH CERTAINTY?||NO
TOO MANY FALSE POSITIVES!
|Source: Distil Networks Data Science Fingerprinting Study - October 2016
Sample size: 378,894,368
The Rise of the Bot
As reported on Network Computing, advanced persistent bots use deception & evasion to avoid detection.
Other content in this Stream
Mobile Bots: The Next Evolution of Bad Bots
The Distil Research Lab released their latest threat research report called Mobile Bots: The Next Evolution of Bad Bots revealing that sophisticated bot operators now implement a new technique.
[Infographic] Mobile Bots: The Next Evolution of Bad Bots
In this mobile bots study, Distil Networks now sees 5.8% of all mobile devices on cellular networks are used in bad bot attacks.
Transcript Of Enterprise Security Weekly with Rami Essaid
Founder of Distil Networks, Rami Essaid is a passionate entrepreneur who has been building companies for over a decade. Read the transcript of Enterprise Security Week’s talk with Rami Essaid.
Airlines Have a Major Bad Bot Problem
Airlines suffer from automated abuse from bad bots in a major way. 43.9% of all traffic on airlines websites came from bad bots. Humans accounted for only 55.2% of traffic.
Gambling and Gaming Sites See the Most Bad Bot Traffic
Over half (53.1%) the traffic on gambling and gaming websites comes from bad bots. Only 46.8% of traffic on these websites was human. What are these bad bots doing on gambling sites?
Russia is the Most Blocked Country
With most bad bot traffic emanating from data centers, it’s no surprise that the US remains the bad bot superpower. But Russia became the most blocked country by Distil customers in 2017.
Volumetric vs. Low and Slow Account Takeover Attacks
WIthin our new Threat Research report on The Anatomy of Account Takeover Attacks, we see bad bot traffic on 100% of all monitored login pages.
2017 WFiT Scholarship Recipient: Jenny Ramirez
Meet 2017 recipient Jenny Calderon. Beginning as a child her passion for discovering “how things work” encouraged her studies in the STEM field. Learn more about her path!
PSD2's API Wave Will Pump up the Security Risk
Banks are digitizing at a rapid pace to catch up with upstart fintech providers. Such rapid evolution can run the risk of introducing vulnerabilities.
Ecommerce Websites are a Major Target for Bad Bots
Bad bots makeup 21.4% of traffic on ecommerce sites. When you consider the goals of any bot operator it is easy to understand why ecommerce websites suffer from bot problems.
Infographic: Anatomy of Account Takeover Attacks
In this account takeover study, Distil Networks now sees bad bot traffic on 100% of all monitored login pages. View this infographic for more information.
The Anatomy of Account Takeover Attacks
The Distil Research Lab released their latest threat research report called The Anatomy of Account Takeover Attacks revealing that bad bots are on every website with a login page. Even yours.
9 Recommendations to Prevent Bad Bots on Your Website
Bots are on your website every day. Every site is targeted for different reasons, and usually by different methods, so there is no one-size-fits-all bot defense solution. Here are some recommendations
Distil’s Bad Bot Report 2018: The Year Bad Bots Went Mainstream
This report is the bot mitigation industry’s leading study and analyzes hundreds of billions of bad bot requests to provide insight into the impact of bad bots on business today.
Anatomy of GiftGhostBot
This infographic shows how the GiftGhostBot works, it's profile, scale and who it effects. Learn about this bad bot and how to detect and stop it.
New Year, New Threat: OWASP Denial of Inventory (OAT-021)
Last month, OWASP released an updated version of their Automated Threat Handbook that includes Denial of Inventory (OAT-021).
Full Transcript and Video: GiftGhostBot Explained
Distil's Edward Roberts, Director of Product Marketing and Anna Westilius, Senior Director of Security explain GiftGhostBot, a sophisticated bot attack on gift card balances.
The Rise Of Machine Learning In Fraud Detection
These days, automated attacks, and the speed with which attackers can modify their techniques to avoid detection, continue to put pressure on rule-based systems.
How to Block Bots From a Website
Bots can appear as normal users, with an IP address, browser and header data, and other seemingly identifiable information. But dig a bit deeper by collecting and reviewing in-depth analytics and othe
Distil Networks-Akamai Integration