IDENTIFYING DEVICES MUST GO BEYOND THE IP ADDRESS
Four device identification methods
IP ADDRESS ONLY
BASIC BROWSER FINGERPRINT
THE FALSE POSITIVE EFFECT
Distil Networks analyzed how many devices are invisible when using each of the four identification methods. Each invisible device is a potential false positive because it shares the same ID as another device using that identification method.
|UNIQUE DEVICES IDENTIFIED|
|UNIQUE DEVICES INVISIBLE TO THIS IDENTIFICATION METHOD|
|BLOCK BAD BOTS WITH CERTAINTY?||NO
TOO MANY FALSE POSITIVES!
|Source: Distil Networks Data Science Fingerprinting Study - October 2016
Sample size: 378,894,368
The Rise of the Bot
As reported on Network Computing, advanced persistent bots use deception & evasion to avoid detection.
Other content in this Stream
Gambling and Gaming Sites See the Most Bad Bot Traffic
Over half (53.1%) the traffic on gambling and gaming websites comes from bad bots. Only 46.8% of traffic on these websites was human. What are these bad bots doing on gambling sites?
Russia is the Most Blocked Country
With most bad bot traffic emanating from data centers, it’s no surprise that the US remains the bad bot superpower. But Russia became the most blocked country by Distil customers in 2017.
Volumetric vs. Low and Slow Account Takeover Attacks
WIthin our new Threat Research report on The Anatomy of Account Takeover Attacks, we see bad bot traffic on 100% of all monitored login pages.
PSD2's API Wave Will Pump up the Security Risk
Banks are digitizing at a rapid pace to catch up with upstart fintech providers. Such rapid evolution can run the risk of introducing vulnerabilities.
Ecommerce Websites are a Major Target for Bad Bots
Bad bots makeup 21.4% of traffic on ecommerce sites. When you consider the goals of any bot operator it is easy to understand why ecommerce websites suffer from bot problems.
Infographic: Anatomy of Account Takeover Attacks
In this account takeover study, Distil Networks now sees bad bot traffic on 100% of all monitored login pages. View this infographic for more information.
The Anatomy of Account Takeover Attacks
The Distil Research Lab released their latest threat research report called The Anatomy of Account Takeover Attacks revealing that bad bots are on every website with a login page. Even yours.
9 Recommendations to Prevent Bad Bots on Your Website
Bots are on your website every day. Every site is targeted for different reasons, and usually by different methods, so there is no one-size-fits-all bot defense solution. Here are some recommendations
Distil’s Bad Bot Report 2018: The Year Bad Bots Went Mainstream
This report is the bot mitigation industry’s leading study and analyzes hundreds of billions of bad bot requests to provide insight into the impact of bad bots on business today.
Anatomy of GiftGhostBot
This infographic shows how the GiftGhostBot works, it's profile, scale and who it effects. Learn about this bad bot and how to detect and stop it.
New Year, New Threat: OWASP Denial of Inventory (OAT-021)
Last month, OWASP released an updated version of their Automated Threat Handbook that includes Denial of Inventory (OAT-021).
Full Transcript and Video: GiftGhostBot Explained
Distil's Edward Roberts, Director of Product Marketing and Anna Westilius, Senior Director of Security explain GiftGhostBot, a sophisticated bot attack on gift card balances.
The Rise Of Machine Learning In Fraud Detection
These days, automated attacks, and the speed with which attackers can modify their techniques to avoid detection, continue to put pressure on rule-based systems.
How to Block Bots From a Website
Bots can appear as normal users, with an IP address, browser and header data, and other seemingly identifiable information. But dig a bit deeper by collecting and reviewing in-depth analytics and othe
Distil Networks-Akamai Integration
The Distil Networks-Akamai Integration Guide, which provides general instructions for integrating Distil with Akamai’s CDN.
Biggest Holiday Season Concerns from Today’s Ecommerce Executives
Some serious threats to this are distributed intelligent crawling and DDoS attacks. This is especially a concern as it can severely stress your infrastructure during an already high traffic period.
The Dark Side of Vulnerability Scanning
Vulnerability scanners are used by security teams to find holes. But there’s a flip side - they can be used just as effectively (or even more so) by the “bad guys.”
Distil Networks: Block Bad Bots and Improve Web Security
Rami Essaid, Distil Networks’ CEO and co-founder, takes just three minutes to run through how Distil Networks can protect your web applications from bad bots, API abuse, and fraud.
Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”
Rami Essaid CEO of Distil Networks Interviewed on BizTalkRadio’s “The Big Biz Show”.
Stop Bots From Bypassing Captcha With Distil Networks