When the digital mice get smarter so must the digital mousetrap

F5 Ecosystem | November 12, 2019

Businesses Need a Smarter Mousetrap to Catch Next-Generation Attacks

In ancient times, mice were a nuisance. Their presence could have a very negative impact at many levels, from material damages to millions of deaths caused by plague. In the modern times of an internet economy, we are plagued by a new type of nuisance.

Cyber-attacks are the equivalent of mice and they, too, can have a wide range of negative impacts on businesses.

There are myriad attacks organizations must fend off. Some are merely a nuisance, degrading network performance or disrupting availability. Some others may be relatively rare but have far more serious impacts in the form of data breaches. Like the plagues spread by mice that wiped out cities, attacks today wipe out brand reputations and business value.

But there is another flourishing category of attacks that camouflage themselves so well that they create an entirely new parallel class of professional opportunity that thrives off other businesses.

These are ‘automated attacks,’ also known as ‘bots.’ The OWASP group has excellent documentation of a wide variety of these automated and difficult to detect attacks that abuse business use cases.

A classic example of this type of attack are ‘sneaker bots’—these bots automatically purchase all shoes, a.k.a. sneakers, on sale or new styles as they are introduced and then sell them on secondary markets, precluding legitimate customers from benefitting from these promotions. Web scraping is another popular variant that gathers pricing data from the competition for most online services like ticketing, hotel booking, rental cars and so on. Apart from gathering business intel, these automated attempts significantly increase traffic to the applications themselves. In one such instance, an airline customer found themselves struggling to service requests, only to later find out that 70% of the traffic was bot-driven instead of from legit customers. Not only do these attacks impact the top line, but they also add overhead in terms of capacity planning and the total cost of running the business. In subsequent posts, we will explore these types of attacks in details. For now, it’s enough to recognize that these attacks are unique but share the same goal: to create a parallel business model that thrives on their targets. The goal of the attacker here is to not disrupt the business but to siphon financial gains.

What sets these attacks apart from traditional attacks is they are almost indistinguishable from legitimate user traffic and perceived as ‘good’ traffic by firewalls, IPS, sandbox threat detectors, and other inline security devices. Traditional attack vectors focus on exploiting application vulnerabilities resulting from insecure coding practices. This new class of automated attacks do not rely on vulnerabilities. Instead, they attack the fact that the application is typically optimized for the best digital customer experience and thus are easily exploited through automated methods. As organizations progress through the three phases of digital transformation, adopting business models that align more closely with the digital economy, the potential for this type of threats is exacerbated.

So, what’s the answer to protect against these very sophisticated and focused set of attacks? Given that every single transaction appears legitimate and similar to other traffic, the only way to detect discrepancies is by looking into metadata analysis to find patterns that can indicate malicious intent. This is where technological advancements in machine learning and analytics provide a solution. Businesses need a smarter digital mousetrap, and we'll dive further into these topics in a future post...

Share

About the Author

Related Blog Posts

At the Intersection of Operational Data and Generative AI
F5 Ecosystem | 10/22/2024

At the Intersection of Operational Data and Generative AI

Help your organization understand the impact of generative AI (GenAI) on its operational data practices, and learn how to better align GenAI technology adoption timelines with existing budgets, practices, and cultures.

Using AI for IT Automation Security
F5 Ecosystem | 12/19/2022

Using AI for IT Automation Security

Learn how artificial intelligence and machine learning aid in mitigating cybersecurity threats to your IT automation processes.

The Commodification of Cloud
F5 Ecosystem | 07/19/2022

The Commodification of Cloud

Public cloud is no longer the bright new shiny toy, but it paved the way for XaaS, Edge, and a new cycle of innovation.

Most Exciting Tech Trend in 2022: IT/OT Convergence
F5 Ecosystem | 02/24/2022

Most Exciting Tech Trend in 2022: IT/OT Convergence

The line between operation and digital systems continues to blur as homes and businesses increase their reliance on connected devices, accelerating the convergence of IT and OT. While this trend of integration brings excitement, it also presents its own challenges and concerns to be considered.

Adaptive Applications are Data-Driven
F5 Ecosystem | 10/05/2020

Adaptive Applications are Data-Driven

There's a big difference between knowing something's wrong and knowing what to do about it. Only after monitoring the right elements can we discern the health of a user experience, deriving from the analysis of those measurements the relationships and patterns that can be inferred. Ultimately, the automation that will give rise to truly adaptive applications is based on measurements and our understanding of them.

Inserting App Services into Shifting App Architectures
F5 Ecosystem | 12/23/2019

Inserting App Services into Shifting App Architectures

Application architectures have evolved several times since the early days of computing, and it is no longer optimal to rely solely on a single, known data path to insert application services. Furthermore, because many of the emerging data paths are not as suitable for a proxy-based platform, we must look to the other potential points of insertion possible to scale and secure modern applications.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us