140 likes | 335 Views
The Smartest Way to Protect Websites and Web Apps from Attacks. Who is Attacking You ?. “ Within 20 minutes , ….we were looking at the activity taking place on our Web applications. ”. Keir Asher Senior Technical Analyst Brown Printing. “ 10% of our traffic was…malicious.”.
E N D
The SmartestWay to Protect Websites and Web Apps from Attacks
Who is Attacking You? “Within 20 minutes, ….we were looking at the activity taking place on our Web applications.” Keir Asher Senior Technical AnalystBrown Printing “10% of our traffic was…malicious.”
Traditional Security Thinking Bot Nets Targeted Scanners • Reliance on signatures • Static attack surface • No understanding of attackers • Reactive IP Scanners Manual Hacking
Deception Provides Many Benefits • Early detection of attackers • Makes attack surface unreliable • Always runs as an IPS
Hacker Threats Targeted Scans Scripts & Tools Script Kiddie Library Attacks Targeted Scan IP Scan Generic scripts and tools against one site. Targets a specific site for any vulnerability. Script run against multiple sites seeking a specific vulnerability. Botnet Human Hacker Advanced Persistent Threat (APT) Script loaded onto a bot network to carry out attack. Sophisticated, targeted attack (APT). Low and slow to avoid detection. JAN JUNE DEC
Mykonos Security ApplianceDeception-based Security • Track • Profile • Respond • Detect • Real-time attacker profiling Intelligent and deceptive response Landmine apps with behavioral trip wires Track individual attackers and scripts
Detection by Deception Tar Traps Query String Parameters Network Perimeter Hidden Input Fields Client Firewall Database App Server Server Configuration
Track Attackers Beyond the IP Track IP Address • Track Browser Attacks • Persistent TokenCapacity to persist in all browsers including various privacy control features. • Track Software and Script Attacks • FingerprintingHTTP communications.
Smart Profiling of Attackers • Every attacker assigned a name • Incident history • Attacker threat level
Deceive and Prevent All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat.
Security Administration • Web-based console • Real-time • On-demand threat information • SMTP alerting • Reporting (Pdf, HTML) • CLI for exporting data into SIEM tool
Unified Protection Across Platforms Internal App Server Database Virtualized Cloud