Imperva Report Details Automated Web Application Attacks
Research Shows High Percentage of Remote File Inclusion and SQL Injection Attacks Are Automated(PresseBox) (Redwood Shores, CA, )
Automatic tools generally enable hackers to attack more applications and exploit vulnerabilities more efficiently than manual methods. Automatic tools available online save hackers the trouble of studying vulnerabilities and learning how to exploit them.
"Using automated software tools, even an unskilled attacker can attack applications in a short period of time, potentially collect valuable data and move on to the next target," said Amichai Shulman, CTO, Imperva. "Automated tools can be used to evade an enterprise's security defenses."
Highlights from Automation of Attacks include:
Automation Identification Methods - Traffic characteristics, such as attack rate, attack rate change and attack volume, can be used to identify automated attacks. Imperva provides detailed analysis of these characteristics.
Automated Attack Trends - Automated tools can leave 'fingerprints' or patterns that can be extracted from the source code to identify an automated attack with high certainty. Imperva analyzes common code strings and parameters of these tools.
Automated Attack Mitigation - Imperva provides analysis of multiple real-world attack vectors, highlighting characteristics security professionals can use to define malicious traffic, enabling black lists of suspected IP addresses.
To download the full report, please visit: http://www.imperva.com/...
Get up to date security news at the Imperva Data Security blog: www.blog.imperva.com
Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc.