Redwood Shores, Calif, 02 May 2013
Imperva (NYSE: IMPV), a pioneer and leader of a new category of business security solutions for critical applications and high-value business data in the data centre, today released its April Hacker Intelligence Initiative report: "Get What You Give: The Value of Shared Threat Intelligence", which analysed real-world attack traffic against 60 Web applications between January and March 2013 to identify common attack patterns.
According to the report, businesses can reduce the risk of successful attacks against their organisations by identifying and blocking attack sources, payloads and tools that are found to target multiple Web sites or organisations. These attack sources made up a disproportionate amount of the overall traffic against enterprise organisations in the report, and can be identified only by analysing crowd-sourced attack data from a broader community.
"Our report shows that businesses can greatly reduce the number of successful attacks against their organisations by identifying and blocking attack sources that are known to target multiple sites or applications. We've found that these attack sources are responsible for a disproportionate amount - up to six times - of the attack traffic affecting businesses. The only way to identify these types of attack sources, though, is by sharing attack data among the community," said Amichai Shulman, CTO, Imperva. "This report highlights the need for early identification of these types of attack sources and payloads across a community of Web applications, so that organisations can leverage shared intelligence to better protect themselves and reduce risk."
As part of the report, Imperva researchers analysed the behaviour of the most common Web application attacks (SQL injection, remote and local file inclusion, and comment spam attacks) over time and across targets, cross-referencing the three most prevalent attack characteristics (attack source, payload, and tool), against known attack signatures.
Highlights from this report include:
* Multiple targets are responsible for a disproportionate amount of attack traffic. SQL attackers targeting multiple sources generated nearly six times their share of the population in the report and accounted for 17% of all attacks, while spam attackers generated four times their share of the population in the report and multiple target RFI attackers generated nearly two times their share of the population, amounting to 56% and 73% of total attacks respectively.
* Crowd-sourcing increases community protection against large-scale attacks. Multiple attacking sources and payloads gradually cover more and more targets, thus affecting larger parts of the community. Identifying a "noisy" attack source - an attacker, payload or tool that repeatedly attacks - is important. Security co-operation between organisations that suffer from Web attacks can create a "network effect" in which all members of the co-operating community can benefit by exchanging security and threat information.
"Sharing security information is desirable from an industry perspective in order to enhance collective intelligence via collaboration on defence matters," said Dan Blum, vice-president and distinguished analyst at Gartner, in a July 2012 reported titled: "Decision Point for Anti-Malware".
To download the full Imperva report, please click here.
Get up-to-date security insights on the Imperva Data Security blog.
Share