Imperva Report Details Automated Web Application Attacks
Research Shows High Percentage of Remote File Inclusion and SQL Injection Attacks Are Automated
(PresseBox) (Redwood Shores, CA, )Imperva, Inc. (NYSE: IMPV), a pioneer and leader of a new category of data security solutions for high-value business data in the data center, today released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. According to Imperva's research from January - March 2012, as much as 98 percent of Remote File Inclusion (RFI) attacks are automated, and as much as 88 percent of SQL injection attacks are automated, including by two software tools: Havij and sqlmap.
Automatic tools generally enable hackers to attack more applications and exploit vulnerabilities more efficiently than manual methods. Automatic tools available online save hackers the trouble of studying vulnerabilities and learning how to exploit them.
"Using automated software tools, even an unskilled attacker can attack applications in a short period of time, potentially collect valuable data and move on to the next target," said Amichai Shulman, CTO, Imperva. "Automated tools can be used to evade an enterprise's security defenses."
Highlights from Automation of Attacks include:
Automation Identification Methods - Traffic characteristics, such as attack rate, attack rate change and attack volume, can be used to identify automated attacks. Imperva provides detailed analysis of these characteristics.
Automated Attack Trends - Automated tools can leave 'fingerprints' or patterns that can be extracted from the source code to identify an automated attack with high certainty. Imperva analyzes common code strings and parameters of these tools.
Automated Attack Mitigation - Imperva provides analysis of multiple real-world attack vectors, highlighting characteristics security professionals can use to define malicious traffic, enabling black lists of suspected IP addresses.