"Our report shows that businesses can greatly reduce the number of successful attacks against their organizations by identifying and blocking attack sources that are known to target multiple sites or applications. We've found that these attack sources are responsible for a disproportionate amount – up to six times – of the attack traffic affecting businesses. The only way to identify these types of attack sources, though, is by sharing attack data among the community," said Amichai Shulman, CTO, Imperva. "This report highlights the need for early identification of these types of attack sources and payloads across a community of web applications, so that organizations can leverage shared intelligence to better protect themselves and reduce risk."
As part of the report, Imperva researchers analyzed the behavior of the most common web application attacks (SQL injection, remote and local file inclusion, and comment spam attacks) over time and across targets, cross-referencing the three most prevalent attack characteristics (attack source, payload, and tool), against known attack signatures.
Highlights from this report include:
· Multiple targets are responsible for a disproportionate amount of attack traffic. SQL attackers targeting multiple sources generated nearly six times their share of the population in the report and accounted for 17% of all attacks, while spam attackers generated four times their share of the population in the report and multiple target RFI attackers generated nearly two times their share of the population, amounting to 56% and 73% of total attacks respectively.
· Crowd-sourcing increases community protection against large-scale attacks. Multiple attacking sources and payloads gradually cover more and more targets, thus affecting larger parts of the community. Identifying a "noisy" attack source - an attacker, payload or tool that repeatedly attacks – is important. Security cooperation between organizations that suffer from Web attacks can create a "network effect" in which all members of the cooperating community can benefit by exchanging security and threat information.
"Sharing security information is desirable from an industry perspective in order to enhance collective intelligence via collaboration on defense matters," said Dan Blum, vice president and distinguished analyst at Gartner in a July 2012 reported titled Decision Point for Anti-malware.
To download the full Imperva report, please click here.
Get up-to-date security insights on the Imperva Data Security blog.
Imperva is a pioneer and leader of a new category of business security solutions for critical applications and high-value data in the data center. Imperva's award-winning solutions protect against data theft, insider abuse, and fraud while streamlining regulatory compliance by monitoring and controlling data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications. With over 2,200 end-user customers in more than 60 countries and thousands of organizations protected through cloud-based deployments, securing your business with Imperva puts you in the company of the world's leading organizations. For more information, visit www.imperva.com, follow us on Twitter or visit our blog.