Overview
Syllabus
ABOUT DATADOME
AUTOMATED THREATS
AGENDA
BOTS & HACKERS TARGET THE WEAKEST LINK
PERFECT BROWSERS/APPS
REAL DEVICES
SINGLE-REQUEST ATTACKS
1/3 OF BAD BOTS USE RESIDENTIAL PROXIES
HOW DO THEY ACCESS CLEAN PROXIES?
HUMANS TO THE RESCUE
BOT SAAS SERVICES ARE NOT NEW
LUMINATI BECAME BRIGHT DATA
THE DATADOME BOT DETECTION ENGINE
DATADOME R&D REPORT
DETECT BROWSER AUTOMATION
STACKED MODEL PREDICTION
HOW TO APPLY ML FOR BOT DETECTION
SOLUTION
ONGOING ATTACK DETECTION
AVAILABLE DATA
INFERRING MALICIOUS FINGERPRINTS
BLOCKING PATTERN GENERATION (2)
SAFE BLOCKING PATTERNS
RESULTS: 28K MALICIOUS LOGIN ATTEM BLOCKED
KEY TAKEAWAYS
Taught by
OWASP Foundation