Web applications are attacked one out of three days, report says
- 07 August, 2012 16:13
A typical Web application is the target of an attack at least one in three days on average, according to a report released by data security firm Imperva.
The third edition of Imperva's semi-annual Web Application Attack Report (WAAR), released on Tuesday, is based on an analysis of Internet traffic collected from 50 publicly available Web applications between December 2011 and May 2012. Imperva determined that a typical Web application experienced 59 "battle days" -- days in which at least one attack incident occurred -- during the six-month period.
Many of the monitored applications differed in size and purpose, and most of them were hosted in the U.S. and the European Union, said Amichai Shulman, Imperva's chief technology officer.
Imperva found that for a typical Web application the median number of attack incidents recorded during a six-month period was 137.
An attack incident was defined by the company as a burst of malicious traffic that exceeded a rate of 30 attack requests per five minutes.
This method of counting attacks was significantly different than the one used by the company for its previous WAAR reports, which focused on the total number of attack requests.
The worst case seen by the company involved an application that experienced 1,383 attack incidents spanning 141 battle days, or 80 percent of the days in the six-month period.
The typical attack incident had a magnitude of 195 requests and lasted almost 8 minutes, Imperva said in its report. However, the worst incident lasted 10 times longer than that and involved 8,790 attack requests.
The new methodology of interpreting data revealed that SQL injection (SQLi) was the attack technique most commonly used. The median number of SQLi attacks experienced by a typical Web application was 17.5 and in the worst case it was 320.
This is a significant change, because previous WAAR reports placed cross-site scripting (XSS) and directory traversal attacks ahead of SQLi attacks in terms of frequency.
The new methodology allowed the company's researchers to see things in a different way, Shulman said. "While the number of individual requests for cross-site scripting and directory traversal is higher than for SQL injection, in reality, the number of attacks in which SQL injection is involved is higher."
However, given what other security vendors have reported in the past, the efficiency of SQLi attacks is somewhat questionable. For example, Verizon said in its 2012 Data Breach Investigations Report that SQL injection was used in only 3 percent of data breach incidents.
It's possible that SQL injection, while the most popular attack technique, is not the most successful one, Shulman said. However, "I find it hard to believe that attackers are wasting so much energy over SQL injection if it's not proving to be successful," he said.
Another interesting finding was that the highest number of SQL injection requests originated in France and not the U.S., which is the primary source of other types of attacks like remote file inclusion, directory traversal or local file inclusion.
Some attack types have a well-known geographic bias, Shulman said. For example, many email scraping attacks originate from African countries and comment spam attacks are commonly launched from Eastern Europe and Russia.
However, the fact that a large number of SQL injection attacks originated from France is unusual, Shulman said. "It's the first time we've seen this kind of geolocation bias for SQL injection and I don't have the answer yet [for why it happened]."
Shulman speculated that it might be harder to get abusive servers shut down in France than in other European countries or that attackers might prefer to use Internet Protocol addresses from a country like France, which is not commonly associated with malicious Internet traffic. However, these are just theories, he said.
Imperva tried to use a number of statistical methods to find patterns in the timing of the attacks and actually concluded that they can't be predicted, Shulman said. "The fact that you've been attacked today doesn't say anything about what is going to happen tomorrow."
Companies need to be prepared to protect their Web applications at all times and should be prepared to do so against the worst attacks, not just the average ones, he said.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Australia Post’s mail business to lose $200 million this year
Australia Post’s mail business to lose $200 million this year
Microsoft's ambivalence about Office on the Web gives Apple shot with iWork on iCloud
3 Lessons Learned From a Failed Customer Feedback Test
Online shopping reaches mainstream status
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Benefits of Deploying Microsoft Exchange Server 2010 on Dell Compellent with Data Progression
Messaging and collaboration platforms have emerged as mission critical applications, consuming a large portion of IT spending for organisations. The rich features in these applications have significantly changed the messaging requirements and needs of today’s information from anywhere with any device, the result is an ever increasing demand on storage systems both in terms of capacity and bandwidth. Many organisations are rethinking their storage strategies to meet the demanding criteria and to handle the future requirements. Read more.
Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals