Web apps are attacked one out of three days, report says
A typical Web application gets attacked 137 times in 59 separate days during a six-month period, Imperva says
IDG News Service - A typical Web application is the target of an attack at least one in three days on average, according to a report released by data security firm Imperva.
The third edition of Imperva's semi-annual Web Application Attack Report (WAAR), released on Tuesday, is based on an analysis of Internet traffic collected from 50 publicly available Web applications between December 2011 and May 2012. Imperva determined that a typical Web application experienced 59 "battle days" -- days in which at least one attack incident occurred -- during the six-month period.
Many of the monitored applications differed in size and purpose, and most of them were hosted in the U.S. and the European Union, said Amichai Shulman, Imperva's chief technology officer.
Imperva found that for a typical Web application the median number of attack incidents recorded during a six-month period was 137.
An attack incident was defined by the company as a burst of malicious traffic that exceeded a rate of 30 attack requests per five minutes.
This method of counting attacks was significantly different than the one used by the company for its previous WAAR reports, which focused on the total number of attack requests.
The worst case seen by the company involved an application that experienced 1,383 attack incidents spanning 141 battle days, or 80 percent of the days in the six-month period.
The typical attack incident had a magnitude of 195 requests and lasted almost 8 minutes, Imperva said in its report. However, the worst incident lasted 10 times longer than that and involved 8,790 attack requests.
The new methodology of interpreting data revealed that SQL injection (SQLi) was the attack technique most commonly used. The median number of SQLi attacks experienced by a typical Web application was 17.5 and in the worst case it was 320.
This is a significant change, because previous WAAR reports placed cross-site scripting (XSS) and directory traversal attacks ahead of SQLi attacks in terms of frequency.
The new methodology allowed the company's researchers to see things in a different way, Shulman said. "While the number of individual requests for cross-site scripting and directory traversal is higher than for SQL injection, in reality, the number of attacks in which SQL injection is involved is higher."
However, given what other security vendors have reported in the past, the efficiency of SQLi attacks is somewhat questionable. For example, Verizon said in its 2012 Data Breach Investigations Report that SQL injection was used in only 3 percent of data breach incidents.
It's possible that SQL injection, while the most popular attack technique, is not the most successful one, Shulman said. However, "I find it hard to believe that attackers are wasting so much energy over SQL injection if it's not proving to be successful," he said.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center... All Cybercrime and Hacking White Papers | Webcasts