Contact
QR code for the current URL

Story Box-ID: 502490

Imperva Inc. 3400 Bridge Parkway, Suite 101 94065 Redwood Shores, CA, United States http://www.imperva.com
Contact Ms Darshna Kamani +44 20 7183 2839
Company logo of Imperva Inc.
Imperva Inc.

Imperva Report Details Automated Web Application Attacks

Research Shows High Percentage of Remote File Inclusion and SQL Injection Attacks Are Automated

(PresseBox) (Redwood Shores, CA, )
Imperva, Inc. (NYSE: IMPV), a pioneer and leader of a new category of data security solutions for high-value business data in the data center, today released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. According to Imperva's research from January - March 2012, as much as 98 percent of Remote File Inclusion (RFI) attacks are automated, and as much as 88 percent of SQL injection attacks are automated, including by two software tools: Havij and sqlmap.

Automatic tools generally enable hackers to attack more applications and exploit vulnerabilities more efficiently than manual methods. Automatic tools available online save hackers the trouble of studying vulnerabilities and learning how to exploit them.

"Using automated software tools, even an unskilled attacker can attack applications in a short period of time, potentially collect valuable data and move on to the next target," said Amichai Shulman, CTO, Imperva. "Automated tools can be used to evade an enterprise's security defenses."

Highlights from Automation of Attacks include:

Automation Identification Methods - Traffic characteristics, such as attack rate, attack rate change and attack volume, can be used to identify automated attacks. Imperva provides detailed analysis of these characteristics.

Automated Attack Trends - Automated tools can leave 'fingerprints' or patterns that can be extracted from the source code to identify an automated attack with high certainty. Imperva analyzes common code strings and parameters of these tools.

Automated Attack Mitigation - Imperva provides analysis of multiple real-world attack vectors, highlighting characteristics security professionals can use to define malicious traffic, enabling black lists of suspected IP addresses.

To download the full report, please visit: http://www.imperva.com/...

Get up to date security news at the Imperva Data Security blog: www.blog.imperva.com

Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc.

Imperva Inc.

Imperva is a pioneer and leader of a new category of data security solutions for high-value business data in the data center. With more than 1,700 end-user customers and thousands of organizations protected through cloud-based deployments, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders. The award-winning Imperva SecureSphere identifies and secures high-value data across file systems, web applications and databases. For more information, visit www.imperva.com, follow us on Twitter or visit our blog.

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2024, All rights reserved

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.