Главная
Study mode:
on
1
ABOUT DATADOME
2
AUTOMATED THREATS
3
AGENDA
4
BOTS & HACKERS TARGET THE WEAKEST LINK
5
PERFECT BROWSERS/APPS
6
REAL DEVICES
7
SINGLE-REQUEST ATTACKS
8
1/3 OF BAD BOTS USE RESIDENTIAL PROXIES
9
HOW DO THEY ACCESS CLEAN PROXIES?
10
HUMANS TO THE RESCUE
11
BOT SAAS SERVICES ARE NOT NEW
12
LUMINATI BECAME BRIGHT DATA
13
THE DATADOME BOT DETECTION ENGINE
14
DATADOME R&D REPORT
15
DETECT BROWSER AUTOMATION
16
STACKED MODEL PREDICTION
17
HOW TO APPLY ML FOR BOT DETECTION
18
SOLUTION
19
ONGOING ATTACK DETECTION
20
AVAILABLE DATA
21
INFERRING MALICIOUS FINGERPRINTS
22
BLOCKING PATTERN GENERATION (2)
23
SAFE BLOCKING PATTERNS
24
RESULTS: 28K MALICIOUS LOGIN ATTEM BLOCKED
25
KEY TAKEAWAYS
Description:
Explore the intricacies of detecting malicious bots using machine learning in this 23-minute OWASP Foundation conference talk. Delve into the challenges posed by sophisticated bot developers who design software to bypass detection systems, including their use of perfect browsers, mobile apps, and headless browsers. Learn about the complex techniques employed by bad bots, such as manipulating HTTP headers, changing browser fingerprints, and utilizing residential IPs. Discover the inner workings of a modern bot detection engine, including the collection and enrichment of server-side and client-side signals. Examine the challenges of authenticating good bots and detecting frameworks like Puppeteer extra stealth, Playwright, Selenium, and Headless Chrome. Gain insights into machine learning approaches for bad bot detection, with a focus on combining supervised and unsupervised techniques for maximum predictive accuracy. Understand key concepts such as automated threats, single-request attacks, residential proxies, and ongoing attack detection through real-world examples and case studies. Read more

Temporal - Bot or Human? Detecting Malicious Bots with Machine Learning in 2021

OWASP Foundation
Add to list
0:00 / 0:00