Legitimate Users & Data-Tables mini DDoS Attacks
Image From #MemorableGraffities #GraffiTips

Legitimate Users & Data-Tables mini DDoS Attacks

Some of the new Millennial attack-vectors, include Inner/Legitimate user actions. These actions can be used to steal data from organizations, or demand ransom after getting control over crucial parts of their system.

Other actions, that are less talked about, are used to maliciously slow or exhaust a web service resources. These attacks are like a small-order DDOS attacks, that don't take the service down, but make it slower for other users or available for less legitimate users by trying to exhaust the DB connections or use costly actions via the API. These attacks are usually going under the radar of most cyber defended platforms, since they don't seem like real attacks. The main idea is to decrease the number of attacking machines by using legitimate resource-consuming actions that statistically, are not meant to happen all at once from many users, or use them more frequently than regular users do.

This kind of attacks enable hackers, or competing companies, to increase the attacked organization's costs on underlying resources in order to serve what they think of as legitimate users.

Many web-services and apps are built in an architecture similar to that below:

Basic web service architecture diagram

From a hacker point of view, no need to waste time on attacking the Front-End (FE) servers, which are load-balanced clusters that can be scaled up easily and monitored, when the DB bottleneck can be slowed easily much better, sometimes from within. The new attack vector behaves like a slow DDoS attack, it's usually not seen as an issue many times, hard to be noticed, and it drains your resources and revenues quietly, all the Time!

By using complicated searches that use many SQL joins, for example, many times in every interval, or starting a lot of movie-downloads and cancelling them in the middle, the service can be slowed down. But... most companies are not even aware of that. That's why hackers and Blondes have more fun ;-)

Some Conclusions:

  • Users-analytics is crucial, not only for increasing ads-revenues/ROI, and reducing costs, but for security aspects as well. Suspicious users are relatively easy to trace by their repeated actions, which show much more than the normal user.
  • Use them as much as possible and build an automatic process to analyze user-actions by previous logs or other means, that can be done separately and independently from the the business platform.
  • Analise your DB requests performance and try to reduce costly SQL events in the main user flows. Other option is to allow costly actions only to premium or privileged users (DB requests to move/delete collections, automatic scanners running every hour, etc.).
  • Too many users are not always good (especially when they are fake... ;-)

Have a great weekend!

Hagay Onn

Amichai Oron

UX/UI SAAS Product Designer & Consultant ?? | Helping SAAS / AI companies and Startups Build Intuitive, Scalable Products.

5 个月

???? ??? ?? ?? ???????? ??? ????? ???? ?????? ???: ?????? ????? ??? ??????? ?????? ??????, ?????? ?????? ??????,?????? ????? ????????. https://chat.whatsapp.com/BubG8iFDe2bHHWkNYiboeU

回复

要查看或添加评论,请登录

Hagay Onn (the Spot)的更多文章

  • ????? ???? ????????

    ????? ???? ????????

    ???? ?????? ?????? ?????? ??? ?????? ???????? ??????? ???? ????? ????????. ???? ?? ??????? ????????, ?? ??????? All…

    3 条评论
  • Yield-Manager

    Yield-Manager

    The first 2 chapters of my 2015 research work for mobile-carriers 1 Introduction Different industries use the term…

    2 条评论
  • 2min Spring Framework Tutorial

    2min Spring Framework Tutorial

    I was asked about Spring today, so I'm sharing here a mini-tutorial about the framework. Have Fun and many Smiles…

    2 条评论
  • Artificial Intelligence News - November 2017

    Artificial Intelligence News - November 2017

    Some #AI news at: https://ai4u.fyi.

    4 条评论
  • 3 Skills That Will Change Your Life, and 3 that might End them...

    3 Skills That Will Change Your Life, and 3 that might End them...

    Life-Changing Skills Breathing - to help you live, move and smell bullshit@! Coffee Drinking - the only way to stay…

    9 条评论
  • Autonomous Cars Integration with Real Drivers

    Autonomous Cars Integration with Real Drivers

    The main issue with Autonomous Cars (ACs), except for security considerations, is how to manage them while regular…

    2 条评论
  • A.I. and Security - is it Human or Bot? maybe Both?

    A.I. and Security - is it Human or Bot? maybe Both?

    Some A.I.

    3 条评论
  • #CartooNews - where the Truth Lies (about her age... ;-)

    #CartooNews - where the Truth Lies (about her age... ;-)

    A collection of my #CartooNews and #TipsForDummies Hashtags from Twitter. #CartooNews - 'cause fake news are never…

    1 条评论
  • Have you REDIS? ;-)

    Have you REDIS? ;-)

    Redis is an In-memory NoSQL Database. It's one of the most popular open-code DBs, since it's very fast (RAM access is…

  • My Nightly Creative Works - collection 2

    My Nightly Creative Works - collection 2

    How to grow Happy Antennas with Sun Beams By NASA: https://ift.tt/27setrc (and remember - a Happy Antenna is half a…

    4 条评论

社区洞察

其他会员也浏览了