SlideShare a Scribd company logo
The bot-mitigation solution offered by Verizon helped StubHub identify and block bots performing scraping
and helped reduce transaction fraud and account takeovers.
Marty Boss
Senior Director, Technology Operations, StubHub
0
20
40
60
80
100
A powerful bot-mitigation solution for
accurate web-application protection
19% of traffic are really bad bots causing problems
A “bot” is an automated program that runs on the internet. Although many
bots are designed to be helpful and useful, a rapidly growing number of bots
are created with malicious purposes. These bad bots are created by hackers,
unethical competitors and fraudsters who use them to exploit businesses
in countless ways, including: scanning for vulnerabilities, stealing content,
abusing account credentials, stealing personal data, and causing denial of
service to your web applications.
Verizon Digital Media Services’ bot-mitigation solution is integrated into our
effective multi-layer defense approach.
Its purpose is to address all bot problems included in the OWASP Automated Threat Handbook,
plus defend against advanced, persistent bots that attack, abuse and exploit your web applications.
Key benefits
•	 Protect your web application by stopping bad bots
•	 Secure your APIs against abuse, misuse and user errors
•	 Obtain accurate analytics free of bad data generated
by bots
•	 Create great user experiences with fast web-application
load times
•	 Lower infrastructure costs by eliminating unnecessary
bot traffic
Bad bots
19%
Good bots
27%
Humans
54%
Average website
traffic distribution
Verizon bot mitigation | Overview
Skewed analytics Downtime Digital ad fraud API abuse
Web scraping Security breach Spam Online fraud
Accurate protection
Firewalls, WAFs and IDS systems were never designed
to stop and manage the volume, variety and sophistication
of today’s bots and botnets. The Verizon difference? Ease
of use and accuracy. Our bot-mitigation solution features
self-optimizing protection that blocks 99.9% of malicious
bots without impacting legitimate users. Quickly fine-tune
your own settings, and enjoy complete control over how
you manage bots and use the service.
White-glove support
We provide a dedicated team of security analysts that
fine-tunes your implementation and manages the bot-
mitigation program on your behalf. This includes real-time
threat detection and response and post-incident reporting,
ensuring you stay one step ahead of your adversaries.
Known Violators Database
Real-time updates from the world’s largest Known Violators
Database of bad bot Hi-Def fingerprints is based on the
collective intelligence of all Verizon-protected sites. In
addition, we curate real-time threat intelligence feeds from
third-party fraud, spam, malware and proxy lists, all of which
are updated and used to protect you in real time.
Challenges and browser validation
We validate that a browser is exactly what it claims to be,
and through challenges and deep interrogation, we make
sure the browser is being used by a human, not a bot. Even
browser automation tools like Selenium and PhantomJS
can’t escape our detection.
Inline Hi-Def device fingerprinting
This feature analyzes over 200 attributes of information from
each client request. Hi-Def fingerprints stick to the bot even
if it attempts to reconnect from random IP addresses or hide
behind an anonymous proxy.
Device-based rate limiting
Rate limiting is based on our Hi-Def Fingerprints, not IP
addresses. Predictive analytics show you how your traffic
will be affected when dialing up or down rate limits, such as
pages per minute, pages per session and session length.
Universal access control list
Save time creating whitelists and blacklists by using our
Universal Access Control List. Quickly create a policy, then
apply it to a specific domain, URL/path, API or across your
entire account.
API security
Our API security tracks API clients and monitors acceptable
usage, acting as an automatic shield against API hijacking,
scraping and abuse. It’s also an insurance policy against
developer errors and integration bugs.
Behavioral modeling and machine learning
Machine-learning algorithms pinpoint behavioral anomalies
specific to your site’s unique traffic patterns. We also
proactively predict a bot based on correlating dozens of
dynamic classifications, which is in comparison to the reactive
approach inherent in most Web Application Firewalls (WAFs).
We also offer an enterprise WAF that boasts unprecedented
agility, with rule updates that are applied globally in two to five
minutes – up to 900 percent faster than comparable products.
Edgecast Content Delivery Network
Our enterprise CDN leverages a more efficient, centralized
distribution architecture that’s optimized for today’s internet.
We’ve built a highly interconnected global network, featuring
massive bandwidth capacity and advanced caching and
acceleration strategies. We also embrace best-in-class,
open-source technologies and fast-routing IP Anycast
technology for powerful, lightning-fast performance that
spans the globe.
Physical or virtual appliance
Enjoy premium security out of the box thanks to:
•	 Easily install on virtualized or bare metal appliance(s)
•	 Seamlessly integrate with CDNs, load balancers and
other network infrastructure
•	 Automatically obtain new bad-bot fingerprints via
a heartbeat up to the cloud
Our multiple deployment options don’t require changes to your underlying web infrastructure and won’t impede current
or future integrations.
Why Verizon Digital Media Services
Flexible deployment
Contact us
info@verizondigitalmedia.com
1.877.334.3236
www.verizondigitalmedia.com
Trustedbytheworld’smostsuccessfulwebsites

More Related Content

PPTX
API Abuse - The Anatomy of An Attack
PPTX
What is Account Takeover - An Introduction to Web Fraud
PPTX
The Quiet Rise of Account Takeover
PDF
Jump-Start The MASVS
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PDF
OWASP Mobile Top 10 Deep-Dive
PDF
Mobile App Hacking In A Nutshell
PDF
BAI Security - Brochure - Compromise Assessment
API Abuse - The Anatomy of An Attack
What is Account Takeover - An Introduction to Web Fraud
The Quiet Rise of Account Takeover
Jump-Start The MASVS
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Mobile Top 10 Deep-Dive
Mobile App Hacking In A Nutshell
BAI Security - Brochure - Compromise Assessment

What's hot (19)

PDF
Owasp Top 10
PPTX
Web Application Firewall (WAF) DAST/SAST combination
PPT
Owasp Top 10
PPT
Owasp top 10 & Web vulnerabilities
PDF
12 palo alto app-id concept
PPTX
Web application security
PDF
DataMindsConnect2018_SECDEVOPS
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
PPTX
Open APIs: Security for Mobile and the Cloud
PDF
Mobile Defense-in-Dev (Depth)
PPTX
Owasp 2017 oveview
PDF
How to get deeper administration insights into your tenant
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PPT
You Can't Spell Enterprise Security without MFA
PPTX
Owasp top 10 security threats
PDF
Web application security
PDF
FortiWeb
PDF
Owasp top 10
PDF
Point-Of-Sale Hacking - 2600Thailand#20
Owasp Top 10
Web Application Firewall (WAF) DAST/SAST combination
Owasp Top 10
Owasp top 10 & Web vulnerabilities
12 palo alto app-id concept
Web application security
DataMindsConnect2018_SECDEVOPS
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Open APIs: Security for Mobile and the Cloud
Mobile Defense-in-Dev (Depth)
Owasp 2017 oveview
How to get deeper administration insights into your tenant
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
You Can't Spell Enterprise Security without MFA
Owasp top 10 security threats
Web application security
FortiWeb
Owasp top 10
Point-Of-Sale Hacking - 2600Thailand#20
Ad

Similar to Verizon DMS' Bot Mitigation from Paul Hobbs (20)

PDF
New generation of Internet Cyber Security
PDF
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
PDF
HTTP Brute Force Mitigation Playbook Bot Profile for Brute Force Mitigations ...
PDF
Paul hobbs @ Verzon Digital Media Services
PPTX
Fight bad bot on the internet
PDF
Distil Networks Protecting the Telephony Industry
PPTX
PPTX
Cyber security fundamentals
PPTX
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
PPTX
Cyber Security 101
PPTX
ip pier solution
PPTX
Keeping up with the Revolution in IT Security
PDF
Bot Protection Strategies In The Latest Web Scraping Services_.pdf
PPTX
A DevOps Guide to Web Application Security
PDF
Rtp rsp16-distil networks-final-deck
PDF
Taking the Fear out of WAF
PDF
How To Protect Your Website From Bot Attacks
PPTX
Bot marketting
PDF
PPTX
Secure your environment with UiPath and CyberArk technologies - Session 1
New generation of Internet Cyber Security
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
HTTP Brute Force Mitigation Playbook Bot Profile for Brute Force Mitigations ...
Paul hobbs @ Verzon Digital Media Services
Fight bad bot on the internet
Distil Networks Protecting the Telephony Industry
Cyber security fundamentals
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Cyber Security 101
ip pier solution
Keeping up with the Revolution in IT Security
Bot Protection Strategies In The Latest Web Scraping Services_.pdf
A DevOps Guide to Web Application Security
Rtp rsp16-distil networks-final-deck
Taking the Fear out of WAF
How To Protect Your Website From Bot Attacks
Bot marketting
Secure your environment with UiPath and CyberArk technologies - Session 1
Ad

Recently uploaded (20)

PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPT
Ethics in Information System - Management Information System
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Digital Literacy And Online Safety on internet
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Database Information System - Management Information System
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
SAP Ariba Sourcing PPT for learning material
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Slides PDF The World Game (s) Eco Economic Epochs.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Ethics in Information System - Management Information System
An introduction to the IFRS (ISSB) Stndards.pdf
Paper PDF World Game (s) Great Redesign.pdf
Exploring VPS Hosting Trends for SMBs in 2025
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Digital Literacy And Online Safety on internet
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Unit-1 introduction to cyber security discuss about how to secure a system
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Sims 4 Historia para lo sims 4 para jugar
newyork.pptxirantrafgshenepalchinachinane
Database Information System - Management Information System
Power Point - Lesson 3_2.pptx grad school presentation
INTERNET------BASICS-------UPDATED PPT PRESENTATION
SAP Ariba Sourcing PPT for learning material
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证

Verizon DMS' Bot Mitigation from Paul Hobbs

  • 1. The bot-mitigation solution offered by Verizon helped StubHub identify and block bots performing scraping and helped reduce transaction fraud and account takeovers. Marty Boss Senior Director, Technology Operations, StubHub 0 20 40 60 80 100 A powerful bot-mitigation solution for accurate web-application protection 19% of traffic are really bad bots causing problems A “bot” is an automated program that runs on the internet. Although many bots are designed to be helpful and useful, a rapidly growing number of bots are created with malicious purposes. These bad bots are created by hackers, unethical competitors and fraudsters who use them to exploit businesses in countless ways, including: scanning for vulnerabilities, stealing content, abusing account credentials, stealing personal data, and causing denial of service to your web applications. Verizon Digital Media Services’ bot-mitigation solution is integrated into our effective multi-layer defense approach. Its purpose is to address all bot problems included in the OWASP Automated Threat Handbook, plus defend against advanced, persistent bots that attack, abuse and exploit your web applications. Key benefits • Protect your web application by stopping bad bots • Secure your APIs against abuse, misuse and user errors • Obtain accurate analytics free of bad data generated by bots • Create great user experiences with fast web-application load times • Lower infrastructure costs by eliminating unnecessary bot traffic Bad bots 19% Good bots 27% Humans 54% Average website traffic distribution Verizon bot mitigation | Overview Skewed analytics Downtime Digital ad fraud API abuse Web scraping Security breach Spam Online fraud
  • 2. Accurate protection Firewalls, WAFs and IDS systems were never designed to stop and manage the volume, variety and sophistication of today’s bots and botnets. The Verizon difference? Ease of use and accuracy. Our bot-mitigation solution features self-optimizing protection that blocks 99.9% of malicious bots without impacting legitimate users. Quickly fine-tune your own settings, and enjoy complete control over how you manage bots and use the service. White-glove support We provide a dedicated team of security analysts that fine-tunes your implementation and manages the bot- mitigation program on your behalf. This includes real-time threat detection and response and post-incident reporting, ensuring you stay one step ahead of your adversaries. Known Violators Database Real-time updates from the world’s largest Known Violators Database of bad bot Hi-Def fingerprints is based on the collective intelligence of all Verizon-protected sites. In addition, we curate real-time threat intelligence feeds from third-party fraud, spam, malware and proxy lists, all of which are updated and used to protect you in real time. Challenges and browser validation We validate that a browser is exactly what it claims to be, and through challenges and deep interrogation, we make sure the browser is being used by a human, not a bot. Even browser automation tools like Selenium and PhantomJS can’t escape our detection. Inline Hi-Def device fingerprinting This feature analyzes over 200 attributes of information from each client request. Hi-Def fingerprints stick to the bot even if it attempts to reconnect from random IP addresses or hide behind an anonymous proxy. Device-based rate limiting Rate limiting is based on our Hi-Def Fingerprints, not IP addresses. Predictive analytics show you how your traffic will be affected when dialing up or down rate limits, such as pages per minute, pages per session and session length. Universal access control list Save time creating whitelists and blacklists by using our Universal Access Control List. Quickly create a policy, then apply it to a specific domain, URL/path, API or across your entire account. API security Our API security tracks API clients and monitors acceptable usage, acting as an automatic shield against API hijacking, scraping and abuse. It’s also an insurance policy against developer errors and integration bugs. Behavioral modeling and machine learning Machine-learning algorithms pinpoint behavioral anomalies specific to your site’s unique traffic patterns. We also proactively predict a bot based on correlating dozens of dynamic classifications, which is in comparison to the reactive approach inherent in most Web Application Firewalls (WAFs). We also offer an enterprise WAF that boasts unprecedented agility, with rule updates that are applied globally in two to five minutes – up to 900 percent faster than comparable products. Edgecast Content Delivery Network Our enterprise CDN leverages a more efficient, centralized distribution architecture that’s optimized for today’s internet. We’ve built a highly interconnected global network, featuring massive bandwidth capacity and advanced caching and acceleration strategies. We also embrace best-in-class, open-source technologies and fast-routing IP Anycast technology for powerful, lightning-fast performance that spans the globe. Physical or virtual appliance Enjoy premium security out of the box thanks to: • Easily install on virtualized or bare metal appliance(s) • Seamlessly integrate with CDNs, load balancers and other network infrastructure • Automatically obtain new bad-bot fingerprints via a heartbeat up to the cloud Our multiple deployment options don’t require changes to your underlying web infrastructure and won’t impede current or future integrations. Why Verizon Digital Media Services Flexible deployment Contact us info@verizondigitalmedia.com 1.877.334.3236 www.verizondigitalmedia.com Trustedbytheworld’smostsuccessfulwebsites