Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/24/2019
03:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cloudflare Introduces 'Bot Fight Mode' Option for Site Operators

Goal is to help websites detect and block bad bot traffic, vendor says.

Content delivery network Cloudflare has launched a new feature that it says will help users of its services prevent malicious bots from scraping their websites, stealing credentials, misusing APIs, or launching other attacks.

Starting this week, site operators now have the option to turn on a "bot fight mode" in the firewall settings of their Cloudflare dashboards. When enabled, Cloudflare will begin "tarpitting" any automated bots on their sites it detects as being bad or malicious. It will also attempt to have the IP from which the bot originated kicked offline.

Tarpitting is a technique that some cloud service providers use to increase the cost of a bot attack to bot operators. Some tarpits work by significantly delaying responses to a bad bot request or by sending bots down blind alleys in the same way honeypots for malware work.

In Cloudflare's case, when its security mechanisms detect traffic coming from a malicious bot, it deploys CPU-intensive code that slows down the bot and forces the bot writer to expend more CPU cycles, increasing costs for them in the process.

To identify whether a bot is bad, Cloudflare analyzes data from a variety of sources, including its Gatebot DDoS mitigation system and from the over 20 million sites that use its service. The company looks at data such as abnormally high page views or bounce rates, unusually high or low session durations, and spikes in traffic from unexpected locations to automatically detect bad bots. According to Cloudflare, its bot detection mechanisms challenge some 3 billion bot requests per day.

"Tarpitting is taking measures to slow down the attack first rather than block it outright," a Cloudflare spokeswoman says. Blocking outright allows a bot to move onto another target quickly, she says. "Tarpitting allows us to impact the bot by wasting some of its time and resources," she adds. An example of this would be requiring the bot to solve a very computationally heavy math challenge, the spokeswoman notes.

The Bad Bot Problem
Such measures have become crucial because of the high and growing proportion of Internet traffic comprised of automated bots. Not all of them are malicious. Many bots, such as those used by search engines to crawl the Web or those used to monitor website metrics or for copyright violations, serve useful and often critical functions.

However, many more are used for malicious and other potentially unwanted purposes, such as for credential stuffing attacks, submitting junk data via online forms, scraping content, or breaking into user accounts. Sometimes even bots that are considered legitimate to use — such as inventory hoarding bots that lockup a retailer or ticketing website's inventory — can be a major problem.

A Distil Networks report earlier this year described nearly 38% of all Internet traffic in 2018 as comprising automated bots — both bad and good. Bad bots alone accounted for a startling 20.4% of all traffic on the Internet last year.

"Depending on the business of the organization, the problem can range from problematic to some parts of the business, such as stuffing sales leads on a website, to absolutely crippling, [such as] inventory hoarding and outright theft," the Cloudflare spokeswoman says.

Current approaches of blocking are effective in preventing one bot from attacking one website, but they do little to prevent the bot from just moving on to a softer target. "The intention of bot fight mode is to make bots spend more time and resources before being able to move on," the spokeswoman noted.

In addition to tarpitting, Cloudflare will also work to have any IP that is sending out bad bots shut down. If the provider hosting the bot happens to be a partner, Cloudflare will hand over the IP to the partner. If the provider is not a partner, Cloudfare will still notify them of the bad IP while continue to tarpit any traffic that originates from it.

Franklyn Jones, chief marketing officer at Cequence Security, says one reason for the high proportion of bad bots is the ease with which they can be deployed. "Launching an automated bot attack is a surprisingly simple process," Jones says. "It requires only previously stolen credentials, software to plan and orchestrate the launch, and a proxy infrastructure to scale and obfuscate the attack."

Because the total price tag could be just a few hundred dollars, bad actors see this strategy as a path of least resistance, he says. A survey that Osterman Research conducted on behalf of Cequence last year found that average enterprise organizations experience some 530 botnet attacks daily.

"These automated attacks have many goals, including account takeover, fake account creation, gift card fraud, content scraping, and other application business logic abuse," Jones says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "'Playing Around' with Code Keeps Security, DevOps Skills Sharp."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.