Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / How to detect bots: What you need to know

How to detect bots: What you need to know

May 25, 2020 by cbn Leave a Comment

Akamai’s CTO discusses why machine learning and cloud are important when it comes to security breaches, IoT-related attacks, and credential stuffing.

Dan Patterson, a Senior Producer for CBS News and CNET, interviewed Patrick Sullivan, Akamai CTO, Security Strategy,  about how to detect and protect against bots. The following is an edited transcript of the interview.

Dan Patterson: This seems like a fascinating cat-and-mouse game. What are some of the evasion tactics that bot creators or at least bot users deploy? And if I’m an enterprise company, a B2B, or even a political campaign, what are some of the detection methods I might use?

Patrick Sullivan: Catching the really unsophisticated bots, somebody who does not have a great deal of skill, often there are some pretty easy tells there. You may see a small number of IPs generating a huge number of requests–pretty easy to spot those. You can swat those down pretty easily. I think for many years CAPTCHA has been an option for defenders to use. 

At this point, I think this is an area where machine learning on the adversarial side, computers are better at solving CAPTCHA these days than human beings. You can, with a pretty small training set, train a machine to be able to solve a CAPTCHA riddle, and they will become more adept at that than a human being. So that’s a defense that presents a high level of friction to an end user and is not terribly effective against an adversary.

SEE: Security Awareness and Training policy (TechRepublic Premium)

We’ve moved up to looking at things like, if somebody says they’re on a MacBook running a Chrome browser, and we really interrogate that and fingerprint that device, can they run things like JavaScript? Can they do things that a normal device would be able to do if it asserts to be who it is? And you can find things there, but the bots tend to clean that up as well. So we’ve even looked at the TLS signatures. 

As people encrypt communication, there’s a two-way negotiation between the client and the server, which ciphers they’ll accept in both directions. We’ve found that you can get some signal there as to whether something is a bot or a human. Then, as soon as you started to exercise that signal, we saw a massive explosion in randomization of the safer suites that people used.

So these days the most effective area is really around machine learning. Figuring out, based on telemetry, mouse movements, the orientation of a phone, that is harder. It takes a lot more work for an adversary to create a synthetic human-like experience in terms of user input/output compared to a bot. So that tends to be the state of the art today.

Dan Patterson: Speaking of the state of the art, what about the cloud? It seems as though if I’m going to buy a bot kit and deploy it, I probably need a platform on which to deploy it. I could maybe build my own server structure, but it’s probably a lot easier to use the cloud.

Patrick Sullivan: Absolutely. We see tons of requests coming from the cloud that are bots, and that’s true of the good bots and the bad bots. If you think about a lot of the businesses who are providing a service to a website operator, they’re building their bots, their automation on the cloud. So, just because the request is coming from the cloud, it doesn’t necessarily mean that it’s malicious, but it increases your suspicion.

Actually, what we find is part of these bots, and you probably saw this in your exploration, they give you the ability to plug in a network of proxy servers. Really, what happens there is rather than you sending the requests from the bots you operate, you’re able to rent time on a massive army of proxy servers and then the request will actually come from those proxy servers. So when we dig through that and figure out where these proxy servers come from, those tend to be home IoT devices that have very poor security that have been compromised by the millions. 

People monetize those by renting time on those devices and that’s really helpful for the attacker because they can then reduce the rate of request from a single device. They’re coming from a geography that’s wherever they would like to be, they can rent proxy servers that are in the home geography of the users, the native users of that website, so it’s a very effective evasion that you see used. Almost all of the tools that I’m sure you saw there had some ability to plug in a list of proxy servers.

Dan Patterson: Speaking with you is like talking to the past and connecting it to the future. Just a few years ago, we were having conversations about how home IoT and consumer IoT could be hijacked for automated types of attacks that use the cloud, and now you’re telling me that your data shows that this reality has materialized. I think you said that phishing was involved in some of these attacks, is that correct?

Patrick Sullivan: They could be. So when you look at breaches, if you look at the corpus of data of what breaches occurred in 2018 and then what was the root cause, the number one cause of breaches were compromised credentials. There’s a number of ways that could happen in a targeted attack, maybe somebody would phish you, get you to go to a website that looks like a facsimile of your login experience for your email. You put in your credentials, somebody grabs those and then now they have your credentials, they take over your business email and then off they go. That’s the targeted case.

The more common case we see, particularly in the consumer space, is what we call credential stuffing. Just as you can buy a tool to operate a botnet, you can buy a list of proxy servers, you can buy a list of previously compromised credentials, username passwords. What these bot operators will do is attempt to reuse those credentials en masse all across the web at different sites. 

And there, we saw in the last less than a year and a half, about 55 billion of those attempts, people trying to reuse those credentials to compromise an account. Typically, there’s an ecosystem, so once they’ve compromised the account, they’ll hand that off to somebody else in the ecosystem to go actually commit the fraud and the fraud will be different in finance than it is in retail than it is in media than it is in gaming, but there’s a pretty clear path to dollars for the attacker in each of those cases.

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Sign up today

Also see

20200423-sullivan2-dan.jpg20200423-sullivan2-dan.jpg

Akamai CTO Patrick Sullivan

Image: TechRepublic

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in