Automated web application attacks are the top security threat, study reveals

Websites are attacked about 27 times an hour or once every two minutes on average, peaking at 25,000 attacks a minute or seven a second, according to research...

Websites are attacked about 27 times an hour or once every two minutes on average, peaking at 25,000 attacks a minute or seven a second, according to research.

The study by security firm Imperva shows cyber criminals are increasingly using automated attacks launched from captured "botnet" computers.

The Web Application Attack Report is based on a study of attacks against the top 30 web applications based on more than 10 million individual attacks from December 2010 to May 2011.

The attacks observed in the six month period were mainly made up of four attack types.

Topping the list is a little known type of attack called directory traversal (37%), followed by cross-site scripting (36%), SQL injection (23%) and remote file inclusion (4%).

These attacks were often used in combination to scan for vulnerabilities and subsequently exploit any vulnerabilities found, the report says.

"Advances in evasion are significant. Our data shows that it is increasingly difficult to trace attacks to specific entities or organisations," said Amichai Shulman, lead researcher and chief technology officer at Imperva.

This complicates any effort to retaliate, shut down cybercriminal gangs or identify potential acts of war, he said.

The Imperva research team recommends that organisations should deploy security solutions that deter automated attacks because having the capacity to quickly identify thousands of individual attacks as one attack, enables organisations to prioritise resources more efficiently and can help in the detection of previously unknown attack vectors - so-called zero days - included in the attack.

The team also says IT security teams need to be aware of known vulnerabilities and have an up-to-date list to know what can and will be exploited by attackers; they should acquire intelligence on malicious sources and apply it in real time; and they should take part in a security community and share data on attacks.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...