SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
Abuse in the Globally Distributed Economy
                                Shyam Mittur
                               June 26, 2012
Welcome to the Global Economy – how
to create new jobs




                  2              6/23/12
Welcome to the Global Economy –
let’s go crack Y! accounts




                  3               6/23/12
Outline
    History – What is abuse and how did we deal with it?
    Evolution of abuse
    Keeping up with abuse – our strategy and tools
    Continuing challenges




                                     4
What is Abuse?
Abuse is – “Something you’re allowed to do, but in a way that is
not allowed”
  Service abuse: primarily overuse
  ›    Mass registration
  ›    Account and credentials compromise attempts
  Content abuse: undesirable user-generated content
  ›    Spam: “go to stockmarketvideo.com it 5o bucks a month i subscribe there the guy is
       good ., stop doin wat ur doin”
  ›    Offensive posts: “****WHY IS YOUR SXXX WXXX CXXX MOTHER CXXXXXX
       OVER MY HOUSE TONIGHT?****”
  ›    Solicitations: “!!!!!!`"[Seek¯ing¯R¯ich .C¯0M]],(remove'¯'),,,,,,,,where to find educated
       men! where to find women with inner and outer beauty....”
  ›    Offensive images




                                                 6
The view from the inside
  High-rate abuse is still present
  Content abuse is everywhere
  ›    Commercial spam: solicitations, stock scams, etc.
  ›    Off-topic postings: politics, bigotry, baiting, harassment
  ›    Image abuse: porn sites, webcams, URLs
  Account compromise is up
  ›    Every merchant wants you to register
  ›    Many have poor back-end infrastructure, user databases are compromised and sold
  ›    Users use the same id/pw/questions in many locations
  ›    Baffled family and friends: “I got this e-mail from you … ”
  ›    Leads to: “Help, my account has been hacked!”




                                                7
Example – registration attempts
  5-25% of attempts in one colo were deemed abusive and denied




                                 8
Junk Account Registrations
  Over 50% of successful registrations are suspected to be abusive




   Black: Total Registrations
   Yellow: Suspected abusive registrations
   Blue: Likely good registrations

                                              9
Login attempts
  20-40% of the attempts in one colo were deemed abusive and denied




                                 10
Service Requests
  12-20% of all service requests were denied




                                  11
CAPTCHA Challenges
  50% of CAPTCHAs are not attempted
  40% of those attempted are successful




                                  12
How we deal with Abuse
Prevention and Mitigation
 Overuse-detection and service-denial at the edge
 ›  Common base rules and conservative limits everywhere
 ›  Additional custom rules and aggressive limits in select locations
    (high activity and/or high risk)
 Liberal registration (sign-up)
 ›    Biased in favor of quick and easy sign-up for new users
 Widespread use of CAPTCHA
 Aggressive action on detected abusive activity
 ›  Wide range of sophistication in detection techniques and strategies
 ›  Blacklists and regular expressions to machine learning approaches


                                    14
Platform Tools and Solutions
 Rate limiting and filtering
 ›    YDoD
 Challenge/response validation
 ›    CAPTCHA service
 Content classification
 ›    Anti-spam (Mail, Messenger), Standard Moderation
      Platform (other contexts)
 ›    URL database and services
 Account action
 ›    Warn, Rehab, Suspend, Trap, Delete

                              15
YDoD – A self-aggregating blacklist
manager and rate limiter




                    16
YDoD works with “filters”
  A filter describes the criteria for identifying abuse
     ›    Preconditions and descriptions of the information to be used for tracking abuse
          (what kind of activity am I interested in watching and/or blocking?)
     ›    Limits and descriptions of the table used to track abuse
          (how much of that am I willing to take?)
     ›    Response (what do I do when I’ve had enough?)
    Like a set of configuration files in a custom language
    Filters are installed on client hosts and central “clusterhosts”
    The clusterhost cares about the limits
    The client cares about the preconditions and responses
     ›    On “overlimit” condition, a configurable set of responses (actions) are invoked




                                                 17
What a YDoD table looks like




                   18
CAPTCHA over the years
                 2001


        February 2004


        February 2008


            April 2008


       September 2010




                         19
Content Abuse
  Standard Moderation Platform
 ›    A framework for classification and moderation of user-generated content
  Web service interface, provides a synchronous judgment
 ›    Uses a configured stack of classifiers
      •  Blacklists
      •  Regular expressions
      •  Obscenity word lists (with variants)
      •  Image analysis
      •  Signature/hash matching
      •  Machine learning algorithm implementations

  Abusive or “suspect” content can be forwarded to human moderation
   (generally asynchronous)



                                                20
The Evolution of Abuse
Data Entry Job?




                  22
Another “Data Entry Job” recruiter




                    23               6/23/12
A few “record holders” here




                   24         6/23/12
When $0.75/day solving CAPTCHAs is
the alternative




                  25             6/23/12
Need a few Yahoo! accounts?
  This one seems to be out of business, there are many such providers




                                  26
Rent-a-botnet
  http://www.zdnet.com/blog/security/study-finds-the-average-price-for-renting-a-botnet/6528




                                                 27
From hacking/fun/malice to business/profit
  There is money to be made
   ›  Jan 30, 2012: “It is estimated that financial institutions have lost $15 billion in the past five
      years” – NPR All Things Considered1
   ›  Sept 14, 2011: “The FBI is currently investigating over 400 reported cases of corporate
      account takeovers in which cyber criminals have initiated unauthorized ACH and wire
      transfers from the bank accounts of U.S. businesses. These cases involve the attempted
      theft of over $255 million and have resulted in the actual loss of approximately $85
      million.”2
  Globalization
   ›     Specialized services that source knowledge and manpower from low-cost locations
   ›     Examples: Registration, CAPTCHA solving, Spam pushing
  Botnets, malware and data breaches
   ›     Botnets are available for rental by-the-hour or for entire campaigns
   ›     Malware propagation, key logging, identity theft, account compromise/takeover
  “Multi-level marketing” at its best!
 1.     Original source unknown
 2.     http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector



                                                                                           28
A global market and ecosystem




                  29            6/23/12
Kolotibablo.com: A “full-service” offering
  Registration, CAPTCHA-solving, spam campaigns




                                30
Funny – they use CAPTCHA, too!
  Not very good either




                          31
Xrumer – another full-service solution
  ‘The system of “Antispam” – correct spam’




                                  32
decaptcher.net – a CAPTCHA solving
service (busted?)
 Hi. I need to crack captcha. Do you provide a captcha decoders? DeCaptcher CAPTCHA solving is processed by humans.
 So the accuracy is much better than an automated captcha solver ones

 Hi guys. Can you make an advert program for me for *****.com? Contact us and we'll discuss it.

 Can I solve captchas in many threads? Yes, you can. CAPTCHA solving can be parallelized.
 Just make sure in every thread you do like follows:
 login
 solve as many captchas as you need
 logout.




                                                                     33
More on this at …
  “The Commercial Malware Industry”
   by Peter Gutman, University of Auckland
  “Krebs on Security” blog by Brian Krebs
  Stefan Savage and his team’s work at UC San Diego




                                 34                    6/23/12
Evolution of our strategy and tools
Going forward: a two-pronged strategy
  General approach: more detection and mitigation at the edge
  Classification of every request
  ›    Good – service, abusive – deny, not sure – service or challenge
  ›    Algorithmic approaches, beyond just counting
  Presentation of graded challenges
  ›    Simple CAPTCHAs still work well in many situations
  ›    In-line and out-of-band
  ›    All kinds of other ideas, too
  Special handling of account compromise
  ›    More notification (mostly opt-in, some not)
  ›    The account is placed in a trap state
  ›    Challenge/verify at next opportunity


                                               36
Project Blackbird: a new framework
  Why we need this
  ›    Operating at a much higher scale (of requests, deployments, services)
  ›    Up against highly capable adversaries
  ›    Who they are and where they are coming from are not meaningful or relevant
  ›    What they do is what matters
  ›    Tight performance budget for synchronous detection
  ›    Quick reaction time for deployment and customization
  Approach
  ›  Plug-in deployment of blacklists, exemptions, classifiers
  ›  Encapsulation of detection techniques as classifiers
  ›  Abstraction of classifiers as algorithm (code) + model (data)
  ›  Support for automatic data sampling, retraining, model building and updates
  ›  Central control of the framework (development and deployment)
  ›  Distributed ownership of classifiers (development, deployment and customization)




                                               37
Blackbird design: front-end




                    38
Blackbird design: support infrastructure




                    39
CAPTCHA: not just those squiggly characters
  We generalized and abstracted the CAPTCHA framework
  Changed integration and delivery to a service model
 ›    Create challenge (the “test”)
 ›    Present challenge
 ›    Validate response
  Made the challenge techniques configurable and
   selectable
 ›    Several graphical presentations
 ›    Non-graphical challenges
 ›    Out-of-band challenges: Voice, SMS, E-mail, Postcard (yes)
 ›    Difficulty levels


                                        40
New visual variants

  Overlap Text



  Background Clutter



  Floating Screen: Demo




                           41
New CAPTCHA Challenges

  3D-Wave: Demo



  OverlapTextWave: Demo



  DelayedAnimation: Demo




                            42
Telephone Voice/SMS Challenge
  Generate a phone call or text message
 ›    With a one-time numeric code

  Why this is effective:
 ›    We check on phone numbers and exclude those available in bulk for abuse
 ›    We can watch for overuse




                                             43
Continuing challenges
  New user acquisition
  ›    Ease of sign-up vs. challenge/validation friction
  Anonymity vs. verifiable personal data
  ›    Users have “learned” to not provide real information
  Use of activity data, building and using reputation
  ›    “I can’t believe you track this!”
  Abuse/compromise mitigation in “free” vs. “at-risk” environments
   (e.g., banks)
  Account/credentials compromise
  ›    Id/password overloading
  ›    Mobile devices and apps
  ›    Reverting to risky behavior


                                               44
Shyam Mittur
Yahoo! Abuse Engineering

Más contenido relacionado

Destacado

Domain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf NoktalarıDomain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf Noktalarıdomain OM
 
Yönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonYönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonCRM Institute
 
Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016fpasoneja
 
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Leonardo Duran
 
Características técnicas carpas mastertent
Características técnicas carpas mastertentCaracterísticas técnicas carpas mastertent
Características técnicas carpas mastertentMastertent
 
Gardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestGardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestFujita64g
 
Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1ApeironEstudios
 
Implemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamImplemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamWalter Mareovich
 

Destacado (16)

Kund 2.0
Kund 2.0Kund 2.0
Kund 2.0
 
Domain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf NoktalarıDomain Sorgulamanın Püf Noktaları
Domain Sorgulamanın Püf Noktaları
 
Yönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - SegmentasyonYönetim Ansiklopedisi - Segmentasyon
Yönetim Ansiklopedisi - Segmentasyon
 
¿Te apuntas al #evento facua
¿Te apuntas al #evento facua¿Te apuntas al #evento facua
¿Te apuntas al #evento facua
 
March Event
March EventMarch Event
March Event
 
Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016Actividades Centro Fpa 2015/2016
Actividades Centro Fpa 2015/2016
 
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
Evaluación de la Seguridad Informática y Mitigación de Vulnerabilidades en un...
 
Plano instalacion elect
Plano instalacion electPlano instalacion elect
Plano instalacion elect
 
Características técnicas carpas mastertent
Características técnicas carpas mastertentCaracterísticas técnicas carpas mastertent
Características técnicas carpas mastertent
 
Jazz RicardoFalendys
Jazz RicardoFalendysJazz RicardoFalendys
Jazz RicardoFalendys
 
Gardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific NorthwestGardening with Native Plants - Urban Areas of the Pacific Northwest
Gardening with Native Plants - Urban Areas of the Pacific Northwest
 
Monografia
Monografia Monografia
Monografia
 
Ppt ch09 marien_4_e-205398
Ppt ch09 marien_4_e-205398Ppt ch09 marien_4_e-205398
Ppt ch09 marien_4_e-205398
 
Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1Ápeiron. Estudios de filosofía - Número 1
Ápeiron. Estudios de filosofía - Número 1
 
Implemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wamImplemen orga change ' ch. 2 ' 09.2013 ' wam
Implemen orga change ' ch. 2 ' 09.2013 ' wam
 
Sintesis renata
Sintesis renataSintesis renata
Sintesis renata
 

Similar a Abuse in the Globally Distributed Economy: Evolution and Strategies

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Societyrhoddavies1
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...Eoin Keary
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditingNatalino Busa
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Francesca Lazzeri, PhD
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through AnalyticsSrinath Perera
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the RyeImperva
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & InnovationDavid Koosis
 
Defending Netflix from Abuse
Defending Netflix from AbuseDefending Netflix from Abuse
Defending Netflix from AbuseJason Chan
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger LandscapeTim Swanson
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoAlpha Momentum Indonesia
 
CFO Half-Day Conference
CFO Half-Day ConferenceCFO Half-Day Conference
CFO Half-Day Conferencegppcpa
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNeo4j
 
Defeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionDefeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionThoughtworks
 
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyPayment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyThe Partnership For Safe Medicines
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingFrosmo
 

Similar a Abuse in the Globally Distributed Economy: Evolution and Strategies (20)

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Society
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
 
Transforming a Business Through Analytics
Transforming a Business Through AnalyticsTransforming a Business Through Analytics
Transforming a Business Through Analytics
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & Innovation
 
Defending Netflix from Abuse
Defending Netflix from AbuseDefending Netflix from Abuse
Defending Netflix from Abuse
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
The Distributed Ledger Landscape
The Distributed Ledger LandscapeThe Distributed Ledger Landscape
The Distributed Ledger Landscape
 
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu SastrowardoyoSTARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
STARTHUB CONNECT 2018 - Blockchain Zoo_Pandu Sastrowardoyo
 
CFO Half-Day Conference
CFO Half-Day ConferenceCFO Half-Day Conference
CFO Half-Day Conference
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
Defeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionDefeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in action
 
AI_finance_Module-3.pptx
AI_finance_Module-3.pptxAI_finance_Module-3.pptx
AI_finance_Module-3.pptx
 
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoyPayment Processing and Unlicensed Online Pharmacies by Damon McCoy
Payment Processing and Unlicensed Online Pharmacies by Damon McCoy
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online betting
 

Más de Justin Dorfman

Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Justin Dorfman
 
Wisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationWisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationJustin Dorfman
 
Solving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationSolving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationJustin Dorfman
 
Preview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationPreview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationJustin Dorfman
 
Predicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationPredicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationJustin Dorfman
 
One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...Justin Dorfman
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Justin Dorfman
 
Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Justin Dorfman
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insightsJustin Dorfman
 
A new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationA new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationJustin Dorfman
 
Understanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationUnderstanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationJustin Dorfman
 
Michelin starred cooking with chef presentation
Michelin starred cooking with chef presentationMichelin starred cooking with chef presentation
Michelin starred cooking with chef presentationJustin Dorfman
 
Benchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersBenchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersJustin Dorfman
 
Stability patterns presentation
Stability patterns presentationStability patterns presentation
Stability patterns presentationJustin Dorfman
 
A web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationA web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationJustin Dorfman
 
WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11Justin Dorfman
 

Más de Justin Dorfman (16)

Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014Open Source CDNs | LAWebSpeed April 29th 2014
Open Source CDNs | LAWebSpeed April 29th 2014
 
Wisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentationWisdom of the crowd gathering insights from real user monitoring presentation
Wisdom of the crowd gathering insights from real user monitoring presentation
 
Solving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentationSolving the hard problems of user experience management presentation
Solving the hard problems of user experience management presentation
 
Preview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentationPreview toward agile APM at Intel presentation
Preview toward agile APM at Intel presentation
 
Predicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentationPredicting user activity to make the web fast presentation
Predicting user activity to make the web fast presentation
 
One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...One millions users vs your web application mega testing cloud applications pr...
One millions users vs your web application mega testing cloud applications pr...
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1
 
Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...Broadening the user perspective – from network latency to user experience tim...
Broadening the user perspective – from network latency to user experience tim...
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insights
 
A new era at GoDaddy.com presentation
A new era at GoDaddy.com presentationA new era at GoDaddy.com presentation
A new era at GoDaddy.com presentation
 
Understanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentationUnderstanding hardware acceleration on mobile browsers presentation
Understanding hardware acceleration on mobile browsers presentation
 
Michelin starred cooking with chef presentation
Michelin starred cooking with chef presentationMichelin starred cooking with chef presentation
Michelin starred cooking with chef presentation
 
Benchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbersBenchmarks, performance, scalability, and capacity what's behind the numbers
Benchmarks, performance, scalability, and capacity what's behind the numbers
 
Stability patterns presentation
Stability patterns presentationStability patterns presentation
Stability patterns presentation
 
A web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentationA web perf dashboard up & running in 90 minutes presentation
A web perf dashboard up & running in 90 minutes presentation
 
WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11WordPress Optimization - WordCampLA 09-10-11
WordPress Optimization - WordCampLA 09-10-11
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Abuse in the Globally Distributed Economy: Evolution and Strategies

  • 1. Abuse in the Globally Distributed Economy Shyam Mittur June 26, 2012
  • 2. Welcome to the Global Economy – how to create new jobs 2 6/23/12
  • 3. Welcome to the Global Economy – let’s go crack Y! accounts 3 6/23/12
  • 4. Outline   History – What is abuse and how did we deal with it?   Evolution of abuse   Keeping up with abuse – our strategy and tools   Continuing challenges 4
  • 6. Abuse is – “Something you’re allowed to do, but in a way that is not allowed”   Service abuse: primarily overuse ›  Mass registration ›  Account and credentials compromise attempts   Content abuse: undesirable user-generated content ›  Spam: “go to stockmarketvideo.com it 5o bucks a month i subscribe there the guy is good ., stop doin wat ur doin” ›  Offensive posts: “****WHY IS YOUR SXXX WXXX CXXX MOTHER CXXXXXX OVER MY HOUSE TONIGHT?****” ›  Solicitations: “!!!!!!`"[Seek¯ing¯R¯ich .C¯0M]],(remove'¯'),,,,,,,,where to find educated men! where to find women with inner and outer beauty....” ›  Offensive images 6
  • 7. The view from the inside   High-rate abuse is still present   Content abuse is everywhere ›  Commercial spam: solicitations, stock scams, etc. ›  Off-topic postings: politics, bigotry, baiting, harassment ›  Image abuse: porn sites, webcams, URLs   Account compromise is up ›  Every merchant wants you to register ›  Many have poor back-end infrastructure, user databases are compromised and sold ›  Users use the same id/pw/questions in many locations ›  Baffled family and friends: “I got this e-mail from you … ” ›  Leads to: “Help, my account has been hacked!” 7
  • 8. Example – registration attempts   5-25% of attempts in one colo were deemed abusive and denied 8
  • 9. Junk Account Registrations   Over 50% of successful registrations are suspected to be abusive   Black: Total Registrations   Yellow: Suspected abusive registrations   Blue: Likely good registrations 9
  • 10. Login attempts   20-40% of the attempts in one colo were deemed abusive and denied 10
  • 11. Service Requests   12-20% of all service requests were denied 11
  • 12. CAPTCHA Challenges   50% of CAPTCHAs are not attempted   40% of those attempted are successful 12
  • 13. How we deal with Abuse
  • 14. Prevention and Mitigation  Overuse-detection and service-denial at the edge ›  Common base rules and conservative limits everywhere ›  Additional custom rules and aggressive limits in select locations (high activity and/or high risk)  Liberal registration (sign-up) ›  Biased in favor of quick and easy sign-up for new users  Widespread use of CAPTCHA  Aggressive action on detected abusive activity ›  Wide range of sophistication in detection techniques and strategies ›  Blacklists and regular expressions to machine learning approaches 14
  • 15. Platform Tools and Solutions  Rate limiting and filtering ›  YDoD  Challenge/response validation ›  CAPTCHA service  Content classification ›  Anti-spam (Mail, Messenger), Standard Moderation Platform (other contexts) ›  URL database and services  Account action ›  Warn, Rehab, Suspend, Trap, Delete 15
  • 16. YDoD – A self-aggregating blacklist manager and rate limiter 16
  • 17. YDoD works with “filters”   A filter describes the criteria for identifying abuse ›  Preconditions and descriptions of the information to be used for tracking abuse (what kind of activity am I interested in watching and/or blocking?) ›  Limits and descriptions of the table used to track abuse (how much of that am I willing to take?) ›  Response (what do I do when I’ve had enough?)   Like a set of configuration files in a custom language   Filters are installed on client hosts and central “clusterhosts”   The clusterhost cares about the limits   The client cares about the preconditions and responses ›  On “overlimit” condition, a configurable set of responses (actions) are invoked 17
  • 18. What a YDoD table looks like 18
  • 19. CAPTCHA over the years 2001 February 2004 February 2008 April 2008 September 2010 19
  • 20. Content Abuse   Standard Moderation Platform ›  A framework for classification and moderation of user-generated content   Web service interface, provides a synchronous judgment ›  Uses a configured stack of classifiers •  Blacklists •  Regular expressions •  Obscenity word lists (with variants) •  Image analysis •  Signature/hash matching •  Machine learning algorithm implementations   Abusive or “suspect” content can be forwarded to human moderation (generally asynchronous) 20
  • 23. Another “Data Entry Job” recruiter 23 6/23/12
  • 24. A few “record holders” here 24 6/23/12
  • 25. When $0.75/day solving CAPTCHAs is the alternative 25 6/23/12
  • 26. Need a few Yahoo! accounts?   This one seems to be out of business, there are many such providers 26
  • 28. From hacking/fun/malice to business/profit   There is money to be made ›  Jan 30, 2012: “It is estimated that financial institutions have lost $15 billion in the past five years” – NPR All Things Considered1 ›  Sept 14, 2011: “The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers from the bank accounts of U.S. businesses. These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million.”2   Globalization ›  Specialized services that source knowledge and manpower from low-cost locations ›  Examples: Registration, CAPTCHA solving, Spam pushing   Botnets, malware and data breaches ›  Botnets are available for rental by-the-hour or for entire campaigns ›  Malware propagation, key logging, identity theft, account compromise/takeover   “Multi-level marketing” at its best! 1.  Original source unknown 2.  http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector 28
  • 29. A global market and ecosystem 29 6/23/12
  • 30. Kolotibablo.com: A “full-service” offering   Registration, CAPTCHA-solving, spam campaigns 30
  • 31. Funny – they use CAPTCHA, too!   Not very good either 31
  • 32. Xrumer – another full-service solution   ‘The system of “Antispam” – correct spam’ 32
  • 33. decaptcher.net – a CAPTCHA solving service (busted?) Hi. I need to crack captcha. Do you provide a captcha decoders? DeCaptcher CAPTCHA solving is processed by humans. So the accuracy is much better than an automated captcha solver ones Hi guys. Can you make an advert program for me for *****.com? Contact us and we'll discuss it. Can I solve captchas in many threads? Yes, you can. CAPTCHA solving can be parallelized. Just make sure in every thread you do like follows: login solve as many captchas as you need logout. 33
  • 34. More on this at …   “The Commercial Malware Industry” by Peter Gutman, University of Auckland   “Krebs on Security” blog by Brian Krebs   Stefan Savage and his team’s work at UC San Diego 34 6/23/12
  • 35. Evolution of our strategy and tools
  • 36. Going forward: a two-pronged strategy   General approach: more detection and mitigation at the edge   Classification of every request ›  Good – service, abusive – deny, not sure – service or challenge ›  Algorithmic approaches, beyond just counting   Presentation of graded challenges ›  Simple CAPTCHAs still work well in many situations ›  In-line and out-of-band ›  All kinds of other ideas, too   Special handling of account compromise ›  More notification (mostly opt-in, some not) ›  The account is placed in a trap state ›  Challenge/verify at next opportunity 36
  • 37. Project Blackbird: a new framework   Why we need this ›  Operating at a much higher scale (of requests, deployments, services) ›  Up against highly capable adversaries ›  Who they are and where they are coming from are not meaningful or relevant ›  What they do is what matters ›  Tight performance budget for synchronous detection ›  Quick reaction time for deployment and customization   Approach ›  Plug-in deployment of blacklists, exemptions, classifiers ›  Encapsulation of detection techniques as classifiers ›  Abstraction of classifiers as algorithm (code) + model (data) ›  Support for automatic data sampling, retraining, model building and updates ›  Central control of the framework (development and deployment) ›  Distributed ownership of classifiers (development, deployment and customization) 37
  • 39. Blackbird design: support infrastructure 39
  • 40. CAPTCHA: not just those squiggly characters   We generalized and abstracted the CAPTCHA framework   Changed integration and delivery to a service model ›  Create challenge (the “test”) ›  Present challenge ›  Validate response   Made the challenge techniques configurable and selectable ›  Several graphical presentations ›  Non-graphical challenges ›  Out-of-band challenges: Voice, SMS, E-mail, Postcard (yes) ›  Difficulty levels 40
  • 41. New visual variants   Overlap Text   Background Clutter   Floating Screen: Demo 41
  • 42. New CAPTCHA Challenges   3D-Wave: Demo   OverlapTextWave: Demo   DelayedAnimation: Demo 42
  • 43. Telephone Voice/SMS Challenge   Generate a phone call or text message ›  With a one-time numeric code   Why this is effective: ›  We check on phone numbers and exclude those available in bulk for abuse ›  We can watch for overuse 43
  • 44. Continuing challenges   New user acquisition ›  Ease of sign-up vs. challenge/validation friction   Anonymity vs. verifiable personal data ›  Users have “learned” to not provide real information   Use of activity data, building and using reputation ›  “I can’t believe you track this!”   Abuse/compromise mitigation in “free” vs. “at-risk” environments (e.g., banks)   Account/credentials compromise ›  Id/password overloading ›  Mobile devices and apps ›  Reverting to risky behavior 44