SlideShare una empresa de Scribd logo
1 de 47
Fraud Engineering


         nickg@etsy.com
Introduction and Context
Who is nickg?

 Web Application background
 Software Development background
 Linux/Unix background
 Most everything was either social media and/or
  ecommerce since 1994
 I started at Etsy two years ago. There was no one
  dedicated on fraud and security in engineering.
 A lot of this was learned the hard way
 My perspective on fraud is probably a bit different.
  Season to taste.
Who is Etsy?

 “Online marketplace for creative small businesses”
 No inventory, marketplace. Instead we have both sides
  – Buyer risk
  – Seller risk
 When fraud happens, it‟s not silent. It‟s public.
 We lose trust (and money).
 We are very sensitive to fraud and risk == a lot of R&D
What and Where is Risk?

Many types of risk… but today we‟ll talk about

   Fraud
   Security
   Internal Threats
   Business Continuity
   Physical Security
   Intellectual property
Thinking about Risk and Fraud

 “System working correctly, but with stolen or false
  credentials causing financial loss”
 Constant, always happening.
 More business focused
 Continuous output (“fraud is 1%”)

 Think: stolen credit cards, bogus seller that doesn’t ship
  goods.
Thinking about Risk and Application Security

 “System working incorrectly when given invalid or unexpected
  input, causing financial loss, data loss/theft, system downtime,
  vandalism, or attack on another system.”
 Unexploited problems exists, now.
 Can be costly dealing with compliance, disclosure, legal.
 More technical-focused
 Binary Output (“we are breached, or not”)

 Think: SQLi, XSS, buffer overflow attacks, data breach, etc
 Of course, security flaws can be used to commit fraud
Account Takeover Blurs the Line

 Account takeover crosses the boundaries from
  site security to personal member security.
 Problems can be public
 Fraud and Security two sides of same coin.
Fraud Engineering
Let’s Leverage the Organization
Instead of this….
… you want this:
Let’s go!
Technical Operations
Log It

 Leverage existing centralized logging (if not get it)
 You can index it – lots of 3rd party solutions
 Make new security/fraud/sensitive data log or
  namespace
 Log this:
  –   Password resets
  –   Email changes
  –   Credit card changes
  –   Login failures

  Also great for internal risk monitoring.. Who is doing what
Graph It

 Critical for visibility and promotion or your pain points
 TechOps is likely using Ganglia and/or Graphite
 Enhance the application using gmetric and/or StatsD

                                     Example: Login Success and Failures.
Monitor It

 Now that you are logging and graphing, can you monitor
  and alert on outliers?
 Likely Nagios or another system in place




      Don’t worry, Etsy is ok. This was from a dead machine.
PSA #1: Start the dialog for 100% SSL

 SSL isn‟t just for login and checkout
 Entire categories of risk are eliminated with 100%
 Little to no additional load on infrastructure.
 Evaluate your current setup at Qualsys SSL Labs
  https://www.ssllabs.com/
 Get an “A” with Apache/OpenSSL using*
SSLProtocol -all +TLSv1 +SSLv3 SSLCipherSuite
HIGH:MEDIUM:!aNULL:+SHA1:+MD5:+HIGH:+MEDIUM

                                 (*) Assuming your patches are up-to-date
Quality Assurance
        .
Using the QA infrastructure

 Zooming out, QA / Fraud / Security begin to look the
  same
 A serious bug might be indistinguishable from fraud
 QA typically tests positive flows
 Fraud Engineering leverages QA to test negative flows.




                http://jenkins-ci.org/
Test Your Invariants

Things that should be always true (or false).
Super easy to test

  –   “This page should always be SSL”
  –   “This page should always require login”
  –   “http://..../server-status” doesn‟t display to public”
  –   “http://…/wp-admin” requires a password”
  –   “This page should never displays the full credit card”
  –   “Google never visits this page”


You‟ll be amazed or frightened by the results
Unit test frameworks are excellent to (re)use




          oops
Use the central log to find…

Syntax errors from the database!
  Certainly a bug, but perhaps SQLi attempts

Uncaught DatabaseException: 42601 7 ERROR:
syntax error at position 2 near "&" in
SELECT COUNT(*) FROM convos
WHERE uid = ? AND names LIKE „?‟
with [895724897,"Ll'or1=1"]
at DBConnection.php

                       based on a true story
        all queries and values changed to protect the guilty
… or find this?

 Ungraceful exits
 Really should never happen
 Latent bug? Need to upgrade? Or probing attack?
Even if you can’t fix it,
establish the base line and
look for deviations from it
Product and BizOps
Product should be helping with


The delicate balance between
easy enough so you don‟t loose customers
vs. hard enough so attackers go elsewhere
vs. the barriers appropriate to risk.
Can you make security a desired feature?

 Can you offer your best customers better security
  solutions so they don‟t have account takeover?
 Has anyone even asked them?
 Not necessarily resulting in more engineering work.
  – Site messaging improvements
  – Outreach
  – Customer education
 How can you make account takeover recovery easier?
 How can you message the user when they their email got
  erased or if they ?
BizOps

 Have you talked to the email marketing and/or online-ad
  targeting groups?
 The work they do is oddly similar to fraud analytics.
  –   Breakdown by sales by country over time
  –   Customer visit frequency by sales
  –   Average purchase price
  –   Basket Analysis
 Helping them make their data more real time/visible
  helps the business and adds additional eyes on fraud
Engineering
Fraud Engineering

 There is certainly pure fraud engineering:
  – Integration with risk management solutions
  – Rule and model building
  – Analysis and reporting
  – Behavior tracking
 And there is certainly security engineering
  – Authentication and Authorization
  – CSRF / SQLi protections
  – Secure coding initiatives https://buildsecurityin.us-cert.gov/
  But there is a lot more you can leverage from the
  organization.
Work on preventing false positives

Eliminating false positives helps your risk management
system work better.

 Disable form submit buttons after being pressed
  (prevents double clicks)
 Add rate limits to just about everything on the site

Does not necessarily stop determined attackers, but…
if someone is breaking or bumping up against your rate
limits, you know they are up to something.
PSA #2: No passwords in plain text!

   I beg of you.
   Also don‟t store them as plain MD5 or SHA1
   Use a “salted hash” system.
   Start the process today!
Here’s a secret

 Your engineers are bored.
 90% of a computer science degree isn‟t used on a day to
  day basis
 This is why open source projects exists: to work on cool
  stuff they can‟t do at work.
 They have side-projects already
 There is a huge cognitive surplus is sitting around.
Here’s another

 This laptop is the equivalent of at least 8 Amazon EC2
  “small” instances and has a terabyte of storage.
 “Hard problems” such as machine learning, natural
  language processing, big data are rapidly being
  commoditized.
 There is a huge computational surplus laying around the
  office.
Now that you know the secret, use it

 Fraud problems are engineer-bait -- it‟s full of fun hard
  problems
 Leverage your employees! Advertise your problems.
 If that fails, find interns! I‟m sure your local schools will
  be happy to help.
Customer Service
Customer Service

 They know more than you on how the site is working and
  performing.
 All fraud ends up being a customer service problem
 Improving customer service == improving fraud
  management.
 Talk to them and build the best #(&^$*# tools that you
  can for them.
 Gains of 4x-5x can occur by eliminating crap out of their
  workflow.
Case Study
Mysterious Data Center Logins – Work In Progress
Case Study

Customer Service was looking into some “problematic
customers.” Login history didn‟t really make much sense.
Got bounced to fraud engineering.
Case Study

Looking into the IP addresses, and doing whois showed
many were coming from “rent-a-slice” datacenters.




Linode, Amazon, and Rackspace are used as an example. They are great companies and are
recommend. No implication of wrong doing should be implied!
Case Study

This lead to a side-project mapping the range of IP
addresses that belong to rent-a-slice centers.
Case Study

Now we graph it
Case Study

Product is ok with throwing up CAPTCHAs on these
accounts in certain cases since it‟s unlikely to interfere with
the vast majority of users.


                                    http://www.google.com/recaptcha
Case Study

Customer Service tool updated so reps can see if IP is a
datacenter or not, and have direct access to whois




 Note: no implication that the hosting provider is or has done anything wrong.
 They might be victims of fraud themselves.
Case Study

 Oddly many users are legit (privacy nuts? escaping great
  firewall of china?)
 Working on CS/Product strategy to reach out to the legit
  customers on why.
 Rolling out analysis to checkout/purchase.
 Would love your feedback and help, so….
Case Study: Our List is Yours

 Over 25,000,000 total IP addresses
 Over 1700 IP blocks
 Over 350 providers



 https://github.com/client9/ipcat
Nick Galbreath nickg@etsy.com @ngalbreath

                                2012-02-22

Más contenido relacionado

La actualidad más candente

Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps OverviewAdrian Sanabria
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityMatt Tesauro
 
(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java VulnerabilitiesSteve Poole
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program Matt Tesauro
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionAaron Rinehart
 
Shifting left – embedding security into the devops pipeline by Mike d. Kail
Shifting left – embedding security into the devops pipeline by Mike d. KailShifting left – embedding security into the devops pipeline by Mike d. Kail
Shifting left – embedding security into the devops pipeline by Mike d. KailDevSecCon
 
ChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingAaron Rinehart
 
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya JancaDevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya JancaDevSecCon
 
Silver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSilver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSeniorStoryteller
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestMatt Tesauro
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsC4Media
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?Adrian Sanabria
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)DJ Schleen
 
DevOps: Cultural and Tooling Tips Around the World
DevOps: Cultural and Tooling Tips Around the WorldDevOps: Cultural and Tooling Tips Around the World
DevOps: Cultural and Tooling Tips Around the WorldDynatrace
 
Chaos Engineering
Chaos EngineeringChaos Engineering
Chaos EngineeringYury Roa
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringAaron Rinehart
 

La actualidad más candente (20)

Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
 
(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities(java2days) The Anatomy of Java Vulnerabilities
(java2days) The Anatomy of Java Vulnerabilities
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
Shifting left – embedding security into the devops pipeline by Mike d. Kail
Shifting left – embedding security into the devops pipeline by Mike d. KailShifting left – embedding security into the devops pipeline by Mike d. Kail
Shifting left – embedding security into the devops pipeline by Mike d. Kail
 
ChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos Testing
 
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya JancaDevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca
DevSecCon Singapore 2018 - Insecurity in information technology by Tanya Janca
 
Silver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security SolutionsSilver Lining for Miles: DevOps for Building Security Solutions
Silver Lining for Miles: DevOps for Building Security Solutions
 
Introduction to Chaos Engineering
Introduction to Chaos EngineeringIntroduction to Chaos Engineering
Introduction to Chaos Engineering
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
 
DevOps: Cultural and Tooling Tips Around the World
DevOps: Cultural and Tooling Tips Around the WorldDevOps: Cultural and Tooling Tips Around the World
DevOps: Cultural and Tooling Tips Around the World
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
Chaos Engineering
Chaos EngineeringChaos Engineering
Chaos Engineering
 
DevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos EngineeringDevSecOps Days Istanbul 2020 Security Chaos Engineering
DevSecOps Days Istanbul 2020 Security Chaos Engineering
 
Humans by the hundred
Humans by the hundredHumans by the hundred
Humans by the hundred
 

Similar a Fraud Engineering, from Merchant Risk Council Annual Meeting 2012

How to code securely: a crash course for non-coders
How to code securely: a crash course for non-codersHow to code securely: a crash course for non-coders
How to code securely: a crash course for non-codersJaap Karan Singh
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Identifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteIdentifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteChris Burgess
 
(In)convenient truths about applied machine learning
(In)convenient truths about applied machine learning(In)convenient truths about applied machine learning
(In)convenient truths about applied machine learningMax Pagels
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 
Why conduct website security audit
Why conduct website security auditWhy conduct website security audit
Why conduct website security auditManish Khatwani
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundRickMeasham
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keystrueidentity
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Eoin Keary
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScaleAntónio Alegria
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issuesebusinessmantra
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 

Similar a Fraud Engineering, from Merchant Risk Council Annual Meeting 2012 (20)

How to code securely: a crash course for non-coders
How to code securely: a crash course for non-codersHow to code securely: a crash course for non-coders
How to code securely: a crash course for non-coders
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Identifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteIdentifying a Compromised WordPress Site
Identifying a Compromised WordPress Site
 
(In)convenient truths about applied machine learning
(In)convenient truths about applied machine learning(In)convenient truths about applied machine learning
(In)convenient truths about applied machine learning
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
Why conduct website security audit
Why conduct website security auditWhy conduct website security audit
Why conduct website security audit
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.
 
Pixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at ScalePixels.camp - Machine Learning: Building Successful Products at Scale
Pixels.camp - Machine Learning: Building Successful Products at Scale
 
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...DevSecCon London 2018: How to fit threat modelling into agile development: sl...
DevSecCon London 2018: How to fit threat modelling into agile development: sl...
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 

Más de Nick Galbreath

DevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListDevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListNick Galbreath
 
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Nick Galbreath
 
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013Nick Galbreath
 
Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Nick Galbreath
 
libinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYClibinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYCNick Galbreath
 
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forumlibinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open ForumNick Galbreath
 
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Nick Galbreath
 
Time tested php with libtimemachine
Time tested php with libtimemachineTime tested php with libtimemachine
Time tested php with libtimemachineNick Galbreath
 
libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012Nick Galbreath
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20Nick Galbreath
 
Data Driven Security, from Gartner Security Summit 2012
Data Driven Security, from Gartner Security Summit 2012Data Driven Security, from Gartner Security Summit 2012
Data Driven Security, from Gartner Security Summit 2012Nick Galbreath
 
Slide show font sampler, black on white
Slide show font sampler, black on whiteSlide show font sampler, black on white
Slide show font sampler, black on whiteNick Galbreath
 
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Nick Galbreath
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 

Más de Nick Galbreath (14)

DevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading ListDevOpsDays Austin 2013 Reading List
DevOpsDays Austin 2013 Reading List
 
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
Care and Feeding of Large Scale Graphite Installations - DevOpsDays Austin 2013
 
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
SQL-RISC: New Directions in SQLi Prevention - RSA USA 2013
 
Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA Rebooting Software Development - OWASP AppSecUSA
Rebooting Software Development - OWASP AppSecUSA
 
libinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYClibinjection and sqli obfuscation, presented at OWASP NYC
libinjection and sqli obfuscation, presented at OWASP NYC
 
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forumlibinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
libinjection: new technique in detecting SQLi attacks, iSEC Partners Open Forum
 
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
Continuous Deployment - The New #1 Security Feature, from BSildesLA 2012
 
Time tested php with libtimemachine
Time tested php with libtimemachineTime tested php with libtimemachine
Time tested php with libtimemachine
 
libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012libinjection: a C library for SQLi detection, from Black Hat USA 2012
libinjection: a C library for SQLi detection, from Black Hat USA 2012
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20
 
Data Driven Security, from Gartner Security Summit 2012
Data Driven Security, from Gartner Security Summit 2012Data Driven Security, from Gartner Security Summit 2012
Data Driven Security, from Gartner Security Summit 2012
 
Slide show font sampler, black on white
Slide show font sampler, black on whiteSlide show font sampler, black on white
Slide show font sampler, black on white
 
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Fraud Engineering, from Merchant Risk Council Annual Meeting 2012

  • 1. Fraud Engineering nickg@etsy.com
  • 3. Who is nickg?  Web Application background  Software Development background  Linux/Unix background  Most everything was either social media and/or ecommerce since 1994  I started at Etsy two years ago. There was no one dedicated on fraud and security in engineering.  A lot of this was learned the hard way  My perspective on fraud is probably a bit different. Season to taste.
  • 4. Who is Etsy?  “Online marketplace for creative small businesses”  No inventory, marketplace. Instead we have both sides – Buyer risk – Seller risk  When fraud happens, it‟s not silent. It‟s public.  We lose trust (and money).  We are very sensitive to fraud and risk == a lot of R&D
  • 5. What and Where is Risk? Many types of risk… but today we‟ll talk about  Fraud  Security  Internal Threats  Business Continuity  Physical Security  Intellectual property
  • 6. Thinking about Risk and Fraud  “System working correctly, but with stolen or false credentials causing financial loss”  Constant, always happening.  More business focused  Continuous output (“fraud is 1%”)  Think: stolen credit cards, bogus seller that doesn’t ship goods.
  • 7. Thinking about Risk and Application Security  “System working incorrectly when given invalid or unexpected input, causing financial loss, data loss/theft, system downtime, vandalism, or attack on another system.”  Unexploited problems exists, now.  Can be costly dealing with compliance, disclosure, legal.  More technical-focused  Binary Output (“we are breached, or not”)  Think: SQLi, XSS, buffer overflow attacks, data breach, etc  Of course, security flaws can be used to commit fraud
  • 8. Account Takeover Blurs the Line  Account takeover crosses the boundaries from site security to personal member security.  Problems can be public  Fraud and Security two sides of same coin.
  • 11. … you want this:
  • 14. Log It  Leverage existing centralized logging (if not get it)  You can index it – lots of 3rd party solutions  Make new security/fraud/sensitive data log or namespace  Log this: – Password resets – Email changes – Credit card changes – Login failures Also great for internal risk monitoring.. Who is doing what
  • 15. Graph It  Critical for visibility and promotion or your pain points  TechOps is likely using Ganglia and/or Graphite  Enhance the application using gmetric and/or StatsD Example: Login Success and Failures.
  • 16. Monitor It  Now that you are logging and graphing, can you monitor and alert on outliers?  Likely Nagios or another system in place Don’t worry, Etsy is ok. This was from a dead machine.
  • 17. PSA #1: Start the dialog for 100% SSL  SSL isn‟t just for login and checkout  Entire categories of risk are eliminated with 100%  Little to no additional load on infrastructure.  Evaluate your current setup at Qualsys SSL Labs https://www.ssllabs.com/  Get an “A” with Apache/OpenSSL using* SSLProtocol -all +TLSv1 +SSLv3 SSLCipherSuite HIGH:MEDIUM:!aNULL:+SHA1:+MD5:+HIGH:+MEDIUM (*) Assuming your patches are up-to-date
  • 19. Using the QA infrastructure  Zooming out, QA / Fraud / Security begin to look the same  A serious bug might be indistinguishable from fraud  QA typically tests positive flows  Fraud Engineering leverages QA to test negative flows. http://jenkins-ci.org/
  • 20. Test Your Invariants Things that should be always true (or false). Super easy to test – “This page should always be SSL” – “This page should always require login” – “http://..../server-status” doesn‟t display to public” – “http://…/wp-admin” requires a password” – “This page should never displays the full credit card” – “Google never visits this page” You‟ll be amazed or frightened by the results
  • 21. Unit test frameworks are excellent to (re)use oops
  • 22. Use the central log to find… Syntax errors from the database! Certainly a bug, but perhaps SQLi attempts Uncaught DatabaseException: 42601 7 ERROR: syntax error at position 2 near "&" in SELECT COUNT(*) FROM convos WHERE uid = ? AND names LIKE „?‟ with [895724897,"Ll'or1=1"] at DBConnection.php based on a true story all queries and values changed to protect the guilty
  • 23. … or find this?  Ungraceful exits  Really should never happen  Latent bug? Need to upgrade? Or probing attack?
  • 24. Even if you can’t fix it, establish the base line and look for deviations from it
  • 26. Product should be helping with The delicate balance between easy enough so you don‟t loose customers vs. hard enough so attackers go elsewhere vs. the barriers appropriate to risk.
  • 27. Can you make security a desired feature?  Can you offer your best customers better security solutions so they don‟t have account takeover?  Has anyone even asked them?  Not necessarily resulting in more engineering work. – Site messaging improvements – Outreach – Customer education  How can you make account takeover recovery easier?  How can you message the user when they their email got erased or if they ?
  • 28. BizOps  Have you talked to the email marketing and/or online-ad targeting groups?  The work they do is oddly similar to fraud analytics. – Breakdown by sales by country over time – Customer visit frequency by sales – Average purchase price – Basket Analysis  Helping them make their data more real time/visible helps the business and adds additional eyes on fraud
  • 30. Fraud Engineering  There is certainly pure fraud engineering: – Integration with risk management solutions – Rule and model building – Analysis and reporting – Behavior tracking  And there is certainly security engineering – Authentication and Authorization – CSRF / SQLi protections – Secure coding initiatives https://buildsecurityin.us-cert.gov/ But there is a lot more you can leverage from the organization.
  • 31. Work on preventing false positives Eliminating false positives helps your risk management system work better.  Disable form submit buttons after being pressed (prevents double clicks)  Add rate limits to just about everything on the site Does not necessarily stop determined attackers, but… if someone is breaking or bumping up against your rate limits, you know they are up to something.
  • 32. PSA #2: No passwords in plain text!  I beg of you.  Also don‟t store them as plain MD5 or SHA1  Use a “salted hash” system.  Start the process today!
  • 33. Here’s a secret  Your engineers are bored.  90% of a computer science degree isn‟t used on a day to day basis  This is why open source projects exists: to work on cool stuff they can‟t do at work.  They have side-projects already  There is a huge cognitive surplus is sitting around.
  • 34. Here’s another  This laptop is the equivalent of at least 8 Amazon EC2 “small” instances and has a terabyte of storage.  “Hard problems” such as machine learning, natural language processing, big data are rapidly being commoditized.  There is a huge computational surplus laying around the office.
  • 35. Now that you know the secret, use it  Fraud problems are engineer-bait -- it‟s full of fun hard problems  Leverage your employees! Advertise your problems.  If that fails, find interns! I‟m sure your local schools will be happy to help.
  • 37. Customer Service  They know more than you on how the site is working and performing.  All fraud ends up being a customer service problem  Improving customer service == improving fraud management.  Talk to them and build the best #(&^$*# tools that you can for them.  Gains of 4x-5x can occur by eliminating crap out of their workflow.
  • 38. Case Study Mysterious Data Center Logins – Work In Progress
  • 39. Case Study Customer Service was looking into some “problematic customers.” Login history didn‟t really make much sense. Got bounced to fraud engineering.
  • 40. Case Study Looking into the IP addresses, and doing whois showed many were coming from “rent-a-slice” datacenters. Linode, Amazon, and Rackspace are used as an example. They are great companies and are recommend. No implication of wrong doing should be implied!
  • 41. Case Study This lead to a side-project mapping the range of IP addresses that belong to rent-a-slice centers.
  • 42. Case Study Now we graph it
  • 43. Case Study Product is ok with throwing up CAPTCHAs on these accounts in certain cases since it‟s unlikely to interfere with the vast majority of users. http://www.google.com/recaptcha
  • 44. Case Study Customer Service tool updated so reps can see if IP is a datacenter or not, and have direct access to whois Note: no implication that the hosting provider is or has done anything wrong. They might be victims of fraud themselves.
  • 45. Case Study  Oddly many users are legit (privacy nuts? escaping great firewall of china?)  Working on CS/Product strategy to reach out to the legit customers on why.  Rolling out analysis to checkout/purchase.  Would love your feedback and help, so….
  • 46. Case Study: Our List is Yours  Over 25,000,000 total IP addresses  Over 1700 IP blocks  Over 350 providers https://github.com/client9/ipcat
  • 47. Nick Galbreath nickg@etsy.com @ngalbreath 2012-02-22