SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
 Help  
Technical Articles
F5 SMEs share good practice.
Turn on suggestions
Topics with No Replies | Recent Solutions | Contact DevCentral
Search all content

BIG-IP 13.1.x reaches EoSD on December 31, 2022. Upgrade to 14.1.x or later to ensure access to software patches
beyond this date. See K5903
DevCentral  Technical Articles  Bots mitigations overview with Advance WAF - Anti ... Options 
Bots mitigations overview with Advance WAF - Anti Bot engine
Lior_Rotkovitch
F5 SIRT
on ‎
27-Dec-2018 15:00

With more and more bots traffic hitting web applications it has become a necessity to manage bots
accessing web applications. To be able to manage bot access to your web application you must first be
able to detect them and only then allow or deny them.
Those actions can be done by F5 advance WAF and this article will provide an overview of bot mitigations
capabilities for versions 12.x , 13.x & 14.0
Advance WAF dos profile is a powerful bot management tool with various options to deal with bots. We
classify them into two main types:
1. Anomaly based detection – anomaly engine to identify increase in RPS generated by bots
2. Proactive bot defense – a dedicated anti bot engine to identify bot activity
Let’s review each one of them in more details.
Anomaly detection engine
Bot traffic most often generate increase in RPS. Advance WAF anomaly engine has several detection
mechanisms that identify an increase in traffic based on different criteria:
By source IP – detects increase of request per second which is the classical indication for a single bot
generating traffic from a given IP. “By source IP” measure ratio increase and fixed increase request per
second (RPS) from any IP accessing the web application.
The ratio RPS anomaly detection is the calculation of the past request per second in compare to the
current one. Ratio based should be used when the bot is originating from an already known IP that used to
send X amount of traffic and now send 2X or 3X times more traffic. The prevention policy will be activated
once this ratio per given source IP is reached.
The fixed RPS detection anomaly is the limit of request per second that above it will consider an attack and
will trigger the prevention policy. Fixed RPS detection should be used for new source IP’s with spikes that
pass the fixed threshold which above it considered to be an attack.
By Device ID – detect increase of RPS from a given device ID. The Device ID is the actual http agent that
generates the HTTP request which makes the source identification increase more accurate. The reason
Device ID exists is that the internet works with gateways also known as NATed traffic ( Network address
translation ) that represented by single IP with many devices behind it. Blocking the single source IP will
cause to blocking all legitimate users behind this source IP.
Similar to “by source IP “there are two anomaly types: ratio based and fixed rate which are calculated as
mentioned above.
It is recommended to use device ID with the source IP detection to isolate the attacking source behind a
source IP. Note that Device ID is done with java script injection, so check it before using it.
By geolocation - Sometimes the bot generates traffic from a specific country. This can be detected with
the geolocation detection that measure RPS arriving from a specific country.
It is recommended to use geolocation anomaly when traffic is not expected from those country with a low
fixed RPS rate.
By URL – detects increase of RPS on a specific URL which helps us determine if a bot is hitting the web
application but since it runs low and slow it is hard to detect the source IP.
It is recommended to use URL anomaly when by source IP / by Device ID can’t detect RPS increase due to
low and slow attack.
By site wide – detects increase on the entire web application (FQDN) Site wide detects RPS anomaly on
the entire virtual server (most often the app FQDN) and measures both source IP’s and URL’ to try and
conclude if there is an increase of traffic due to bots activity that are running under “the radar” without
being detect by other anomalies.
Each of the detection methods owns a prevention option that can apply to the detected source. This is
where the actual mitigation occurs to stop the attack. There are three prevention options available for each
of the detection that was introduce above:
Client Side Integrity Defense (CSID) aka browser challenge – is the pioneering Client side injection by
ASM (from 2008) to identify a browser or a bot. when a request arrive to the WAF DoS profile the request
is being held and a CSID script is send to the originating source. The script is a java script that checks if the
sources can:
Support JavaScript
Support HTTP cookie
Execute a computational challenge
CSID then sends the answer to the WAF DoS profile for evaluation that if qualify as a browser will be
allowed. Then the initial request that was held will be reconstruct and be sent to the web application. If the
answer from the CSID will not be qualify for the tests mention above then the initial request will be
dropped.
CAPTCHA is the second prevention policy option that each of the detection methods has. CAPTCHA is the
ultimate human or bot test and many web sites uses CATPCHA to challenge unknow sources that access
their app with it. The CAPTCHA challenge is present to the unknown source in the same way CSID, but
unlike CSID that is done under the hood with no user intervention, CAPTCHA is visible to the user. The
AWAF DoS profile CAPTCHA can be fine tune to fit the look and feel of the web site to get better usability.
Request blocking - Request blocking has two options:
Block all – any source that pass the detected thresholds will be blocked at the TCP IP level.
Rate limiting – any source that pass the detected thresholds will be rate limit to half the traffic or to the
historical RPS.
Note that block all will end the attack, so it should be use when we are sure that the source is indeed the
attacker. Rate limit on the other hand is slows down the attacker but will also allow other users to access
the app.
Those three preventions using different types of approaches: CSID is done with no user intervention while
CAPTHA is visible. CSID and CAPTCHA try to understand who the offending source is (bots or human) and
request limiting is indifferent to the “identity” and limits / blocks the offending sources.
Reporting
The Dos visibility (AVR module) provide visibility on the traffic that access your web application based on
the anomalies and mitigations that were triggered by the detections and prevention mention above. The
application event report provides details on the actions done by the dos profile and useful information can
be found such as: time of attack mitigations that were apply and additional information.
The graphs that are shown in the image below and located under Securtiy -> Reporting -> DoS -
> Dashboard
Anomaly Summary
The anomaly engine in the advance WAF dos profile is a TPS is a power full anti bot detection that can
identify bots activity by monitoring the amount of request on various entities such as by source Ip,
geolocation, specific URL , etc.
By source IP – detect increase in RPS on bots – use to detects bots
By Device ID - use to detects bots behind Nated IP sources
By URL - use to detects bots that focus on a single or fixed URL’s
By Geolocation - use to detects bots when they originate from a specific country
By Site wide – when the others detections don’t trigger but the site still experiencing load. (low and
slow attacks)
Once the anomaly engine identifies an increase in request the prevention policy is applied on the source
that triggered it. Client side integrity defense checks that the source is a browser and if not the source will
be blocked. CAPTCHA check is to identify a human and rate limit will slow down the source.
Client side integrity defense – use it when you want to allows only browsers to the site and no user
visibility to this check is needed.
CAPTCHA – use it when you want to evaluate a source for human or bot and user visibility to this
check is ok.
Block – rate limit – use it when you don’t want to block all the traffic from / to a specific source but
you do want to slow down the attack
Block – blocking - use it when you want to block the offending source and reset his connection.
Proactive bot defense
The second engine available in advance WAF is the anti bot engine which is also part of the ASM DoS
profile. The anti bot engine is a dedicated feature set for dealing with attack originating by bot and the
mitigations focus on the client side level of legitimacy.
Bot signatures
The first mitigation for bots is the bot signature mechanism that match user agent stings to detect known
bad bods. Bot signature includes two pre define signatures sets: benign and malicious which provides a
way to monitor the site bot traffic or to block unwanted bots.
Bots can be manage and allow specific bot to access the site with or without reporting and to report an
block the bot. the pre define bot signature should be used to understand the bots traffic that access your
web site. During attack those signatures can be protect your site when they are triggered by offending
sources.
Custom bot signature can be created for specific bot traffic. Custom signatures can be written in simple
mode for quick usage or in in advance mode that allows writing of more granular signatures Manual for bot
signatures.
For example, identifying a specific user agent on offending source which is not in the bot signatures list.
Adding the user agent to the bot signature pool will prevent the attack from this bot.
Anti bot Impersonating
Advance WAF also has a powerful mechanism that validated user agents stings to prevent from bad bot to
impersonate as good bots. Since user agent can be easily forged good bots includes domain name to
verify who they claim to be by issuing a reverse DNS look up.
for example: Googlebot/2.1 (+http://www.google.com/bot.html)
Since google is a good bot it should be allowed based on the user agent. However, only when doing a
reverse DNS check on the user agent FQDN can know for sure that this is truly google bot arriving from its
known IP as expected.
This configuration prevents most of the unwanted bots and improve application performance as various
reports claim to see around 50 % of the application traffic are bots. This anti Impersonating bot engine can
reduce the amount of bots traffic to the web application and is considered today as best practice.
To use the anti bot impersonating engine the DNS resolver and DNS look up list must be defined
Anti bots capability checks
Bots can be of various types and sometimes the only way to detect them is by inspecting their nature
which is what the Proactive bot defense does. The anti bot engine is a sophisticated set of checks that
has the following configuration:
This configuration makes the proactive bot defense easy to use and filter the bad bots. The concept of the
anti bot engine is to gradually inspect the source:
1. CSID – are you a browser that support cookie, Java script ?
2. Capabilities script – are you who you say you are ? comparing the browser answer to what the Anti
bot engine sees.
a. If the score is from 0 to 59 it is assumed to be a browser and the request can pass through.
b. If the score is between 60 to 99 it is declared unknown and a CAPTCHA is sent to unknown
sources. If the CAPTCHA challenge is solved the client is allowed in. A failed CAPTCHA
challenge results in a connection reset.
c. If the score is 100 then the request is reset
3. CAPTCHA – are you a human that can type characters ?
The configuration reflects those options:
If Block Suspicious Browsers is unchecked and CAPTCHA is unchecked à send CSID Challenge
If Block Suspicious Browsers is checked and CAPTCHA is checked à send Client Capabilities
challenge and give it a score:
If score is good, then allow access
If score in doubt send a CAPTCHA for human verification
If score is bad, then block it
If Block Suspicious Browsers is checked but CAPTCHA Challenge is unchecked à do not send
CAPTCHA and only block if the score is more than a human
Operation mode includes two modes:
Always – use it when under attack for immediate response to apply proactive bod defense on the entire
virtual server
e.g. the site is under DDoS and I want to mitigate all bots traffic now.
During attack – use it when other detection is triggered, and then proactive bot defense will be applied.
e.g. the site is not under attack and I want to mitigate with proactive bot defense only when any
other anomaly engine (mention above) is triggered in transparent mode. Or any request that pass
the rate limit of the anomaly engine.
The option for during attack provides a very powerful mitigation scenario where when the site is
experiencing increase in RPS that indicates bots activity only then examine the sources and if they are
suspicious present to those specific sources CAPTCHA challenge or block them if they are being detected
by capability script as bots.
The configuration will be as follows:
1. Define fixed thresholds for RPS on the anomaly engine in transparent mode
2. Define proactive bot defense to be during attack
a. Enable If Block Suspicious Browsers
b. Enable CAPTCHA Challenge
White listing
It is recommended to white list all known Ip’s that access the site and exclude them from the dos profile
checks. The reason is that when under attack the mitigations will not apply on known good sources.
Reporting
Bot defense reporting provides a full overview on the bots (good and bad) that access your web
application. Those graphs are critical when under attack to indicate the offending sources and easily
mitigate the attacks.
Irule mitigations
Irule are the F5 swiss army knife that can be used with the anti bot engine. In the following example any
source that access the login php URL will get the proactive bot defense check and be allowed if it pass it.
The full commands for using bot defnse with irule is located here: BotDefense
# EXAMPLE: enable client-side challenges on a specific URL
when BOTDEFENSE_REQUEST {
if {[HTTP::uri] eq "/login.php"} {
BOTDEFENSE::cs_allowed true
}
}
Proactive Bot defense Summary
Proactive bot defense is a dedicated bot detection and mitigations engine which focus on the attack agent
capabilities. There are several layers of protection with proactive bot defense :
Bot signature – is this known bad / good bod ?
Bot impersonation checks – is this a valid bot ?
Browser check – is this a browser ?
Browsers capabilities – which capabilities the browser has compare to what he say
CAPTCHA – is this a human ?
Proactive bot defense can be used with the anomaly engine the can trigger proactive bot defense once a
specific threshold has reached.
For example: only if login URL exceeds 20 RPS then apply proactive bot defense. (in transparent
mode)
Other combinations are also very useful when under attack.
For example: sending the client capabilities script and send CATPCHA to verify if the sources is a
browser and if this is a human.
Proactive bot defense has good reporting that allows fine tuning of the security policy to match bots traffic.
Finally irule can be used to utilize proactive bot defense.
Under Attack – use F5 SIRT
About F5 SIRT
Security
 ASM Advanced WAF F5 SIRT
Add tags
2 Kudos
 Edit Comment
Comment
PREVIEW
You have autosaved content from 09:54.
Load or Discard
Paragraph           
             


Hint: @ links to members, content
Email me when someone replies
Post Your Comment
Cancel
Version history
View Article History
Last update:
‎
27-Dec-2018 15:00
Updated by:
Lior_Rotkovitch
Contributors
Lior_Rotkovitch

ABOUT DEVCENTRAL
Devcentral News
Technical Forum
F5 RESOURCES
Product Documentation
White Papers
F5 SUPPORT
Manage Subscriptions
Support Portal
  
Technical Articles
CrowdSRC
Community Guidelines
DevCentral EULA
Get a Developer Lab License
Become a DevCentral MVP
Glossary
Customer Stories
Webinars
Free Online Courses
F5 Certification
LearnF5 Training
Professional Services
Create a Service Request
Software Downloads
F5 PARTNERS
Find a Reseller Partner
Technology Alliances
Become an F5 Partner
Login to Partner Central
CONNECT WITH DEVCENTRAL
©2022 F5, Inc. All rights
reserved.
Trademarks Policies Privacy California Privacy
Do Not Sell My Personal Information Cookie Preferences


Más contenido relacionado

Similar a Advance WAF bots mitigations overview with anomaly detection and proactive bot defense

vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting toolBhagyashri Chalakh
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...UltraUploader
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesArnav Chowdhury
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentationAlbena Asenova-Belal
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsPaul Hobbs
 
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontVices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontOry Segal
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONSijcsit
 
State of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsState of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsIOSRjournaljce
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityDistil Networks
 
A web content analytics
A web content analyticsA web content analytics
A web content analyticscsandit
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online bankingJakub Kałużny
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Ajin Abraham
 
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...Ravindra Guntur
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Nordic APIs
 

Similar a Advance WAF bots mitigations overview with anomaly detection and proactive bot defense (20)

vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Www usenix-org
Www usenix-orgWww usenix-org
Www usenix-org
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber BattlefrontVices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
Vices & Devices - How IoT & Insecure APIs Became the New Cyber Battlefront
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
 
State of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLsState of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLs
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
A web content analytics
A web content analyticsA web content analytics
A web content analytics
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Script based malware detection in online banking
Script based malware detection in online bankingScript based malware detection in online banking
Script based malware detection in online banking
 
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
Nullcon Goa 2016 - Automated Mobile Application Security Testing with Mobile ...
 
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...
Recognising Behavioural Patterns of Web API Bots Using Machine Learning Techn...
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 

Más de Lior Rotkovitch

Software management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfSoftware management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfLior Rotkovitch
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...Lior Rotkovitch
 
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdfA Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdfLior Rotkovitch
 
The WAF book (Web App Firewall )
The WAF book  (Web App Firewall )The WAF book  (Web App Firewall )
The WAF book (Web App Firewall )Lior Rotkovitch
 
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfLior Rotkovitch
 
The WAF book intro protection elements v1.0 lior rotkovitch
The WAF book intro protection elements v1.0 lior rotkovitchThe WAF book intro protection elements v1.0 lior rotkovitch
The WAF book intro protection elements v1.0 lior rotkovitchLior Rotkovitch
 
The waf book intro waf elements v1.0 lior rotkovitch
The waf book intro  waf elements v1.0 lior rotkovitchThe waf book intro  waf elements v1.0 lior rotkovitch
The waf book intro waf elements v1.0 lior rotkovitchLior Rotkovitch
 
The waf book intro v1.0 lior rotkovitch
The waf book intro v1.0 lior rotkovitchThe waf book intro v1.0 lior rotkovitch
The waf book intro v1.0 lior rotkovitchLior Rotkovitch
 
The waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitchThe waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitchLior Rotkovitch
 
F5 SIRT - F5 ASM WAF - DDoS protection
F5 SIRT - F5 ASM WAF - DDoS protection F5 SIRT - F5 ASM WAF - DDoS protection
F5 SIRT - F5 ASM WAF - DDoS protection Lior Rotkovitch
 
Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Lior Rotkovitch
 
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 cleanWAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 cleanLior Rotkovitch
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchLior Rotkovitch
 
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12
Lior rotkovitch ASM WAF unified learning – building policy with asm v12Lior Rotkovitch
 
ASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchLior Rotkovitch
 
Html cors- lior rotkovitch
Html cors- lior rotkovitchHtml cors- lior rotkovitch
Html cors- lior rotkovitchLior Rotkovitch
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitchLior Rotkovitch
 
הדרכה מבוססת אינטרנט Wbt - Web based training
הדרכה מבוססת אינטרנט  Wbt - Web based training הדרכה מבוססת אינטרנט  Wbt - Web based training
הדרכה מבוססת אינטרנט Wbt - Web based training Lior Rotkovitch
 
פיתוח הדרכה מתוקשבת
פיתוח הדרכה מתוקשבתפיתוח הדרכה מתוקשבת
פיתוח הדרכה מתוקשבתLior Rotkovitch
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 

Más de Lior Rotkovitch (20)

Software management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdfSoftware management, the seasonal return of DDoS - This Week in Security.pdf
Software management, the seasonal return of DDoS - This Week in Security.pdf
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdfA Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
 
The WAF book (Web App Firewall )
The WAF book  (Web App Firewall )The WAF book  (Web App Firewall )
The WAF book (Web App Firewall )
 
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdfBrute Force - Lior Rotkovitch - f5 SIRT v5.pdf
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
 
The WAF book intro protection elements v1.0 lior rotkovitch
The WAF book intro protection elements v1.0 lior rotkovitchThe WAF book intro protection elements v1.0 lior rotkovitch
The WAF book intro protection elements v1.0 lior rotkovitch
 
The waf book intro waf elements v1.0 lior rotkovitch
The waf book intro  waf elements v1.0 lior rotkovitchThe waf book intro  waf elements v1.0 lior rotkovitch
The waf book intro waf elements v1.0 lior rotkovitch
 
The waf book intro v1.0 lior rotkovitch
The waf book intro v1.0 lior rotkovitchThe waf book intro v1.0 lior rotkovitch
The waf book intro v1.0 lior rotkovitch
 
The waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitchThe waf book intro attack elements v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitch
 
F5 SIRT - F5 ASM WAF - DDoS protection
F5 SIRT - F5 ASM WAF - DDoS protection F5 SIRT - F5 ASM WAF - DDoS protection
F5 SIRT - F5 ASM WAF - DDoS protection
 
Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1 Advance WAF bot mitigations V13.1
Advance WAF bot mitigations V13.1
 
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 cleanWAF ASM / Advance WAF - Brute force   lior rotkovitch  f5 sirt v5 clean
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
 
Asm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitchAsm bot mitigations v3 final- lior rotkovitch
Asm bot mitigations v3 final- lior rotkovitch
 
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12Lior rotkovitch   ASM WAF  unified learning – building policy with asm v12
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
 
ASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitchASM 11.6 DDoS profile- lior rotkovitch
ASM 11.6 DDoS profile- lior rotkovitch
 
Html cors- lior rotkovitch
Html cors- lior rotkovitchHtml cors- lior rotkovitch
Html cors- lior rotkovitch
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
 
הדרכה מבוססת אינטרנט Wbt - Web based training
הדרכה מבוססת אינטרנט  Wbt - Web based training הדרכה מבוססת אינטרנט  Wbt - Web based training
הדרכה מבוססת אינטרנט Wbt - Web based training
 
פיתוח הדרכה מתוקשבת
פיתוח הדרכה מתוקשבתפיתוח הדרכה מתוקשבת
פיתוח הדרכה מתוקשבת
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 

Último

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Último (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Advance WAF bots mitigations overview with anomaly detection and proactive bot defense

  • 1.  Help   Technical Articles F5 SMEs share good practice. Turn on suggestions Topics with No Replies | Recent Solutions | Contact DevCentral Search all content  BIG-IP 13.1.x reaches EoSD on December 31, 2022. Upgrade to 14.1.x or later to ensure access to software patches beyond this date. See K5903 DevCentral  Technical Articles  Bots mitigations overview with Advance WAF - Anti ... Options  Bots mitigations overview with Advance WAF - Anti Bot engine Lior_Rotkovitch F5 SIRT on ‎ 27-Dec-2018 15:00  With more and more bots traffic hitting web applications it has become a necessity to manage bots accessing web applications. To be able to manage bot access to your web application you must first be able to detect them and only then allow or deny them. Those actions can be done by F5 advance WAF and this article will provide an overview of bot mitigations capabilities for versions 12.x , 13.x & 14.0
  • 2. Advance WAF dos profile is a powerful bot management tool with various options to deal with bots. We classify them into two main types: 1. Anomaly based detection – anomaly engine to identify increase in RPS generated by bots 2. Proactive bot defense – a dedicated anti bot engine to identify bot activity Let’s review each one of them in more details. Anomaly detection engine Bot traffic most often generate increase in RPS. Advance WAF anomaly engine has several detection mechanisms that identify an increase in traffic based on different criteria: By source IP – detects increase of request per second which is the classical indication for a single bot generating traffic from a given IP. “By source IP” measure ratio increase and fixed increase request per second (RPS) from any IP accessing the web application. The ratio RPS anomaly detection is the calculation of the past request per second in compare to the current one. Ratio based should be used when the bot is originating from an already known IP that used to send X amount of traffic and now send 2X or 3X times more traffic. The prevention policy will be activated once this ratio per given source IP is reached. The fixed RPS detection anomaly is the limit of request per second that above it will consider an attack and will trigger the prevention policy. Fixed RPS detection should be used for new source IP’s with spikes that pass the fixed threshold which above it considered to be an attack. By Device ID – detect increase of RPS from a given device ID. The Device ID is the actual http agent that generates the HTTP request which makes the source identification increase more accurate. The reason Device ID exists is that the internet works with gateways also known as NATed traffic ( Network address translation ) that represented by single IP with many devices behind it. Blocking the single source IP will cause to blocking all legitimate users behind this source IP. Similar to “by source IP “there are two anomaly types: ratio based and fixed rate which are calculated as mentioned above. It is recommended to use device ID with the source IP detection to isolate the attacking source behind a source IP. Note that Device ID is done with java script injection, so check it before using it.
  • 3. By geolocation - Sometimes the bot generates traffic from a specific country. This can be detected with the geolocation detection that measure RPS arriving from a specific country. It is recommended to use geolocation anomaly when traffic is not expected from those country with a low fixed RPS rate. By URL – detects increase of RPS on a specific URL which helps us determine if a bot is hitting the web application but since it runs low and slow it is hard to detect the source IP. It is recommended to use URL anomaly when by source IP / by Device ID can’t detect RPS increase due to low and slow attack. By site wide – detects increase on the entire web application (FQDN) Site wide detects RPS anomaly on the entire virtual server (most often the app FQDN) and measures both source IP’s and URL’ to try and conclude if there is an increase of traffic due to bots activity that are running under “the radar” without being detect by other anomalies. Each of the detection methods owns a prevention option that can apply to the detected source. This is where the actual mitigation occurs to stop the attack. There are three prevention options available for each of the detection that was introduce above:
  • 4. Client Side Integrity Defense (CSID) aka browser challenge – is the pioneering Client side injection by ASM (from 2008) to identify a browser or a bot. when a request arrive to the WAF DoS profile the request is being held and a CSID script is send to the originating source. The script is a java script that checks if the sources can: Support JavaScript Support HTTP cookie Execute a computational challenge CSID then sends the answer to the WAF DoS profile for evaluation that if qualify as a browser will be allowed. Then the initial request that was held will be reconstruct and be sent to the web application. If the answer from the CSID will not be qualify for the tests mention above then the initial request will be dropped. CAPTCHA is the second prevention policy option that each of the detection methods has. CAPTCHA is the ultimate human or bot test and many web sites uses CATPCHA to challenge unknow sources that access their app with it. The CAPTCHA challenge is present to the unknown source in the same way CSID, but unlike CSID that is done under the hood with no user intervention, CAPTCHA is visible to the user. The AWAF DoS profile CAPTCHA can be fine tune to fit the look and feel of the web site to get better usability. Request blocking - Request blocking has two options: Block all – any source that pass the detected thresholds will be blocked at the TCP IP level. Rate limiting – any source that pass the detected thresholds will be rate limit to half the traffic or to the historical RPS. Note that block all will end the attack, so it should be use when we are sure that the source is indeed the attacker. Rate limit on the other hand is slows down the attacker but will also allow other users to access the app. Those three preventions using different types of approaches: CSID is done with no user intervention while CAPTHA is visible. CSID and CAPTCHA try to understand who the offending source is (bots or human) and request limiting is indifferent to the “identity” and limits / blocks the offending sources. Reporting The Dos visibility (AVR module) provide visibility on the traffic that access your web application based on the anomalies and mitigations that were triggered by the detections and prevention mention above. The application event report provides details on the actions done by the dos profile and useful information can be found such as: time of attack mitigations that were apply and additional information.
  • 5. The graphs that are shown in the image below and located under Securtiy -> Reporting -> DoS - > Dashboard Anomaly Summary The anomaly engine in the advance WAF dos profile is a TPS is a power full anti bot detection that can identify bots activity by monitoring the amount of request on various entities such as by source Ip, geolocation, specific URL , etc. By source IP – detect increase in RPS on bots – use to detects bots By Device ID - use to detects bots behind Nated IP sources By URL - use to detects bots that focus on a single or fixed URL’s By Geolocation - use to detects bots when they originate from a specific country By Site wide – when the others detections don’t trigger but the site still experiencing load. (low and slow attacks) Once the anomaly engine identifies an increase in request the prevention policy is applied on the source that triggered it. Client side integrity defense checks that the source is a browser and if not the source will be blocked. CAPTCHA check is to identify a human and rate limit will slow down the source. Client side integrity defense – use it when you want to allows only browsers to the site and no user visibility to this check is needed. CAPTCHA – use it when you want to evaluate a source for human or bot and user visibility to this check is ok. Block – rate limit – use it when you don’t want to block all the traffic from / to a specific source but you do want to slow down the attack
  • 6. Block – blocking - use it when you want to block the offending source and reset his connection. Proactive bot defense The second engine available in advance WAF is the anti bot engine which is also part of the ASM DoS profile. The anti bot engine is a dedicated feature set for dealing with attack originating by bot and the mitigations focus on the client side level of legitimacy. Bot signatures The first mitigation for bots is the bot signature mechanism that match user agent stings to detect known bad bods. Bot signature includes two pre define signatures sets: benign and malicious which provides a way to monitor the site bot traffic or to block unwanted bots. Bots can be manage and allow specific bot to access the site with or without reporting and to report an block the bot. the pre define bot signature should be used to understand the bots traffic that access your web site. During attack those signatures can be protect your site when they are triggered by offending sources. Custom bot signature can be created for specific bot traffic. Custom signatures can be written in simple mode for quick usage or in in advance mode that allows writing of more granular signatures Manual for bot signatures. For example, identifying a specific user agent on offending source which is not in the bot signatures list. Adding the user agent to the bot signature pool will prevent the attack from this bot. Anti bot Impersonating Advance WAF also has a powerful mechanism that validated user agents stings to prevent from bad bot to impersonate as good bots. Since user agent can be easily forged good bots includes domain name to verify who they claim to be by issuing a reverse DNS look up. for example: Googlebot/2.1 (+http://www.google.com/bot.html)
  • 7. Since google is a good bot it should be allowed based on the user agent. However, only when doing a reverse DNS check on the user agent FQDN can know for sure that this is truly google bot arriving from its known IP as expected. This configuration prevents most of the unwanted bots and improve application performance as various reports claim to see around 50 % of the application traffic are bots. This anti Impersonating bot engine can reduce the amount of bots traffic to the web application and is considered today as best practice. To use the anti bot impersonating engine the DNS resolver and DNS look up list must be defined Anti bots capability checks Bots can be of various types and sometimes the only way to detect them is by inspecting their nature which is what the Proactive bot defense does. The anti bot engine is a sophisticated set of checks that has the following configuration: This configuration makes the proactive bot defense easy to use and filter the bad bots. The concept of the anti bot engine is to gradually inspect the source: 1. CSID – are you a browser that support cookie, Java script ? 2. Capabilities script – are you who you say you are ? comparing the browser answer to what the Anti bot engine sees. a. If the score is from 0 to 59 it is assumed to be a browser and the request can pass through.
  • 8. b. If the score is between 60 to 99 it is declared unknown and a CAPTCHA is sent to unknown sources. If the CAPTCHA challenge is solved the client is allowed in. A failed CAPTCHA challenge results in a connection reset. c. If the score is 100 then the request is reset 3. CAPTCHA – are you a human that can type characters ? The configuration reflects those options: If Block Suspicious Browsers is unchecked and CAPTCHA is unchecked à send CSID Challenge If Block Suspicious Browsers is checked and CAPTCHA is checked à send Client Capabilities challenge and give it a score: If score is good, then allow access If score in doubt send a CAPTCHA for human verification If score is bad, then block it If Block Suspicious Browsers is checked but CAPTCHA Challenge is unchecked à do not send CAPTCHA and only block if the score is more than a human Operation mode includes two modes: Always – use it when under attack for immediate response to apply proactive bod defense on the entire virtual server e.g. the site is under DDoS and I want to mitigate all bots traffic now. During attack – use it when other detection is triggered, and then proactive bot defense will be applied. e.g. the site is not under attack and I want to mitigate with proactive bot defense only when any other anomaly engine (mention above) is triggered in transparent mode. Or any request that pass the rate limit of the anomaly engine. The option for during attack provides a very powerful mitigation scenario where when the site is experiencing increase in RPS that indicates bots activity only then examine the sources and if they are suspicious present to those specific sources CAPTCHA challenge or block them if they are being detected by capability script as bots. The configuration will be as follows: 1. Define fixed thresholds for RPS on the anomaly engine in transparent mode 2. Define proactive bot defense to be during attack
  • 9. a. Enable If Block Suspicious Browsers b. Enable CAPTCHA Challenge White listing It is recommended to white list all known Ip’s that access the site and exclude them from the dos profile checks. The reason is that when under attack the mitigations will not apply on known good sources. Reporting Bot defense reporting provides a full overview on the bots (good and bad) that access your web application. Those graphs are critical when under attack to indicate the offending sources and easily mitigate the attacks.
  • 10. Irule mitigations Irule are the F5 swiss army knife that can be used with the anti bot engine. In the following example any source that access the login php URL will get the proactive bot defense check and be allowed if it pass it. The full commands for using bot defnse with irule is located here: BotDefense # EXAMPLE: enable client-side challenges on a specific URL when BOTDEFENSE_REQUEST { if {[HTTP::uri] eq "/login.php"} { BOTDEFENSE::cs_allowed true } } Proactive Bot defense Summary Proactive bot defense is a dedicated bot detection and mitigations engine which focus on the attack agent capabilities. There are several layers of protection with proactive bot defense : Bot signature – is this known bad / good bod ? Bot impersonation checks – is this a valid bot ? Browser check – is this a browser ? Browsers capabilities – which capabilities the browser has compare to what he say CAPTCHA – is this a human ? Proactive bot defense can be used with the anomaly engine the can trigger proactive bot defense once a specific threshold has reached. For example: only if login URL exceeds 20 RPS then apply proactive bot defense. (in transparent mode) Other combinations are also very useful when under attack.
  • 11. For example: sending the client capabilities script and send CATPCHA to verify if the sources is a browser and if this is a human. Proactive bot defense has good reporting that allows fine tuning of the security policy to match bots traffic. Finally irule can be used to utilize proactive bot defense. Under Attack – use F5 SIRT About F5 SIRT Security  ASM Advanced WAF F5 SIRT Add tags 2 Kudos  Edit Comment Comment PREVIEW You have autosaved content from 09:54. Load or Discard Paragraph                          
  • 12.  Hint: @ links to members, content Email me when someone replies Post Your Comment Cancel Version history View Article History Last update: ‎ 27-Dec-2018 15:00 Updated by: Lior_Rotkovitch Contributors Lior_Rotkovitch  ABOUT DEVCENTRAL Devcentral News Technical Forum F5 RESOURCES Product Documentation White Papers F5 SUPPORT Manage Subscriptions Support Portal   
  • 13. Technical Articles CrowdSRC Community Guidelines DevCentral EULA Get a Developer Lab License Become a DevCentral MVP Glossary Customer Stories Webinars Free Online Courses F5 Certification LearnF5 Training Professional Services Create a Service Request Software Downloads F5 PARTNERS Find a Reseller Partner Technology Alliances Become an F5 Partner Login to Partner Central CONNECT WITH DEVCENTRAL ©2022 F5, Inc. All rights reserved. Trademarks Policies Privacy California Privacy Do Not Sell My Personal Information Cookie Preferences 