Shape Technical Solution Overview

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Shape Enterprise Defense Overview

About Shape Security

Network includes:
Shape protects web & mobile 3 of the top 4 US banks
6 of the top 10 Airlines
applications from automated 2 of the top 5 Hotel Chains
attack and abuse 1 of the top 3 eCommerce Retailers
2 of the top 3 US Wireless Carriers

Founded:
Mountain View, California
2011

Patents:
50+ Issued
130+ Pending
Confidential Confidential /
Fraud occurs when Criminals act like Legitimate Users

❏ Credential
? Stuffing
❏ Credit Card
Stuffing
❏ Account
?
Takeover

Criminals
Users Web & Mobile Apps
(not evident until it’s too late)
(criminals mixed in with good users) (serve good users & criminals alike)

Organisations must be open to anyone, anywhere, on any device


Confidential /
Cost vs Value in Attack

Attackers want to shorten the


time span as much as possible

Start Middle End

Purchase ATO Monetization


Leaked Credentials Credential Stuffing Attack Sale or Exploitation of
Hijacked Accounts

Confidential /
Cost vs Value in Attack

Confidential /
User Fingerprint (UFP)
Pseudo-unique fingerprints derived from user interaction

Blue Bar Key-down.

Orange Key-up.
Bar
U1
Red Mouse-click.
Circle

Green Captured mouse event. Key-down, key-up events


Tick

Dashed High speed movement


Line between two points.
U2
Brown Long pause.
Square

Grey
Line
Transition from non-
mouse event to mouse
U3
event.
Mouse events & Mouse click

Confidential /
User Fingerprint (UFP)
Visualization of fingerprints generated using Selenium

Blue Bar Key-down.

Orange Key-up.
Bar
U1
Red Mouse-click.
Circle

Green Captured mouse event.


Tick 11 keystrokes < 30
ms
Dashed High speed movement
Line between two points.
U2
Brown Long pause.
Square

Grey
Line
Transition from non-
mouse event to mouse
U3
event.

Confidential /
Typing Deviation Score
Customers type their passwords differently than fraudsters

Three separate instances of the


customer typing in her password

1.1 to 1.3 seconds


Fraudster typing in the same password

3.6 seconds
Confidential /
Browser Fingerprint (BFP)
Pseudo-unique fingerprint derived from hundreds of browser signals

Additional
Plugins Signals

Fonts Screen Size

Confidential /
Header Fingerprint (HFP)
Pseudo-unique fingerprint derived from HTTP header information

Header Field Description Example

Confidential /
Multi-Stage Protection

11
Confidential /
Multi-stage detection is paramount
Shape provides multi-stage detection as a service

WEB & MOBILE BROWSER CUSTOMER ORIGIN SERVERS


INTERNET LOAD BALANCER

appliance
MACHINE LEARNING
ARTIFICIAL INTELLIGENCE

24x7
STAGE I STAGE II
Good Traffic
Bad Traffic

Confidential /
Multi-stage defense enables long term efficacy
Actual Shape customer’s journey to less than 1% automation

2017

78% Automated

2018

<1
Automated

%
Confidential /
Thank You

You might also like