Threatmetrix Whitepaper Reducing Loss Due To Proxies Table Of Contents

  • Uploaded by: ThreatMetrix
  • 0
  • 0
  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Threatmetrix Whitepaper Reducing Loss Due To Proxies Table Of Contents as PDF for free.

More details

  • Words: 76
  • Pages: 1
Reducing Loss from Proxies and Botnets Introduction .................................................................................................................................................. 2 Why everything you know about e-commerce fraud is “broken”................................................................ 3 Limitations of traditional methods ........................................................................................................... 3 IP geo-location .......................................................................................................................................... 3 Malware and proxies ................................................................................................................................ 4 The need for individual device intelligence .............................................................................................. 5 Trends in the malicious use of proxies...................................................................................................... 5 First generation (non-malware) proxies ................................................................................................... 5 Second generation (malware) proxies...................................................................................................... 6 Device Intelligence........................................................................................................................................ 6 Identity – device fingerprinting................................................................................................................. 6 Anomaly detection.................................................................................................................................... 6 Integrity..................................................................................................................................................... 7 Conclusion..................................................................................................................................................... 7

Related Documents


More Documents from ""