Reducing Loss from Proxies and Botnets Introduction .................................................................................................................................................. 2 Why everything you know about e-commerce fraud is “broken”................................................................ 3 Limitations of traditional methods ........................................................................................................... 3 IP geo-location .......................................................................................................................................... 3 Malware and proxies ................................................................................................................................ 4 The need for individual device intelligence .............................................................................................. 5 Trends in the malicious use of proxies...................................................................................................... 5 First generation (non-malware) proxies ................................................................................................... 5 Second generation (malware) proxies...................................................................................................... 6 Device Intelligence........................................................................................................................................ 6 Identity – device fingerprinting................................................................................................................. 6 Anomaly detection.................................................................................................................................... 6 Integrity..................................................................................................................................................... 7 Conclusion..................................................................................................................................................... 7