Skip to content

Commit

Permalink
-madds media
Browse files Browse the repository at this point in the history
  • Loading branch information
jscyo committed Oct 3, 2024
1 parent b7147e3 commit 68338dc
Show file tree
Hide file tree
Showing 12 changed files with 23 additions and 5 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
28 changes: 23 additions & 5 deletions content/anomaly-detection-with-supertokens/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,8 @@ To answer the question, “Anomaly detection” is the process of analyzing data

Let's take a look at some of the features of the toolset

![bruute force attacks](./Brute%20Force%20Attack%20Detection.png)

### **1. Brute Force Attack Detection**

Brute force attacks involve trying various combinations of usernames and passwords until the correct one is found. One of the oldest existing methods that is still used, traditionally this method is slow but, when scaled to hundreds of thousands of bots each sending thousands of credentials checks, it can lead to compromised accounts.
Expand All @@ -41,6 +43,9 @@ For instance, in 2020, a [brute force attack on the music streaming service Spot

[SuperTokens Brute Force Attack Detection](https://supertokens.com/docs/attackprotectionsuite/introduction#brute-force-attack-detection) feature tracks the number of multiple failed login attempts or password resets in a short period. The system will block further attempts to prevent malicious actors from gaining access to sensitive accounts, particularly when users use weak or common passwords.


![Password breach detection](./Password%20Breach%20Detection.png)

### **2. Password Breach Detection**

Despite the issues associated with password-based authentication it still tends to be the most popular type of authentication mechanism. As mentioned in our [blog about MFA](https://supertokens.com/blog/benefits-of-multi-factor-authentication) using compromised passwords can be a huge security breach. Despite this many users will reuse passwords across multiple services. When one of these services suffers a breach, attackers often use the leaked credentials to attempt logins on other platforms (credential stuffing).
Expand All @@ -49,6 +54,9 @@ In 2019, the ["Collection #1" breach](https://en.wikipedia.org/wiki/Collection_N

[SuperTokens Password Breach Detection ](https://supertokens.com/docs/attackprotectionsuite/introduction#password-breach-detection)cross-references potential user passwords with known leaked password databases. This way SuperTokens can proactively alert users to update compromised passwords, ensuring that they don't remain vulnerable,


![impossible travel](./Impossible%20Travel%20Detection.png)

### **3. Impossible Travel Detection**

When a user logs in from two geographically distant locations within a short period, it's unlikely to be a legitimate action, as physical travel between the two points would be impossible.
Expand All @@ -57,30 +65,38 @@ Account takeovers due to impossible travel have affected industries like banking

[SuperTokens Impossible Travel Detection](https://supertokens.com/docs/attackprotectionsuite/introduction#password-breach-detection) helps mitigate this by monitoring login locations and flagging suspicious activity. If the system detects an impossible travel event, it can prompt additional security measures to prevent account takeovers and unauthorized access.

![bot detection](./Bot%20Detection.png)

### **4. Bot Detection**

Malicious bots automate harmful activities like credential stuffing (repeated login attempts using stolen passwords), account takeover attempts, or scraping sensitive data from websites.

**Problem Solved**: SuperTokens uses behavioral analysis and advanced algorithms to detect and block bots before they can cause damage, ensuring human users aren’t affected.
In 2019, the gaming platform Fortnite faced large-scale credential stuffing bot attacks, leading to hundreds of thousands of compromised accounts. Attackers stole in-game purchases and user data. Without bot detection systems in place, the financial and reputational damage from such attacks can be immense.

SuperTokens uses behavioral analysis and advanced algorithms to detect and block bots before they can cause damage, ensuring human users aren’t affected.

**Real-world Issue**: In 2019, the gaming platform Fortnite faced large-scale credential stuffing bot attacks, leading to hundreds of thousands of compromised accounts. Attackers stole in-game purchases and user data. Without bot detection systems in place, the financial and reputational damage from such attacks can be immense.
![suspicious ip detection](./Suspicious%20IP%20Detection.png)

### **5. Suspicious IP Detection**

Malicious actors often use tools like VPNs, TOR, or proxy servers to hide their location and identity, bypassing regional restrictions or trying to commit fraud.

**Problem Solved**: By flagging suspicious IPs known for fraudulent activities, SuperTokens helps prevent unauthorized access from high-risk sources, improving security for end-users.
In 2020, a large-scale attack on financial institutions using compromised VPNs led to fraudulent wire transfers amounting to millions of dollars. The attackers masked their locations and IPs using proxy servers, which went undetected due to weak IP detection mechanisms.

By flagging suspicious IPs known for fraudulent activities, SuperTokens helps prevent unauthorized access from high-risk sources, improving security for end-users.

**Real-world Issue**: In 2020, a large-scale attack on financial institutions using compromised VPNs led to fraudulent wire transfers amounting to millions of dollars. The attackers masked their locations and IPs using proxy servers, which went undetected due to weak IP detection mechanisms.
![new device detection](./New%20Device%20Detection.png)

### **6. New Device Detection**

When a user logs in from a new or previously unseen device, it could signal an unauthorized attempt to access the account.

In 2021,[ attackers exploited mobile banking apps](https://www.nerdwallet.com/article/banking/banking-apps-security) by logging into accounts from new devices and using password resets to bypass security, resulting in the theft of funds and personal data. Many of these breaches could have been avoided with stronger device detection.
In 2021,[attackers exploited mobile banking apps](https://www.nerdwallet.com/article/banking/banking-apps-security) by logging into accounts from new devices and using password resets to bypass security, resulting in the theft of funds and personal data. Many of these breaches could have been avoided with stronger device detection.

[SuperTokens' New Device Detection](https://supertokens.com/docs/attackprotectionsuite/introduction#password-breach-detection) helps prevent such attacks by flagging logins from unfamiliar devices and triggering additional verification steps, such as multi-factor authentication (MFA). This ensures that unauthorized parties cannot easily access user accounts, adding a crucial layer of protection.

![device count tracking](./Device%20Count%20Tracking.png)

### **7. Device Count Tracking**

Tracking the number of devices linked to a user account can be crucial for identifying unusual behavior. For instance, if a user who normally logs in from one or two devices suddenly accesses the account from several new devices, it might signal a security breach.
Expand All @@ -89,6 +105,8 @@ In[ 2020, several e-commerce platforms experienced account takeover attacks](htt

[SuperTokens' Device Tracking](https://supertokens.com/docs/attackprotectionsuite/introduction#password-breach-detection) feature monitors the number of devices associated with each account, alerting users or administrators to potential risks. Identifying unusual usage patterns helps prevent unauthorized access and account takeovers.

![requester detection](./Requester%20Detection.png)

### **8. Requester Detection**

Some attackers attempt to evade detection by spoofing device details or rapidly switching between different requesters to mask their identity.
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 68338dc

Please sign in to comment.