Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

This topic describes a feature called Datadog Attacker Fingerprint to identify attackers beyond IP addresses.

Overview

Datadog Attacker Fingerprint identifies attackers beyond IP addresses. Datadog Attacker fingerprints are automatically computed and added to your traces on attack or login attempts when Application Security Management (ASM) is enabled on your service.

Datadog Attacker fingerprints are composed of several fragments:

  • Endpoint Identifier
  • Session Identifier
  • Header Identifier
  • Network Identifier

Each fragment identifies request specifics by looking for certain headers and query body fields, and by hashing cookie values and query parameters.

Attacker Fingerprint fragment details

Endpoint identifier

The endpoint identifier fragment provides information about a specific endpoint, as well as the parameters used to call it. This fragments uses the following information:

  • HTTP method
  • Hash of request URI
  • Hash of query parameter fields
  • Hash of body fields

Session identifier

The session identifier fragment tracks users based on their session information and whether they are authenticated. This fragment uses the following information:

  • Hash of user ID
  • Hash of cookie fields
  • Hash of cookie values
  • Hash of session ID

If all of the fields are unavailable, the fragment is omitted as it does not provide meaningful information.

Header identifier

The header identifier fragment provides information about the headers used in the request. This particular fragment uses the following information:

  • Presence of known headers: Referer, Connection, Accept-Encoding, etc.
  • Hash of user agent
  • The number of unknown headers
  • Hash of unknown headers. The list of unknown headers excludes all XFF headers, cookies and x-datadog headers.

Network identifier

The network identifier fragment provides information about the network part of the request. This fragment uses the following information:

  • The number of IPs in the XFF header used by the caller to determine the client’s IP.
  • The presence or absence of the known XFF headers

How to use Attacker Fingerprints

Fragments can be used as filters in the ASM Traces explorer by filtering on the desired fingerprint field. For example: @appsec.fingerprint.header.ua_hash:e462fa45 will filter on all requests that have the same user agent hash.

Screenshot of an ASM trace with attacker fingerprint in the trace side panel

Attacker fingerprints are used in the Attacker Clustering feature. If a significant portion of your traffic presents the same fingerprint attributes, attacker clustering will show it has a common attack attribute.

Further reading

Documentation, liens et articles supplémentaires utiles: