Stopping Automated Attack Tools : An analysis of web-based application techniques capable of defending against current and future automated attack tools.

Quote:
An almost infinite array of automated tools exist to spider and mirror application content extract confidential material. brute force guess authentication credentials, discover code injection flaws, fuzz application variables for exploitable overflows, scan for common files or vulnerable CGI's, and generally attack or exploit web-based application flaws. While of great value to security professionals, the use of these tools by attackers represents a clear and present danger to all organisations.

These automated tools have become increasingly popular for attackers seeking to compromise the integrity of online applications, and are used during most phases of an attack. Whilst there are a number of defence techniques which, when incorporated into a web-based application, are capable of stopping even the latest generation of tools, unfortunately most organisations have failed to adopt them.
A good one to read if your into network security
_________________________
Unless you try something to which you have not already succeeded ~ Then you shall NEVER grow