IMITATION ATTACK SCALE


The more sophisticated the attack,
the more closely it represents legitimate user traffic.

Download the Imitation Attack Scale overview PDF.

Shape Security, the Shape logo, and Imitation Attack Scale are trademarks or registered trademarks of Shape Security.
© 2018 Shape Security, Inc. All rights reserved.