www.helpnetsecurity.com
Open in
urlscan Pro
34.218.126.5
Public Scan
URL:
https://www.helpnetsecurity.com/2024/09/20/bot-detection-techniques/
Submission: On September 23 via api from TR — Scanned from DE
Submission: On September 23 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - editor's choice selection of topics (twice per month)</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1727057525"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Dan Pinto, CEO, Fingerprint September 20, 2024 Share HOW TO DETECT AND STOP BOT ACTIVITY Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and degrade site performance. New technologies are enabling fraudsters to strike faster and inflict more damage. Bots’ indiscriminate and large-scale attacks pose a risk to businesses of all sizes in all industries. But there are techniques your business can adopt to address this malicious activity. By leveraging advanced, multi-layered strategies to block bots, the following categories of techniques will highlight who—or what—is visiting your website, enabling you to restrict access to unwanted visitors. Unfortunately, there is no magic, one-size-fits-all solution. Combining these approaches empowers you to create a robust defense against bots. TECHNIQUES TO DETECT BOTS While not all bots are malicious, even “good” bots (such as search engine crawlers) can potentially hinder performance and skew analytics. Visitor insight is critical to appropriately managing all threat types and generating accurate visitor analytics. To identify bot activity, companies have traditionally relied on red flags like: * Traffic spikes * High bounce rates * Short sessions * Strange conversion patterns * Impossible analytics (such as billions of page views) Unfortunately, by the time you spot these signs, it’s often too late to prevent damage. Advanced bots may not even set off these alarms because many detection tools fail to keep up with changing bot technology. Turning to more robust techniques that evaluate technical characteristics and behavioral data gives you the power to turn back malicious or uninvited bots. DEVICE CHARACTERISTICS Browser and device attributes can be an indication of bots. There are several facets to consider. IP ADDRESSES Specific IP addresses and proxies are known to host bots. A robust bot detection system should leverage a frequently updated database of identified bot-associated IPs, data centers, malicious proxies, and other sources linked to automated activity. While constantly changing bot IPs mean this solution is not foolproof, a dynamic blocklist adds a strong verification signal. HARDWARE AND SOFTWARE CONFIGURATIONS Analyzing a device or browser’s characteristics and settings uncovers suspicious visitors. Sites can examine device attributes like screen dimensions, OS, storage, memory, processors, and graphics rendering capabilities to identify configurations that deviate from baselines. Browser-related factors include how a client executes JavaScript, renders pages, and handles other interactive tasks. Significant variances from expected behavior are strong indicators of bot-generated traffic. Inconsistencies between reported attributes, such as a mismatched time zone and IP address, also indicate potential manipulation. LEAKED DATA Bots leak data that human users do not, such as errors, network overrides, and API changes. Looking for this information allows websites to block unwanted visitors. Device fingerprinting aids bot detection by using device and browser attributes to create a unique identifier. This approach reveals inconsistencies and unusual configurations that could signal bot activity. To escape detection, bots would need to create a different and realistic device fingerprint per visit to the website. AUTHENTICATION AND VERIFICATION TECHNIQUES Robust authentication and verification techniques help block automated bots from accessing accounts, filling out forms, or contributing content (e.g., product reviews). CAPTCHAS AND CHALLENGE-RESPONSE TESTS These tests are a longstanding strategy against bots, but they may have outlived their usefulness. We’ve all selected the pictures of cars or typed in characters from an image. Not only are CAPTCHA tests annoying to users, but they aren’t that effective. Studies show robots are actually better than humans at solving these puzzles. Challenge-response tests can be slightly more secure but still create significant friction for real users. If you choose to use these tests, you should also employ additional security measures like risk-based authentication. MULTI-FACTOR AUTHENTICATION (MFA) Bots can easily circumvent passwords through credential stuffing. MFA enhances security by requiring additional verification steps, such as providing a code or a biometric. Bots may be able to guess a password, but they likely won’t have access to the second factor, making this a solid additional layer of security. Device fingerprinting enhances these authentication strategies. When a login attempt comes from a new device or location, you can enable additional security steps, such as MFA. This approach also allows you to catch logins for multiple accounts coming from a single device, which can be another sign of bots. BEHAVIORAL ANALYSIS A site visitor’s behavior gives insight into its legitimacy. Automated programs act much differently than a real person would. There are several ways to evaluate behavior. PAGE INTERACTIONS Mouse movements, scrolling cadence, and page element engagements are key indicators. Humans complete these actions intermittently and randomly, while bots are systematic and consistent. Rapid scrolling, clicking, and login attempts signal potential bot activity. NAVIGATION Examine user movement between pages and time spent on each page. Bots quickly move through many pages, following predictable URL patterns. Humans spend longer on each page and navigate more randomly as they deliberately search for information. FORM COMPLETION Bots can fill out multiple fields instantaneously, usually with repetitive, predictable or nonsensical information. Telltale signs of a human filling out a form include making and fixing typos or skipping optional fields. However, evaluating behavior manually is slow, prone to error, and resource-intensive. Detecting bots in real time requires data collection and analysis tools. Machine learning (ML) enhances the capabilities of these platforms. By analyzing billions of data points, ML programs continuously learn and adapt to identify bot-like behaviors as techniques evolve. You can also exploit bots’ automation by setting traps with a “honeypot.” These decoy websites mimic real sites but are isolated and monitored. Humans won’t find them, but bots will. If a visitor interacts with the site, such as clicking or filling a field, you will know it is an automated program and can take appropriate action, like blocking the IP address from your site. A MULTI-LAYERED APPROACH Relying on only one of these approaches is inadequate to detect bots and has a high chance of impacting many legitimate users, all while missing a significant proportion of advanced automated scripts. The ideal strategy encompasses behavior, device characteristics and authentication techniques. Bot detection tools leveraging device intelligence provide detection capabilities by combining fingerprinting with intention analysis. When you can assess device attributes and user behavior together, suspicious user detection becomes more accurate. A solution with ML further enhances analysis capabilities and keeps pace with growing bot sophistication. With this level of precision, you can confidently flag or block bots while reducing friction for legitimate users. Bots are getting more advanced, but so are the tools to thwart them. Instead of taking an outdated approach with legacy tools and mindsets that have not kept up with evolving technology, businesses need to adopt a new, more updated approach to detect bad bots. Using technology like device intelligence can enable businesses to proactively take action to prevent malicious activity rather than just mitigating damage. More about * access management * authentication * bot * cybersecurity * device fingerprinting * Fingerprint * opinion * strategy Share FEATURED NEWS * How to detect and stop bot activity * Striking the balance between cybersecurity and operational efficiency * Windows users targeted with fake human verification pages delivering malware eBook: Navigating compliance with a security-first approach SPONSORED * eBook: Cloud security skills * Download: The Ultimate Guide to the CISSP * eBook: Do you have what it takes to lead in cybersecurity? DON'T MISS * How to detect and stop bot activity * Striking the balance between cybersecurity and operational efficiency * Rising identity security risks: Why organizations must act now * Windows users targeted with fake human verification pages delivering malware * Patch this critical Safeguard for Privileged Passwords auth bypass flaw (CVE-2024-45488) Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - editor's choice selection of topics (twice per month) Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×