Главная
Study mode:
on
1
Intro
2
The Internet is effectively powered by robots
3
Robot vs human
4
Bot traffic
5
What are bots actually doing
6
HTTP verbs
7
Scrapers
8
API Docs
9
Asymmetric Warfare
10
Scanning
11
Talk to your company
12
Web application firewalls
13
Denial of service attacks
14
Focused target
15
Requests
16
Carding Attack
17
Carding
18
Behavior Deviation
19
Access Patterns
20
Geolocation
21
User Agent
22
Success Rates
23
Intent
24
JavaScript
25
Flash
26
User Experience
27
Fingerprints
28
Team Management
29
Rapsheet
30
Reduce Noise
31
Improve Confidence in Data
32
References
Description:
Explore bot management strategies and cybersecurity challenges in this GOTO Chicago 2015 conference talk. Delve into the world of internet bots, their impact on web traffic, and the complexities of maintaining multi-faceted systems. Learn about various types of bots, their purposes, and the challenges they pose to businesses. Examine different attack vectors, including scraping, scanning, and denial of service attacks. Discover techniques for distinguishing between human and bot traffic, such as analyzing behavior patterns, geolocation, and user agents. Gain insights into implementing effective bot management solutions, including web application firewalls and JavaScript-based detection methods. Understand the importance of team management and data confidence in combating bot-related issues. Equip yourself with knowledge to protect your systems, improve data quality, and enhance user experience in the face of bot-driven challenges.

Rock 'Em Sock 'Em Robots - Bot Swatting Like the Pros

GOTO Conferences
Add to list