Bot Management

Sometimes the incoming web traffic is comprised of bots and most organizations suffer from bot attacks. Web and mobile applications are big revenue drivers for business and most companies are under the threat of advanced cyberattacks, such as bots. A bot is a software program that automatically performs certain actions repeatly at a much faster rate than a human. Bots can interact with webpages, submit forms, execute actions, scan texts, or download content. They can access videos, post comments, and tweet on social media platforms. Some bots, known as chatbots, can hold basic conversations with human users. A bot that performs a helpful service, such as customer service, automated chat, and search engine crawlers are good bots. At the same time, a bot that can scrape or download content from a website, steal user credentials, spam content, and perform other kinds of cyberattacks are bad bots. With a good amount of bad bots performing malicious tasks, it is essential to manage bot traffic and protect your web applications from bot attacks. By using Citrix bot management, you can detect the incoming bot traffic and mitigate bot attacks to protect your web applications. Citrix bot management helps identify bad bots and protect your appliance from advanced security attacks. It detects good and bad bots and identifies if incoming traffic is a bot attack. By using bot management, you can mitigate attacks and protect your web applications.

Citrix ADC bot management provides the following benefits:

  • Defend against bots, scripts, and toolkits. Provides real-time threat mitigation using static signature based defense and device fingerprinting.
  • Neutralize automated basic and advanced attacks. Prevents attacks, such as App layer DDoS, password spraying, password stuffing, price scrapers, and content scrapers.
  • Protect your APIs and investments. Protects your APIs from unwarranted misuse and protects infrastructure investments from automated traffic.

Some use cases where you can benefit by using the Citrix bot management system are:

  • Brute force login. A government web portal is constantly under attack by bots attempting to brute force user logins. The organization discovered the attack by looking through web logs and seeing specific users being hit over and over again with rapid login attempts and passwords incrementing using a dictionary attack approach. By law, they need to protect themselves and their users. By deploying the Citrix bot management, they can stop brute force login using device fingerprinting and rate limiting techniques.
  • Block bad bots and device fingerprint unknown bots. A web entity gets 100,000 visitors each day. They have to upgrade the underlying footprint and they are spending a fortune. In a recent audit, the team discovered that 40 percent of the traffic came from bots, scraping content, picking news, checking user profiles, and more. They want to block this traffic to protect their users and reduce their hosting costs. Using bot management, they can block known bad bots, and fingerprint unknown bots that are hammering their site. By blocking these bots, they can reduce bot traffic by 90 percent.

What does Citrix bot management do

The Citrix bot management helps organizations protect their web applications and public assets from advanced security attacks. When an incoming traffic is bot, the bot management system detects the bot type, assigns an action, and generates bot insights, as shown in the following diagram.

Bot management system

How does Citrix ADC bot management work

The following diagram shows how the Citrix ADC bot management works. The process involves six detection techniques that help in detecting the incoming traffic as a good or a bad bot. Good bots are allowed, bad bots are dropped, and undetected bots are rate limited.

Bot management system

  1. The process starts by enabling bot management feature on the appliance.
  2. When a client sends a request, the appliance evaluates the traffic using bot policy rules. If the incoming request is identified as a bot, the appliance applies a bot detection profile.
  3. You must bind the default or custom bot signature file to the bot detection profile. The bot signature file has a list of bot signature rules for identifying the incoming bot type.
  4. The bot detection rules are available under six detection categories in the signature file. The categories are white list, black list, static signature, IP reputation, device fingerprint, and rate limiting. Based on the bot traffic, the system applies a detection rule to the traffic.
  5. If the incoming bot traffic matches an entry in the bot white list, the system bypasses other detection techniques and the associated action logs the data.
  6. If the incoming bot traffic matches an entry in the bot black list, the detection stops and the request is dropped.
  7. If the incoming bot traffic matches an entry in the IP Reputation list, the request is redirected, logged, or dropped depending on the configured action.
  8. If the request matches the rate limiting detection category, the request is dropped, logged, or redirected depending on the configured action.
  9. If the request behavior relates to any anomaly (bad bot) and if it matches the evaluation of device fingerprint detection technique, then the associated action drops, redirects, or logs the data.
  10. After detecting the bot type, based on the action triggered, you can view bot insights on the Citrix ADM server.