
Application Security - Bot management
Automated bot traffic can negatively impact on your web application, in terms of availability, infrastructure costs, skewed analytics and fraudulent activities.
- Rules used to block HTTP Floods (L7 DDoS attacks), such as Rate limits, Managed IP Reputation rule groups (Amazon IP reputation list, Anonymous IP list, etc..), and rules automatically created by Shield Advanced's automatic application layer DDos mitigation.
- AWS WAF Bot Control managed rule group configured with common protection level to block self identifying bots, or with high confidence bot signatures. This rule group can be configured with granularity to differentiate the management of different bot categories such as Http Library or Scraping Framework. This blog gives you concrete examples a granular configuration of AWS WAF Bot Control with labels and scope-down statements.
- Managed rules provided by security vendors in the AWS Marketplace, such as Bot Protection Rules by F5 and Active Malicious Bots by ThreatSTOP.
- Intelligent threat integration SDKs – These are designed to work with Intelligent threat mitigation rules. They verify the client application and provide AWS token acquisition and management. They function similar to AWS WAF Challenge rule action.
- CAPTCHA integration JS API – These APIs verify end users with customized CAPTCHA puzzle that customers manage in their application. This is similar to the functionality provided by the AWS WAF CAPTCHA rule action, but with added control over the puzzle placement and behavior. This feature is available for JavaScript applications.
- Consuming high risk events emitted by Cognito during signin/sign up process.
- Consuming high risks events identified by Fraud Detector. Fraud Detector uses machine learning (ML) and 20 years of fraud detection expertise from Amazon Web Services (AWS) and Amazon.com to automatically identify potential fraudulent patterns performed by humans and bots in real-time. Fraud Detector allows detections of Fraud by analyzing application-level user behavior, using your own historical fraud data to train, test, and deploy custom fraud detection machine learning models tailored to your use case.
- SaaS reverse proxy-based solution, sitting between CloudFront and your origin.
- Globally replicated Bot Mitigation API that can be called by Lambda@Edge for every incoming request (i.e. configured on viewer request event) to decide how to manage the request.
- OLX: Architecture blog and Case study
Any opinions in this post are those of the individual author and may not reflect the opinions of AWS.