Skip to main content

Cloaking and Bot Protection System

How It Works

Protection Levels

Level 1: Basic Filtering

Initial incoming traffic check:

Check MethodDescriptionEffectiveness
User-Agent AnalysisBot signature detectionBasic protection
Network CheckHostname and network analysisDetects obvious bots
DNS ValidationDNS record verificationIdentifies suspicious IPs
Recommendation

It's recommended to always enable the basic level, as it doesn't add extra server load.

Level 2: Advanced Protection

Comprehensive IP and activity analysis:

  • Blacklists

  • Database of 2500+ lists

  • Regular updates

  • Auto synchronization

  • IP Analytics

  • Database of 1+ billion known bot IPs

  • Behavioral patterns

  • Historical activity

  • Activity Monitoring

  • Request frequency

  • Behavioral patterns

  • Activity anomalies

Level 3: Maximum Security

JavaScript Checks

  • Code execution
  • Mouse events
  • DOM interaction
  • Canvas fingerprinting
  • WebGL checks

Environment

  • Time zone
  • Screen resolution
  • Browser plugins
  • System fonts
  • WebRTC data

Bot Identification Methods

Technical Parameters

Behavioral Analysis

  1. Navigation Patterns
  • Cursor movement speed
  • Naturalness of movement
  • Action sequence
  1. Page Interaction
  • Time between clicks
  • Scrolling pauses
  • Focus on elements
  1. Anomalies
  • Atypical sequences
  • Actions too fast
  • Unusual patterns

Bot Handling

Processing Options

  1. Blocking
  • Return error
  • Empty page
  • Placeholder
  1. Redirect
  • Alternative content
  • Another site
  • Special page
  1. Monitoring
  • Activity logging
  • Data collection
  • Pattern analysis

Redirect Configuration

Important

Proper redirect configuration is critical for effective cloaking. Use different types of redirects for different situations.

Redirect Types for Bots

  • HTTP 301/302
  • Meta refresh
  • JavaScript
  • Server-side

Configuration Parameters

  • Delay
  • Redirect chains
  • Conditional transitions
  • Dynamic URLs

Integration with External Systems

API Integrations

  • Bot data exchange
  • External blacklists
  • Monitoring systems
  • Analytics services

Data Export

  • Export formats
  • Report automation
  • BI system integration

Troubleshooting

Common Issues and Solutions

IssueCauseSolution
False PositivesRules too strictRelax checks
Bot BypassInsufficient checksStrengthen controls
Slow PerformanceToo many checksOptimize rules