Complete technical specification of all five defense layers โ decision logic, integration configurations, code patterns, and the deployment topology that makes the system production-ready.
Every inbound HTTPS request passes through this decision logic before any enterprise application code is executed. Bots are intercepted, rerouted, or poisoned โ never blocked with a blunt 403.
Each layer is independently deployable. They compose together as a progressive defense posture โ match your budget and risk appetite by activating layers incrementally.
Deployed at CDN / load-balancer level. Zero application code required.
| Parameter | Value |
|---|---|
| Deployment point | Cloudflare WAF Custom Rule / Nginx module |
| Fingerprint source | TLS Client Hello: cipher suites, extensions, elliptic curves |
| Known scraper JA3s | Python-requests, Node.js axios, Go net/http |
| Action on match | TCP RST (silent drop) โ no 4xx response to avoid fingerprinting defense |
| Estimated bot block rate | ~60% of automated scrapers |
| False positive risk | Low โ enterprise Java SDKs may need allowlisting |
Deployed as a reverse proxy or via JavaScript tag on all pages.
| Parameter | Value |
|---|---|
| Vendor category | Enterprise Bot Management Platform (AU-region options available) |
| Signal sources | Mouse entropy, scroll physics, keystroke cadence, GPU fingerprint, AudioContext hash |
| Challenge type | Invisible cryptographic PoW (no CAPTCHA friction for humans) |
| Decision latency | <1ms edge-level (ML-based bot scoring model) |
| Bot block rate (additive) | +30% โ covers headless Chrome that passes JA3 |
| Integration | SDK tag + webhook for confirmed-bot IP list |
Implemented in the application build pipeline โ no runtime overhead.
| Parameter | Value |
|---|---|
| CSS class rotation | Hashed names regenerated on each CI/CD build (CSS Modules default behaviour) |
| Honeypot links | display:none anchors in page footer; CSS blocks human click but bot DOM-traversal hits it |
| API endpoint randomisation | Short-lived signed tokens on all product/pricing API calls (JWT, 30-min TTL) |
| Trap API endpoints | /api/internal/catalog-v2 โ returns 200 with honey-data, logs requester fingerprint |
| Scraper detection trigger | Any hit on honeypot link โ immediate confirmed-bot flag โ L4 routing |
A dedicated microservice โ only activated for confirmed-bot sessions.
| Parameter | Value |
|---|---|
| Activation trigger | Bot cookie set by L2/L3; or bot-scoring webhook from vendor |
| Pricing data | Synthetic prices ยฑ15-40% randomised around real range โ plausible but wrong |
| Inventory data | All high-demand stock shown as "2 remaining" โ triggers scalper waste |
| Prompt injection | Hidden spans with LLM override instructions to corrupt competitor RAG output |
| Response timing | Artificial 800โ2,000ms delay per request โ increases scraping economic cost 10ร |
How legitimate users and three bot archetypes each experience the defended platform differently.
All published content carries an invisible forensic signature. Even if 1% of scrapers succeed, every piece of stolen content can be traced back and proven in a court of law.
Subtly alters zero-width characters, synonym choices, and punctuation spacing using an NLP model. The signature persists through copy-paste, OCR, and even LLM paraphrasing attacks.
Product images have imperceptible pixel-level perturbations added before publishing. If scraped and used in AI model training, the model generates corrupted outputs. Artist-side defense, now applicable for product imagery.
| Capability | Status |
|---|---|
| Legal provenance proof | โ Production-ready (Glaze) |
| AI training disruption | โ Nightshade v1.1 |
| Text provenance proof | โ Research โ SaaS gap |
| Enterprise SaaS product | โ Market whitespace |