TechLand Blog

What are Traps?

Traps,” as the name suggests, are instances of logic which analyse every click or impression which goes through Botman.

These traps are threat handlers – traps that handle high-level threat, medium-level threat, and low-level threat.

Once a trap identifies a certain threat, it can neutralise it or forward it for analysis. These settings are left to the customer. Having the concept of traps helps in being selective for the type of traffic which is being handled. There are some traps that must be enabled, and there are some which can be optional for the type of campaign which is running.

Some examples of traps are the following:

Data Center Trap – Identifies traffic from data centers

Botnet Trap – Identifies traffic from C&C botnets

1×1 Trap – Identifies traffic from invisible 1×1 source pixels

Non-viewable Trap – Identifies traffic from non-viewable sources

Click Flood Trap – Identifies click flood in campaigns

Emulators Trap – Identifies emulator and fake device traffic

Domain Spoof Trap – Identifies spoofed domain traffic

Pop Trap – Identifies pop traffic

Torrent Trap – Identifies torrent traffic

Malware Trap – Identifies malware-originated traffic

AdWare Trap – Identifies adware-originated traffic

Non-Brand Safe Trap – Identifies non-brand safe traffic

Proxy Trap – Identifies public P\proxy, TOR exit nodes traffic

Trojan Trap – Identifies Trojan, spam traffic, etc.

Having these traps enabled strengthens the analysis of campaign traffic and helps in decision making.

Categories:

Leave a Reply

Your email address will not be published. Required fields are marked *