
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 10:06:39 GMT</lastBuildDate>
        <item>
            <title><![CDATA[25,000 new trees in Nova Scotia]]></title>
            <link>https://blog.cloudflare.com/25-000-new-trees-in-nova-scotia/</link>
            <pubDate>Wed, 13 Jul 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is proud to announce the first 35,000 trees from our commitment to help clean up bad bots (and the climate) have been planted ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare is proud to announce the first 25,000 trees from our commitment to help <a href="/cleaning-up-bad-bots/">clean up bad bots (and the climate</a>) have been planted.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IX7Cf2mOtF4ZfbQ4FbgQb/4437a14648c2e148e849e2c2a207d3fe/Screenshot-2022-07-13-at-13.52.00.png" />
            
            </figure><p>Working with our partners at <a href="https://onetreeplanted.org/">One Tree Planted (OTP)</a>, Cloudflare was able to support the restoration of 20 hectares of land at <a href="https://www.victoriaparktruro.ca/">Victoria Park</a> in Nova Scotia, Canada. The 130-year-old natural woodland park is located in the heart of Truro, NS, and includes over 3,000 acres of hiking and biking trails through natural gorges, rivers, and waterfalls, as well as an old-growth eastern hemlock forest.</p><p>The planting projects added red spruce, black spruce, eastern white pine, eastern larch, northern red oak, sugar maple, yellow birch, and jack pine to two areas of the park. The first area was a section of the park that recently lost a number of old conifers due to insect attacks. The second was an area previously used as a municipal dump, which has since been covered by a clay cap and topsoil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PgH1H6yaMcwBrcXB2i2Wz/f257025dd25e930fafb8463ef56edd6f/image5-5.png" />
            
            </figure><p>Our tree commitment began far from the Canadian woodlands. In 2019, we launched an ambitious tool called <a href="/cleaning-up-bad-bots/">Bot Fight Mode</a>, which for the first time <i>fought back</i> against bots, targeting <a href="https://www.cloudflare.com/learning/bots/what-is-content-scraping/">scrapers</a> and other automated actors.</p><p>Our idea was simple: preoccupy bad bots with nonsense tasks, so they cannot attack real sites. Even better, make these tasks <i>computationally expensive</i> to engage with. This approach is effective, but it forces bad actors to consume more energy and likely emit more greenhouse gasses (GHG). So in addition to launching Bot Fight Mode, we also committed to supporting tree planting projects to account for any potential environmental impact.</p>
    <div>
      <h3>What is Bot Fight Mode?</h3>
      <a href="#what-is-bot-fight-mode">
        
      </a>
    </div>
    <p>As soon as Bot Fight Mode is enabled, it immediately starts challenging <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/">bots</a> that visit your site. It is available to all Cloudflare customers for free, regardless of <a href="https://www.cloudflare.com/plans/">plan</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZOQWetnhYb0G06xisWK7i/1bd764cd2d9459492d80e9ef8f166edc/image4-5.png" />
            
            </figure><p>When Bot Fight Mode identifies a bot, it issues a <i>computationally expensive</i> challenge to exhaust it (also called “tarpitting"). Our aim is to disincentivize attackers, so they have to find a new hobby altogether. When we tarpit a bot, we require a significant amount of compute time that will stall its progress and result in a hefty server bill. Sorry not sorry.</p><p>We do this because bots are leeches. They draw resources, slow down sites, and abuse online platforms. They also <a href="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/">hack into accounts</a> and steal personal data. Of course, we allowlist a small number of <a href="https://www.cloudflare.com/learning/bots/how-to-manage-good-bots/">bots that are well-behaved</a>, like Slack and Google. And Bot Fight Mode only acts on traffic from cloud and hosting providers (because that is where bots usually originate from).</p><p><b>Over 550,000 sites use Bot Fight Mode today!</b> We believe this makes it the most widely deployed <a href="https://www.cloudflare.com/products/bot-management/">bot management solution</a> in the world (though this is impossible to validate). Free customers can enable the tool <a href="https://dash.cloudflare.com/?zone=security/bots">from the dashboard</a> and paid customers can use a special version, known as <a href="/super-bot-fight-mode/">Super Bot Fight Mode</a>.</p>
    <div>
      <h3>How many trees? Let's do the math ?</h3>
      <a href="#how-many-trees-lets-do-the-math">
        
      </a>
    </div>
    <p>Now, the hard part: how can we translate bot challenges into a specific number of trees that should be planted? Fortunately, we can use a series of unit conversions, similar to those we used to calculate Cloudflare’s total GHG emissions.</p><p>We started with the following assumptions.</p><p>Table 1.</p><table><tr><td><p><b>Measure</b></p></td><td><p><b>Quantity</b></p></td><td><p><b>Scaled</b></p></td><td><p><b>Source</b></p></td></tr><tr><td><p>Energy used by a standard server</p></td><td><p>1,760.3 kWh / year</p></td><td><p>To hours (0.2 kWh / hour)</p></td><td><p><a href="http://web.archive.org/web/20230401003729/https://www.goclimate.com/about">Go Climate</a></p></td></tr><tr><td><p>Emissions factor</p></td><td><p>0.33852 kgCO2e / kWh</p></td><td><p>To grams (338.52 gCO2e / kWh)</p></td><td><p><a href="http://web.archive.org/web/20230401003729/https://www.goclimate.com/about">Go Climate</a></p></td></tr><tr><td><p>CO2 absorbed by a mature tree</p></td><td><p>48 lbsCO2e / year</p></td><td><p>To kilograms (21 kgCO2e / year)</p></td><td><p><a href="http://web.archive.org/web/20230401003729/https://onetreeplanted.org/pages/carbon-footprint">One Tree Planted</a></p></td></tr></table><p>Next, we selected a high-traffic day to model the rate and duration of bot challenges on our network. On May 23, 2021, Bot Fight Mode issued 2,878,622 challenges, which lasted an average of 50 seconds each. In total, bots spent 39,981 hours engaging with our network defenses, or more than four years of challenges in a single day!</p><p>We then converted that time value into kilowatt-hours (kWh) of energy based on the rate of power consumed by our generic server listed in Table 1 above.</p><blockquote><p>39,981 (hours) x .2 (kWh/hour) = 7,996 (kWh)</p></blockquote><p>Once we knew the total amount of energy consumed by bad bot servers, we used an emissions factor (the amount of greenhouse gasses emitted per unit of energy consumed) to determine total emissions.</p><blockquote><p>7,996 (kwh) x 338.52 (gCO2e/kwh) = 2,706,805 (gCO2e)</p></blockquote><p>If you have made it this far, clearly you like to geek out like we do, so for the sake of completeness, the unit commonly used in emissions calculations is carbon dioxide <i>equivalent</i> (CO2e), which is a composite unit for all six GHGs listed in the Kyoto Protocol weighted by <a href="https://www.epa.gov/ghgemissions/understanding-global-warming-potentials">Global Warming Potential</a>.</p><p>The last conversion we needed was from emissions to trees. Our partners at OTP found that a mature tree absorbs roughly 21 kgCO2e per year. Based on our total emissions that translates to roughly 47,000 trees per server, or 840 trees per CPU core. However, in our original post, we also noted that given the time it takes for a newly planted tree to reach maturity, we would multiply our donation by a factor of 25.</p><p>In the end, over the first two years of the program, we calculated that we would need approximately 42,000 trees to account for all the individual CPU cores engaged in Bot Fight Mode. For good measure, we rounded up to an even 50,000.</p><p>We are proud that most of these trees are already in the ground, and we look forward to providing an update when the final 25,000 are planted.</p>
    <div>
      <h3>A piece of the puzzle</h3>
      <a href="#a-piece-of-the-puzzle">
        
      </a>
    </div>
    <blockquote><p>"Planting trees will benefit species diversity of the existing forest, animal habitat, greening of reclamation areas as well as community recreation areas, and visual benefits along popular hiking/biking trail networks."  - <b>Stephanie Clement, One Tree Planted, Project Manager North America</b></p></blockquote><p>Reforestation is an important part of protecting healthy ecosystems and promoting biodiversity. Trees and forests are also a fundamental part of helping to slow the growth of global GHG emissions.</p><p>However, we recognize there is no single solution to the climate crisis. As part of our mission to help build a better, more sustainable Internet, Cloudflare is investing in <a href="/cloudflare-committed-to-building-a-greener-internet/">renewable energy</a>, tools that help our customers understand and mitigate their own <a href="/understand-and-reduce-your-carbon-impact-with-cloudflare/">carbon footprints</a> on our network, and projects that will help offset or remove <a href="/cloudflare-committed-to-building-a-greener-internet/">historical emissions</a> associated with powering our network by 2025.</p><p><b>Want to be part of our bots &amp; trees effort</b>? <a href="https://developers.cloudflare.com/bots/get-started/free/">Enable Bot Fight Mode today</a>! It’s available on our free plan and takes only a few seconds. By the time we made our first donation to OTP in 2021, Bot Fight Mode had already spent more than 3,000 years distracting bots. That is enough time to watch Stanley Kubrick’s <a href="https://www.imdb.com/title/tt0081505/"><i>The Shining</i></a> more than 10 million times.</p><p>Help us defeat bad bots and improve our planet today!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70LcuDqcrv0Ep09Ik6M4pD/66cc6dd215f2a66a78d74b9757ebba27/image1-1.jpg" />
            
            </figure><p><i>—-For more information on Victoria Park, please visit</i> <a href="https://www.victoriaparktruro.ca/"><i>https://www.victoriaparktruro.ca</i></a><i>For more information on One Tree Planted, please visit</i> <a href="https://onetreeplanted.org/"><i>https://onetreeplanted.org</i></a><i>For more information on sustainability at Cloudflare, please visit</i> <a href="https://www.cloudflare.com/impact/"><i>www.cloudflare.com/impact</i></a></p> ]]></content:encoded>
            <category><![CDATA[Bot Fight Mode]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Sustainability]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6ezajd9Yhr17KZeZnratSh</guid>
            <dc:creator>Patrick Day</dc:creator>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Cloudflare API Gateway]]></title>
            <link>https://blog.cloudflare.com/api-gateway/</link>
            <pubDate>Wed, 16 Mar 2022 12:59:25 GMT</pubDate>
            <description><![CDATA[ Today we’re announcing the Cloudflare API Gateway. We’re going to completely replace your existing gateway at a fraction of the cost ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Over the past decade, the Internet has experienced a tectonic shift. It used to be composed of static websites: with text, images, and the occasional embedded movie. But the Internet has grown enormously. We now rely on API-driven applications to help with almost every aspect of life. Rather than just download files, we are able to <i>engage</i> with apps by exchanging rich data. We track workouts and send the results to the cloud. We use smart locks and all kinds of IoT devices. And we interact with our friends online.</p><p>This is all wonderful, but it comes with an explosion of complexity on the back end. Why? Developers need to manage <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a> in order to support this functionality. They need to monitor and authenticate every single request. And because these tasks are so difficult, they’re usually outsourced to an <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateway</a> provider.</p><p>Unfortunately, today’s gateways leave a lot to be desired. First: they’re not cheap. Then there’s the performance impact. And finally, there’s a data and privacy risk, since <a href="/landscape-of-api-traffic/">more than 50% of traffic</a> reaches APIs (and is presumably sent through a third party gateway). What a mess.</p><p>Today we’re announcing the Cloudflare API Gateway. <b>We’re going to completely replace your existing gateway at a fraction of the cost.</b> And our solution uses the technology behind <a href="https://workers.cloudflare.com/">Workers</a>, <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>, <a href="https://www.cloudflare.com/products/zero-trust/access/">Access</a>, and <a href="https://developers.cloudflare.com/rules/transform/">Transform Rules</a> to provide the most advanced API toolset on the market.</p>
    <div>
      <h2>What is API Gateway?</h2>
      <a href="#what-is-api-gateway">
        
      </a>
    </div>
    <p>In short, it’s a package of features that will do everything for your APIs. We break it down into three categories:</p><p><b>Security</b>These are the products we have already blogged about. Tools like <a href="https://developers.cloudflare.com/api-shield/products/api-discovery/">Discovery</a>, <a href="https://developers.cloudflare.com/api-shield/products/schema-validation/">Schema Validation</a>, <a href="https://developers.cloudflare.com/api-shield/products/volumetric-abuse-detection/">Abuse Detection</a>, and more. We’ve spent a lot of time applying our security expertise to the world of APIs.</p><p><b>Management &amp; Monitoring</b>These are the foundational tools that keep your APIs in order. Some examples: analytics, routing, and authentication. We are already able to do these things with existing products like <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a>, and more features are on the way.</p><p><b>Everything Else</b>These are the small (but crucial) items that keep everything running. Cloudflare already offers SSL/TLS termination, load balancing, and proxy services that can run by default.</p><p>Today’s blog post describes each feature in detail. We’re excited to announce that <i>all</i> the security features are now generally available, so let’s start by discussing those.</p>
    <div>
      <h2>Discovery</h2>
      <a href="#discovery">
        
      </a>
    </div>
    <p>Our customers are eager to protect their APIs. Unfortunately, they don’t always have these endpoints documented—or worse, they <i>think</i> everything is documented, but have unknowingly lost or modified endpoints. These hidden endpoints are sometimes called <a href="https://www.bearer.com/resources/shadow-apis-detect-business-risk">shadow APIs</a>. We need to begin our journey with an exhaustive (and accurate) picture of API surface area.</p><p>That’s where Discovery comes in. Head to the <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/api-shield">Cloudflare dashboard</a>, select the <b>Security</b> tab, then choose “API Shield.” Activate the feature and tell us how you want to identify your API traffic. Most users provide a header (available today), but we can also use the request body or cookie (available soon).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5cYcAk2aZnbvboWf4w7nH5/268c82e1fbdc7457aa5532bf17f72a07/image7.jpg" />
            
            </figure><p>We provide an exhaustive list of your API endpoints. Cloudflare lists each method, path, and additional metadata to help you understand your surface area. We even <i>collapse</i> endpoints that include variables (e.g., <i>/account/</i><b><i>217</i></b>) to become generally applicable (e.g., <i>/account/</i><b><i>{var1}</i></b>).</p><p>Discovery is a powerful countermeasure to entropy. Our customers often expect to find 30 endpoints, but are surprised to learn they have over <i>100</i> active endpoints.</p>
    <div>
      <h2>Schema Validation</h2>
      <a href="#schema-validation">
        
      </a>
    </div>
    <p>Perhaps you already have a schema for your API endpoints. A schema is like a template: it provides the paths, methods, and additional data you expect API requests to include. Many developers follow the <a href="https://swagger.io/specification/">OpenAPI standard</a> to generate (and maintain) a schema.</p><p>To harden your security, we can <i>validate</i> incoming traffic against this schema. This is a great way to stop basic attacks. Cloudflare will turn away nonconforming requests, discarding nonsense traffic that ignored the dress code. Simply upload your schema to the dashboard, select the actions you want to take, and deploy:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5nWP8L7vs3ayf5fEA2OU5s/5650d04a6f8cbd0a13a7c95d696798ef/image9.jpg" />
            
            </figure><p>Schema Validation has already vetted traffic for some of the world’s largest crypto sites, delivery services, and payment platforms. It’s available now, and we’ll add body validation soon.</p>
    <div>
      <h2>Abuse Detection</h2>
      <a href="#abuse-detection">
        
      </a>
    </div>
    <p>A robust security approach will use Schema Validation <i>and</i> Discovery in tandem, ensuring traffic matches the expected format. But what about abusive traffic that makes it through?</p><p>As Cloudflare discovers new API endpoints, we actually <i>suggest rate limits</i> for each one. That’s the role of Abuse Detection, and it opens the door to a more sophisticated kind of security.</p><p>Consider an API endpoint that returns weather updates. Specifically, the endpoint will return “yes” if it is likely to snow in the next hour, and “no” otherwise. Our algorithm might detect that the average user requests this data once every 10 minutes. A small group of scrapers, however, makes 37 requests per 10 minutes. Cloudflare automatically recommends a threshold in between, weighted to provide normal users with some breathing room. This would <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">prevent abusive scraping services</a> from fetching the weather too often.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AmCy8IlDu6F2xQMz6Y9Bh/5a38cabf4a3694188bf6b4c8f0b97047/image3-18.png" />
            
            </figure><p>We provide the option to create a rule using our new <a href="/advanced-rate-limiting/">Advanced Rate Limiting</a> engine. You can use cookies, headers, and more to tune thresholds. We’ve been using Abuse Detection to protect <a href="https://api.cloudflare.com/">api.cloudflare.com</a> for months now.</p><p>Our favorite part of this feature: it relies on the <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning approach</a> we use for <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>. Just another way our products can feed into (and benefit from) each other.</p><p>Abuse Detection is available now. If you’re interested in <a href="/api-abuse-detection/"><i>Sequential</i> Abuse Detection</a>, which we use to flag anomalous request flows, check out our previous blog post. The sequential piece is in early access, and we’re continuing to tune it before an official launch.</p>
    <div>
      <h2>mTLS</h2>
      <a href="#mtls">
        
      </a>
    </div>
    <p>Mutual TLS takes security to a new level. You can use certificates to validate incoming traffic as it reaches your APIs—which is especially useful for mobile and IoT devices. Moreover, this is an excellent positive security model that can (and should) be adopted for most device ecosystems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BoGPOVpajEoOtHvYpdzvX/c84536ef94f14bf09725e088c29d5154/image1-48.png" />
            
            </figure><p>As an example, let’s return to our weather API. Perhaps this service includes a second endpoint that <i>receives</i> the current temperature from a thermometer. But there’s a problem: anyone can make fake requests, providing inaccurate readings to the endpoint. To prevent this, use mTLS to install a client certificate on the <i>legitimate</i> thermometer, then let Cloudflare validate that certificate. Any other requests will be turned away. Problem solved!</p><p>We already offer a set of free certificates to every Cloudflare customer. That will continue. But starting today, API Gateway customers get <i>unlimited</i> certificates by default.</p>
    <div>
      <h2>Authentication</h2>
      <a href="#authentication">
        
      </a>
    </div>
    <p>Many modern APIs require authentication. In fact, authentication unlocks all sorts of capabilities—it allows sessions (with login), personal data exchange, and infrastructure efficiency. And of course, Cloudflare protects authenticated traffic as it passes through our network.</p><p>But with API Gateway, Cloudflare plays a more active role in authenticating traffic, helping to <b>issue</b> and <b>validate</b> the following:</p><ul><li><p>API keys</p></li><li><p>JSON web tokens (JWT)</p></li><li><p>OAuth 2.0 tokens</p></li></ul><p>Using access control lists, we help you manage different user groups with varying permissions. And this matters—because your current provider is introducing tons of latency and unnecessary data exchange. If a request has to go somewhere <i>outside</i> the Cloudflare ecosystem, it’s traveling farther than it needs to:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/53rdn4o2AexuxH6ebDhEV4/803f9fd2c8a7fa96570b84eb4fdb8515/image2-39.png" />
            
            </figure><p>Cloudflare can authenticate on our global network and handle requests in a fraction of the time. This kind of technology is difficult to implement, but we felt it was too important to ignore. How did we build it so quickly? <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a>. We took our experience working with identity providers and, once again, ported it over to the world of APIs. Our gateway includes unlimited authentication and token exchange. These features will be available soon.</p>
    <div>
      <h2>Routing &amp; Management</h2>
      <a href="#routing-management">
        
      </a>
    </div>
    <p>Let’s talk briefly about <a href="https://www.cloudflare.com/learning/serverless/glossary/serverless-microservice/">microservices</a>. Modern applications are behemoths, so developers break them up into smaller chunks called “microservices.”</p><p>Consider an application that helps you book a hotel room. It might use a microservice to fetch available dates, another to fetch prices, and still another to fetch room types. Perhaps a different team manages each microservice, but they all need to be available from a single public entry point:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vE5CLMCH7SBOvyjUEdz1a/860064c062cab01677ce237ac35ab950/image8.png" />
            
            </figure><p>That single entry point—traditionally managed by an API gateway—is responsible for <i>routing</i> each request to the right microservice. Many of our customers have been paying standalone services to do this for years. That’s no longer necessary. We’ve built on our <a href="/introducing-transform-rules-with-url-rewriting-at-the-edge/">Transform Rules</a> product to dynamically re-write and re-route at our edge. It’s easy to configure, fast to deploy, and natively built into API Gateway. Cloudflare can now be your API’s single point of entry.</p><p>That’s just the tip of the iceberg. API Gateway can actually <i>replace</i> your microservices through an integration with our <a href="https://workers.cloudflare.com/">Workers</a> product. How? Consider writing a Worker that performs some action; perhaps return hotel prices, which are stored with <a href="/durable-objects-ga/">Durable Objects</a> on our network. With API Gateway, requests arrive at our network, are routed to the correct microservice with Transform Rules, and then are fully served with Workers (still on our network!). These Workers may contact your origin for additional information, where necessary.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Xlw0UyeftYsiiFsGbrHbE/7b9772d9a46cd8dc1ddef13d98285951/image4-3.png" />
            
            </figure><p>Workers are faster, cheaper, and simpler than microservice alternatives. This integration will be available soon.</p>
    <div>
      <h2>API Analytics</h2>
      <a href="#api-analytics">
        
      </a>
    </div>
    <p>Customers tell us that <i>seeing</i> API traffic is sometimes more important than even acting on it. In fact, this trend isn’t specific to APIs. We published <a href="/envoy-media-machine-learning-bot-management/">another blog</a> today that explores how one customer uses our bot intelligence to passively log information about threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Lod4XcchPemDNuK209PAg/24ef6bf697b80ddbc052e4cdb88701ad/image6.png" />
            
            </figure><p>With API Analytics, we’ve drawn on our other products to show useful data in real time. You can view popular endpoints, filter by ML-driven insights, see histograms of abuse thresholds, and capture trends.</p><p>API Analytics will be available soon. When this happens, you’ll also be able to export custom reports and share insights within your organization.</p>
    <div>
      <h2>Logging, Quota Management, and More</h2>
      <a href="#logging-quota-management-and-more">
        
      </a>
    </div>
    <p><i>All</i> of our established features, like caching, load balancing, and log integrations work natively with API Gateway. These shouldn’t be overlooked as primitive gateway features; they’re essential. And because Cloudflare performs all of these functions in the same place, you get the latency benefits without having to do a thing.</p><p>We are also expanding our Enterprise Logs functionality to perform real-time logging. If you choose to authenticate on Cloudflare’s network, you can view detailed logs of each user who has accessed an API. Similarly, we keep track of each request’s lifespan as it is received, validated, routed, and responded to. Everything is logged.</p><p>Finally, we are building Quota Management, a feature that counts API requests over a longer period of time (like a month) and allows you to manage thresholds for your users. We’ve also launched <a href="/advanced-rate-limiting/">Advanced Rate Limiting</a> to help with more sophisticated cases (including body inspection for GraphQL).</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Our <a href="https://www.cloudflare.com/application-services/solutions/api-security/">API security features</a>—Discovery, Schema Validation, Abuse Detection, and mTLS—are available now! We call these features <a href="https://developers.cloudflare.com/api-shield/">API Shield</a> because they form the shield that protects the remaining gateway functions. Enterprise customers can ask their account teams for access today.</p><p>Many of the other portions of API Gateway are now in early access. According to Gartner®, “by 2025, less than 50% of enterprise APIs will be managed, as explosive growth in APIs surpasses the capabilities of <a href="https://www.cloudflare.com/application-services/products/api-gateway/">API management tools</a>.” Our goal is to offer an affordable gateway that will fight this trend. If you have a specific feature you want to test, let your account team know, so we can onboard you as soon as possible.</p><p>Source: Gartner, “Predicts 2022: APIs Demand Improved Security and Management”, Shameen Pillai, Jeremy D'Hoinne, John Santoro, Mark O'Neill, Sham Gill, 6 December 2021. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[API Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[API]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">7vy7PiYRJxbMbGfxdIqhWu</guid>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Friendly Bots]]></title>
            <link>https://blog.cloudflare.com/friendly-bots/</link>
            <pubDate>Wed, 16 Mar 2022 12:58:57 GMT</pubDate>
            <description><![CDATA[ Our customers can choose to allowlist any bot that is verified. Unfortunately, new bots are popping up faster than we can verify them. So today we’re announcing a solution: Friendly Bots ]]></description>
            <content:encoded><![CDATA[ <p></p><p>When someone mentions bots on the Internet, what’s your first reaction?</p><p>It’s probably negative. Most of us conjure up memories of CAPTCHAs, stolen passwords, or some other pain caused by bad bots.</p><p>But the truth is, there are plenty of <a href="https://www.cloudflare.com/learning/bots/how-to-manage-good-bots/">well-behaved bots</a> on the Internet. These include Google’s search crawler and Stripe’s payment bot. At Cloudflare, we manually “verify” good bots, so they don’t get blocked. Our customers can choose to allowlist any bot that is verified. Unfortunately, new bots are popping up faster than we can verify them. So today we’re announcing a solution: <b>Friendly Bots.</b></p><p>Let’s begin with some background.</p>
    <div>
      <h2>How does a bot get verified?</h2>
      <a href="#how-does-a-bot-get-verified">
        
      </a>
    </div>
    <p>We often find good bots via our <a href="https://forms.gle/pWVxfCj6cQgWGxDp9">public form</a>. Anyone can submit a bot, but we prefer that bot operators complete the form to provide us with the information we need. We ask for some standard bits of information: your bot’s name, its public documentation, and its user agent (or regex). Then, we ask for information that will help us validate your bot. There are four common methods:</p><p><b>IP list</b>Send us a list of IP addresses used by your bot. This doesn’t have to be a static list — you can give us a dynamic page that changes — just provide us with the URL, and we’ll fetch updates every day. These IPs must be publicly documented and exclusive to your bot. If you provide a shared IP address (like one used by a proxy service), our systems will detect risk and refuse to cooperate. We want to avoid accidentally allowing other traffic.</p><p><b>rDNS</b>This one is fun. You’ve heard of <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>: the phone book of the Internet, which helps map <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> to IP addresses. <a href="https://www.blumira.com/glossary/reverse-dns-rdns/">rDNS</a> works in the reverse, allowing us to take an IP address and deduce the domain name associated with it.</p><p>In other words: give us a hostname suffix, and in many cases we’ll be able to validate your bot’s identity!</p><p><b>User agent + ASN validation</b>In some cases, we can verify bots that consistently come from the same network (known as an “ASN”) with the same user agent. Note that we can’t always do this — traffic becomes easier to spoof — but we’re often confident enough to use this as a validation method.</p><p><b>Machine learning</b>This is the most flashy method. Cloudflare sees 32+ million requests every second, and we’ve been able to feed those requests into a model that can accurately profile good bots. If the previous validation methods don’t work for you, there’s a good chance we can use <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">ML</a> to spot your bot. But we need enough traffic (thousands of requests) to detect a usable pattern.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PYeN6Vt00Z2Ck8m70XjNk/d38e8658a5c47120685a087a74b461de/image1-52.png" />
            
            </figure><p>We usually approve Verified Bot requests within a few weeks, after taking some time to quality test and ensure everything is safe. But as mentioned before, we often have to reserve this process for trusted partners and larger bots, even though plenty of our users still need their bots allowlisted.</p>
    <div>
      <h2>What if my bot isn’t a huge global service?</h2>
      <a href="#what-if-my-bot-isnt-a-huge-global-service">
        
      </a>
    </div>
    <p>We keep our ears open (and our eyes on Twitter), so we know that folks want their own “personal” version of Verified Bots.</p><p>For example: let’s say you built your own monitoring service that crawls a few of your personal websites. It doesn’t make sense for us to verify this bot, because it doesn’t meet any of our criteria:</p><ol><li><p>Serve the broader Internet.</p></li><li><p>Objectively demonstrate good behavior.</p></li><li><p>Comply with Internet standards like <a href="https://moz.com/learn/seo/robotstxt">robots.txt</a>.</p></li></ol><p>It’s your bot (and to you, it might be good!), but our other users might feel differently. Imagine if someone else’s bot could waltz into your infrastructure at any time!</p><p>Here’s another case. Perhaps Cloudflare has labeled a particular proxy as automated, possibly because a mix of humans and bots use the proxy to access the Internet. You may want to allow this traffic on your site without affecting other Cloudflare customers.</p><p>Lastly, if you work at a startup, your company may run automated services that haven’t reached the scale we require. But you still need a way to allowlist these services.</p>
    <div>
      <h2>Announcing Friendly Bots</h2>
      <a href="#announcing-friendly-bots">
        
      </a>
    </div>
    <p>The bots described above, especially common services, are not bad. They deserve to sit in a state between <i>bad</i> and <i>verified</i>. They’re <b>friendly</b>.</p><p>And we’ve come up with a really cool way to help you manage them.</p><p>Our new feature, Friendly Bots, allows you to instantly auto-validate any traffic with the help of IP lists, rDNS, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3zbCA00JgYDez9Gd4XPNJb/7833d01c6556e9164e93eda0b703425c/image4-5.png" />
            
            </figure><p>Here’s how it works: in the <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/bots">Cloudflare dashboard</a>, tell us about your bot. You can point us toward a public IP list, give us a hostname suffix, or even select other methods like machine learning. Cloudflare’s anycast network allows us to run all of these mechanisms at <i>each</i> one of our data centers. This means you’ll have performant, secure, and scalable bot verification.</p><p>Build a collection of Friendly Bots and share them between your sites, creating custom policies that allow, rate limit, or log this type of traffic. You may just want to keep tabs on a particular bot; that’s fine. The response options are flexible and directly integrate with our <a href="https://workers.cloudflare.com/">Workers platform</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/54QpeToZFleHLchzTmKCxQ/dcf07542c262e13e809c12eaf05390a1/image5-6.png" />
            
            </figure><p>In the past, we’ve struggled to verify bots that did not crawl the web at a large scale. Why? Our system relies on a cache of verified traffic, ensuring that certain IPs or other data have widely shown good behavior on the Internet. This means that bots were sometimes difficult to verify if they did not make thousands of requests to Cloudflare. With Friendly Bots, we’ve eliminated that requirement, introducing a new, dynamic cache that optimizes for fun-sized projects.</p>
    <div>
      <h2>The downstream benefits</h2>
      <a href="#the-downstream-benefits">
        
      </a>
    </div>
    <p>Friendly Bots will streamline your dashboard experience. But there are a few hidden, downstream benefits we want to highlight:</p><p><b>Easier verification</b>Admittedly, it’s challenging to keep up with all the good bots on the Internet. In order to verify a bot, we’ve relied on <a href="https://forms.gle/dT9muX2aYRqFokkc8">manual submissions</a> that may come weeks, or even months after a good bot is created. Friendly Bots will change all of that. If we notice many of our customers allowlisting a particular bot — say, a certain IP address or hostname suffix, our systems will automatically queue that bot for verification. We can intelligently use your Friendly Bots to help the rest of Cloudflare’s customers.</p><p><b>Instant feedback</b>In the past, users have been confused by the verification process. <i>Do I need to provide documentation for my IPs? What about my user agent: can it change over time?</i> If any piece of the validation data was broken, it could take us weeks to identify and fix.</p><p>That’s no longer the case. With Friendly Bots, we perform validation almost instantly. So if something isn’t right — perhaps your rDNS validation uses the wrong hostname — you’ll know immediately because the bot won’t be allowlisted. No more waiting to hear from our support team.</p><p><b>Better sourcing</b>Previously, we required bot operators (e.g., Google) to submit verification data themselves. If there was a bot you wanted to verify, but did not own, you were out of luck.</p><p>Friendly Bots eliminates this dependency on bot operators. Anyone who can find identifying information can register a bot on their site.</p><p><b>No arbitration</b>If a scraper shows up to your site, is that a good thing? To some, yes, because it’s exposure. To others, no, because that scraper may take data. This is a question we’ve carefully considered with every Verified Bots submission to date.</p><p>Now: it’s your choice to make. Friendly Bots puts the control in your hands, allowing you to categorize bots at a domain level. We’ll continue to verify bots at a global level (when behavior is objectively good).</p>
    <div>
      <h2>Cloudflare Radar</h2>
      <a href="#cloudflare-radar">
        
      </a>
    </div>
    <p>Here’s a fun bonus: in addition to today’s Friendly Bots announcement, we’re also making some changes to <a href="https://radar.cloudflare.com">Cloudflare Radar</a>.</p><p>Beginning immediately, you can see a list of many <a href="https://radar.cloudflare.com/verified-bots">Verified Bots in Radar</a>. This is exciting; we’ve never published a detailed list like this before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4C2SFqOIE3jCOpPDaP4EQv/fea3b84650ae284d0da13c69ab97ec68/image3-20.png" />
            
            </figure><p>All data is updated in real time. As we verify new bots, they will appear here in the Radar module.</p><p>We’re also beginning to add specific Verified Bots to our Logs product. You’ll see them as <a href="https://developers.cloudflare.com/bots/concepts/cloudflare-bot-tags">Bot Tags</a>, so a request might include the string “pinterest” if it came from Pinterest’s bot.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Our team is excited to launch Friendly Bots soon. We anticipate the impact will radiate throughout <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>, reducing false positives, improving crawl-ability, and generally stabilizing sites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qdZSvU4sRH4ImTRfBowzg/0b6f05bce83fe99396a3a90f1d461201/image2-42.png" />
            
            </figure><p>If you have Bot Management and want to give this new feature a try, please tell your account team (and we’ll be sure to include you in the early access period). You can also continue to <a href="https://forms.gle/dT9muX2aYRqFokkc8">tell us about bots</a> that should be verified.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">67jeypO2yZNFU5OIrK3T8R</guid>
            <dc:creator>Ben Solomon</dc:creator>
            <dc:creator>Abraham Adberstein</dc:creator>
            <dc:creator>Ricardo Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Grinch Bot is Stealing Christmas!]]></title>
            <link>https://blog.cloudflare.com/grinch-bot/</link>
            <pubDate>Fri, 03 Dec 2021 18:59:05 GMT</pubDate>
            <description><![CDATA[ Bots moved quickly this holiday season, launching over 1 trillion requests on Black Friday but quickly receding after the weekend. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>This week, a group of US lawmakers introduced the <a href="https://www.cnet.com/news/democrats-announce-bill-to-stop-bots-from-stealing-christmas/">Stopping Grinch Bots Act</a> — new legislation that could stop holiday hoarders on the Internet. This inspired us to put a spin on a Dr. Seuss classic:</p><p><i>Each person on the Internet liked Christmas a lotBut the Grinch Bot, built by the scalper did not!The Grinch Bot hated Christmas! The whole Christmas season!Now, please don’t ask why. No one quite knows the reason.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7JZlAoJwTmvxlNyaTk2ZO3/b9877c5a7e789bdaf752d5c0afd431b2/image7.png" />
            
            </figure><p>Cloudflare stops billions of bad bots every day. As you might have guessed, we see all types of attacks, but none is more painful than a Grinch Bot attack. Join us as we take a closer look at this notorious holiday villain...</p>
    <div>
      <h3>25 days seconds of Christmas</h3>
      <a href="#25-days-seconds-of-christmas">
        
      </a>
    </div>
    <p>What is the Grinch Bot? Technically speaking, it’s just a program running on a computer, making automated requests that reach different websites. We’ve come to refer to these requests as “bots” on the Internet. Bots move quickly, leveraging the efficiency of computers to carry out tasks at scale. The Grinch Bot is a very special type that satisfies two conditions:</p><ol><li><p>It only pursues online inventory, attempting to purchase items before humans can complete their orders.</p></li><li><p>It only operates during the holiday season.</p></li></ol><p>Now, attackers use bots to perform these tasks all year long. But in these winter months, we like to use the term “Grinch Bot” as seasonal terminology.</p><p>The Grinch Bot strikes first <a href="https://blog.cloudflare.com/the-truth-about-black-friday-and-cyber-monday/">around Black Friday</a>. It knows that the best discounts come around Thanksgiving, and it loves to get a good deal. Exclusive items are always the first to go, so attackers use the Grinch Bot to cut every (virtual) line and checkpoint. <b>Cloudflare detected nearly 1.5 trillion bot requests on Black Friday.</b> That’s about half of all our traffic; but more on this in a bit.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TtyEv5ywy7iQ2L1TcfPQt/f79ac6d4d7b552972761db32b44d76e8/image2-4.png" />
            
            </figure><p>The Grinch Bot strikes again on Cyber Monday. As shoppers find gifts for their loved ones, bots are ten steps ahead — selecting “add to cart” automatically. Many bots have payment details ready (perhaps even stolen from your account!).</p><p>The Grinch Bot will buy 500 pairs of Lululemon joggers before you even get one. And it’ll do so in seconds.</p>
    <div>
      <h3>Nearly 44% of traffic comes from bad bots</h3>
      <a href="#nearly-44-of-traffic-comes-from-bad-bots">
        
      </a>
    </div>
    <p>The Grinch Bot has friends working throughout the year, putting pressure on security teams and moving undetected. <b>43.8% of Internet traffic comes from these bots.</b> When the holidays arrive, the Grinch Bot can ask its friends how to attack the largest sites. They have already been testing tactics for months.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63QhLwpAIHWHutC2RemIFI/f138e7d0ca3906ff3f185121c8d4bd96/image6-1.png" />
            
            </figure><p>In response, many sites block individual IP addresses, groups of devices, or even entire <i>countries</i>. Other sites use <a href="https://www.cloudflare.com/rate-limiting/">Rate Limiting</a> to reduce traffic volume. At Cloudflare, we’ve advocated not only for Rate Limiting, but also for a more sophisticated approach known as <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>, which dynamically identifies threats as they appear. Here’s a look at bot traffic <i>before</i> the holidays (1H 2021):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pxVO5fkd6mRM9g4CupgGb/21cbda6e168ebfc250634c11427f6df1/image4-3.png" />
            
            </figure><p><b>When we looked at bot traffic on Black Friday, we found that it had surged to nearly 50%.</b> <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> showed data close to 55% (if you want to include the good bots as well). Businesses tell us this is the most vulnerable time of the year for their sites.</p>
    <div>
      <h3>Over 300 billion bots...</h3>
      <a href="#over-300-billion-bots">
        
      </a>
    </div>
    <p>Bots are highly effective at scale. While humans can purchase one or two items within a few minutes, bots can purchase <i>far</i> more inventory with little effort.</p><p>During the year, Cloudflare observed <b>over 300 billion bots try to “add to cart.”</b> How did we find this? We ran our bot detection engines on every endpoint that contains the word “cart.” Keep in mind, most bots are stopped before they can even view item details. There are trillions of inventory hoarding bots that were caught earlier in their efforts by our Bot Management and security solutions.</p><p>Even worse, some bots want to steal your holiday funds. They skip the <a href="https://www.cloudflare.com/ecommerce/">ecommerce sites</a> and head right for your bank, where they test stolen credentials and try to break into your account. <b>71% of login traffic comes from bots</b>:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c4nDQ6xo6a83paZKoVAhf/f201b6276da979a51bf38ac517ad94c7/image5-3.png" />
            
            </figure><p>Bots operate at such an immense scale that they occasionally succeed. When this happens, they can break into accounts, retrieve your credit card information, and begin a holiday shopping spree.</p>
    <div>
      <h3>Deck the halls with JS Challenges</h3>
      <a href="#deck-the-halls-with-js-challenges">
        
      </a>
    </div>
    <p>We hate CAPTCHAs almost as much as we hate the Grinch Bot, so we built JS challenges as a lightweight, non-interactive alternative:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56hsVrPJ1jQcLdhlaedG5g/1585cf9c3360547e7d3093c29728c711/image8-1.png" />
            
            </figure><p>Not surprisingly, we issue more JS Challenges when more bots reach our network. These challenges are traditionally a middle ground between taking no action and completely blocking requests. They offer a chance for suspicious looking requests to prove their legitimacy. <b>Cloudflare issued over 35 billion JS Challenges over the shopping weekend</b>.</p><p>Even more impressive, however, is the number of threats <i>blocked</i> around this time. <b>On Black Friday, Cloudflare blocked over 150 billion threats</b>:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xgmWCPdAepeW55GN7hucr/a9fbe286454cee4913fc8ed2c90b5fb0/image9.png" />
            
            </figure><p>While we expected the Grinch Bot to make its move on Friday, we did not expect it to recede as it did on Cyber Monday. Bot traffic decreased as the shopping weekend continued. We like to think the Grinch Bot spent its time furiously trying to avoid blocks and JS Challenges, but eventually gave up.</p>
    <div>
      <h3>Saving the Internet (and Christmas)</h3>
      <a href="#saving-the-internet-and-christmas">
        
      </a>
    </div>
    <p>While large retailers can afford to purchase bot solutions, not every site is so fortunate. We decided to fix that.</p><p>Cloudflare’s <a href="https://developers.cloudflare.com/bots/get-started/free">Bot Fight Mode</a> is a completely free tool that stops bots. You can activate it with one click, drawing on our advanced detection engines to protect your site. It’s easy:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4y0r0a3FDKYnhG2KK2pMQv/ba6861601ad9867eba7b99a3003e0c63/image3-2.png" />
            
            </figure><p>And Bot Fight Mode doesn’t just stop bots — it makes them pay. We unleash a tarpit challenge that preoccupies each bot with nonsense puzzles, ultimately handing bot operators a special gift: a massive server bill. We even plant trees to offset the carbon emissions of these expensive challenges. In fact, with so many bots stopped in the snow, there’s really just one thing left to say...</p><p><i>Every person on the Internet, the tall and the small, ⁣Called out with joy that their shopping didn’t stall!He hadn't stopped Christmas from coming! It came!Somehow or other, it came just the same!And the Grinch Bot, with his grinch feet ice-cold in the snow, ⁣Stood puzzling and puzzling. "How could it be so?"</i></p> ]]></content:encoded>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">m9WVuxhNE3CR9BNfnbFMU</guid>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Super Bot Fight Mode]]></title>
            <link>https://blog.cloudflare.com/super-bot-fight-mode/</link>
            <pubDate>Fri, 26 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ Beginning immediately, any Cloudflare user with a Pro or Business site can take new action against bots. We’ve added advanced features in the dashboard and some exciting updates to analytics.
 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Almost half of the Internet’s traffic is powered by <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/">bots</a>. Bots have scoured the net for years, relentlessly hacking into bank accounts, scooping up Bruno Mars tickets, and <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">scraping websites for data</a>. The problem is so widespread that we <a href="/cleaning-up-bad-bots/">launched Bot Fight Mode</a> in 2019 to fight back. Since then, over 150,000 individuals and small businesses have used the product, and we’ve received countless requests for more functionality. More analytics, more detections, and more controls.</p><p>Introducing Super Bot Fight Mode.</p><p>Beginning immediately, any Cloudflare user with a Pro or Business site can take new action against bots. We’ve added advanced features in the dashboard and some exciting updates to analytics. Free customers will retain all the benefits they've enjoyed with Bot Fight Mode, and our Enterprise Bot Management product will continue to push the needle on innovation.</p>
    <div>
      <h2>In the Dashboard</h2>
      <a href="#in-the-dashboard">
        
      </a>
    </div>
    <p>Our bot solutions have a new home. The features we discuss in this blog post go beyond a single toggle, so we created a <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/bots">hub for bot protection</a>. Head to the Firewall app and select the “Bots” subtab to get started.</p><p>The new hub is live for all users, including those with Enterprise Bot Management.</p>
    <div>
      <h2>Pro Plan Features</h2>
      <a href="#pro-plan-features">
        
      </a>
    </div>
    <p>First up: we’re bringing our popular Bot Report to the Pro plan. Here, you can see a breakdown of your bot traffic, updated in real time to help you spot attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fkfog1L8NsIUuaUccMIaO/1de2a5afb05711a96d542a42d0fe91f8/Bot-Report-current.png" />
            
            </figure><p>The Bot Report includes three traffic types:</p><ol><li><p><b>Likely automated</b> traffic may have come from bad bots. We use <a href="https://developers.cloudflare.com/bots/about/plans/biz-and-ent#bot-detection-engines">heuristics, machine learning, and other techniques</a> to spot these requests. In most cases, this traffic will hurt your site without providing anything useful in return.</p></li><li><p><b>Likely human</b> traffic is legitimate and important. Ideally, the vast majority of your traffic matches this type.</p></li><li><p><b>Verified bot</b> traffic comes from good bots on the Internet. We have verified search crawlers like Google and payment notification services like PayPal. Most users choose to allow this traffic.</p></li></ol><p>All of this data is available via <a href="https://developers.cloudflare.com/analytics/graphql-api">GraphQL</a> as well. So if you are looking to routinely monitor bot traffic, the API will help you do so.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fC40ELymoITRnhbP2Q1yp/b5886f995047b637790fab7a789639af/Bot-Monitoring.png" />
            
            </figure><p>Pro users can also do more to stop bots — select “Configure Super Bot Fight Mode” to add protection. Highlights include:</p><ul><li><p>The option to <b>challenge or block</b> traffic from “definitely automated” sources. Note that this will only affect the traffic we are most confident comes from bots.</p></li><li><p>The option to enable <b>JavaScript Detections</b> to identify headless browsers and other actors on the Internet.</p></li><li><p>The option to <b>include or exclude verified bots</b> from protection.</p></li></ul><p>If your site interacts with Slack, for example, you can exclude verified bots to help Slackbot do its job. Or if you notice an increase in ad fraud, try challenging automated traffic and watch the results.</p>
    <div>
      <h2>Business Plan Features</h2>
      <a href="#business-plan-features">
        
      </a>
    </div>
    <p>Bot Analytics is now included with the <a href="https://www.cloudflare.com/plans/business/">Business plan</a>.</p><p>We originally <a href="/introducing-bot-analytics/">launched Bot Analytics</a> to give our Enterprise users more visibility. Since the launch, however, Business users have asked us for many of the same insights. And because Cloudflare has always tried to democratize technology (as we’ve done with <a href="/supercharging-firewall-events-for-self-serve/">Firewall Events</a> and other products), this is something we had to do.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oUJwyEWWlIZBTposcD6C7/cd661bdaf6ef3e569b05d862fde88b97/Bot-Analytics-biz-current.png" />
            
            </figure><p>Business users can access a new version of Bot Analytics; one that is designed to work with the mitigation tools described below. Users can view traffic by type, adjust the time frame, and filter by different attributes like IP address or user agent.</p><p>Another perk: Bot Analytics shows <i>how</i> we categorize traffic. Scroll to “requests by detection source” to understand which engine flagged a particular request. If you want to learn more about our detection engines, check out our <a href="/cloudflare-bot-management-machine-learning-and-more/">blog post</a> on the topic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gIDGyuh0xnxxXs14DJAPQ/7d9e00b585c49643bed99c52b018195f/image1-42.png" />
            
            </figure><p>Of course, we also added new mitigation features. While Pro users can defend against “definitely automated” traffic, Business users can also target “likely automated” traffic. What’s the difference? The latter includes requests scored by our <a href="https://developers.cloudflare.com/bots/about/plans/biz-and-ent#machine-learning">machine learning engine</a>. These requests often come from sophisticated bots — the ones that evade simple security tools by rotating IPs or convincingly imitating humans.</p><p>Perhaps your site suffers from inventory hoarding. You list items for sale, but they are almost immediately claimed by bots. Understandably, your customers are upset (and so are you!). Go ahead and use Bot Analytics to pinpoint the attacker, and if the attack falls under “likely automated,” consider blocking this traffic.</p><p>We also realize that different sites may have different sensitivities to bot traffic. Users can respond appropriately by issuing a challenge, blocking entirely, or doing nothing at all.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dfm7PoILrZ5z82iWQDffC/f8335a9589dde8d06e24f3c93ca9f40f/configure-biz-current.png" />
            
            </figure><p>These features are all included in the Cloudflare Business plan. Once you enable mitigation, check your Firewall Events tab to watch traffic get blocked or challenged.</p>
    <div>
      <h2>Enterprise Bot Management</h2>
      <a href="#enterprise-bot-management">
        
      </a>
    </div>
    <p>For those with more advanced security needs, <a href="https://www.cloudflare.com/products/bot-management">Bot Management</a> remains the gold standard. And it’s only getting better.</p><p>Unlike Bot Fight Mode, Bot Management is built directly into the Firewall. This means that users can restrict their bot protection to a particular path (like a /login endpoint). Bot Management also includes granular bot scores, which users can <a href="https://developers.cloudflare.com/firewall/recipes/challenge-bad-bots">pair with other attributes</a> to produce more powerful protection. It even includes <a href="https://developers.cloudflare.com/bots/about/plans/bm-subscription#anomaly-detection">Anomaly Detection</a>, which we use to recognize outlier patterns on your site.</p><p>We also continue to improve Bot Management. For example, just moments ago, we announced <a href="/api-abuse-detection/">early access to API Abuse Detection</a>. This announcement follows months of research and development. We’re using unsupervised learning to map out APIs, identify legitimate user flows, and keep out bad bots. The end result: Cloudflare will be able to protect your mobile apps (without an SDK) and secure your API endpoints (without any provided schema). <a href="/api-abuse-detection/">Read more</a> about the early access period.</p><p>These features (and countless others) will continue to guard the Internet’s largest sites. If you think you need Bot Management, <a href="https://www.cloudflare.com/lp/automated-bot-traffic-report/">let us know</a>.</p>
    <div>
      <h2>Helping to Build a Better Internet</h2>
      <a href="#helping-to-build-a-better-internet">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1w5n72gvJFtX7IOOXxREO3/dae17c0b9406d5f27cfbad288bc91512/Group-1338.png" />
            
            </figure><p>Cloudflare’s goal has always been to help build a better Internet. This mission extends to every part of the Internet — and to every person who uses it.</p><p>Today’s introduction of Super Bot Fight Mode was born from this mission, particularly from the idea that we are stronger as a united front against bots. Each website we protect is one that bots will waste their resources on. At Cloudflare, we are actively fighting back, and unleashing new challenges that will disincentivize bot operation with tarpitting.</p><p>We encourage you to enable Super Bot Fight Mode today. Cloudflare now offers bot protection with every plan (including Free), so there’s no excuse not to try it! Test the new features and let us know what you think.</p> ]]></content:encoded>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Bot Fight Mode]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5mqfk6sJZIkNwQzpPabYlt</guid>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing API Abuse Detection]]></title>
            <link>https://blog.cloudflare.com/api-abuse-detection/</link>
            <pubDate>Fri, 26 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are announcing early access to API Abuse Detection. This technology will identify, secure, and protect API endpoints with unsupervised learning. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a> are incredibly important. Throughout the 2000s, they formed the <a href="https://blog.postman.com/intro-to-apis-history-of-apis/">backbone of popular web services</a>, helping the Internet become more useful and accessible. In the 2010s, APIs played a larger role in our lives, allowing personal devices to communicate with the digital world. Many of our daily activities, like using rideshare services and paying for lattes, are dependent on this form of modern communication. Now we are approaching a post-pandemic world in which APIs will be more important than ever.</p><p>Unfortunately, as any technology grows, so does its surface area for abuse. APIs are no exception. Competing rideshare services might monitor each other’s prices via API, spawning a price war and a waste of digital resources. Or a coffee drinker might manipulate an API for a latte discount. Some companies have thousands of APIs — including ones that they don’t even know about. Cloudflare can help solve these problems.</p><p>Today, we are announcing early access to API Discovery and API Abuse Detection.</p>
    <div>
      <h3>Background</h3>
      <a href="#background">
        
      </a>
    </div>
    <p>Before going further, it’s important to explain <i>why</i> we need a <a href="https://www.cloudflare.com/application-services/solutions/api-security/">solution</a> for APIs. Traditional security tools, including <a href="https://www.cloudflare.com/rate-limiting/">Rate Limiting</a> and <a href="https://www.cloudflare.com/ddos/">DDoS Protection</a>, can be wonderfully useful. But these approaches were not built to act alone. We might rate limit a particular API endpoint, but how would we choose a proper threshold? It would be difficult to do this at scale without causing problems. An API might be hit by a distributed attack (falling below the threshold), or it might see an increase in legitimate traffic (exceeding the threshold).</p><p>Others have suggested deploying <a href="https://www.cloudflare.com/products/bot-management">Bot Management</a> on API endpoints. In many cases, this is effective and adds some degree of protection, particularly if the API is meant to be used by browsers (as part of a web application). But Bot Management was designed to find bad actors among <i>humans</i>. These actors typically use automation, while humans typically use browsers, so the distinction is somewhat clear. But APIs present a different problem. APIs are automated, so any solution must find bad bots among <i>other bots</i>. We must distinguish between good and bad automated traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YhZhSWpHpXwLgmsEx4EiD/0a68497c077f8b741568d6c0b1687c3a/image1-46.png" />
            
            </figure><p>To solve the API problem, we had to develop a measure of <i>intent</i> — almost like interviewing each request to determine its aims. We must answer the following questions purely based on circumstantial data:</p><ul><li><p>Is this request using an API for its intended purpose?</p></li><li><p>Is this request exhibiting suspicious behavior? Why?</p></li></ul><p>Again, while tools like Rate Limiting can handle binary problems (e.g., “has this IP exceeded 200 requests?”), the API problem demands a more subjective arbiter. It requires us to examine the <i>purpose</i> of an API and define reasonable constraints based on what we find. It also requires us to find a new source of ground truth. When we built Bot Management, we could confirm requests were human or automated by <a href="/stop-the-bots-practical-lessons-in-machine-learning/">issuing challenges</a>. APIs involve automated services which cannot prove their legitimacy by solving a challenge.</p><p>After months of sorting through this problem, we’re excited to give a first look at our solution. It comes in a few parts…</p>
    <div>
      <h3>API Discovery</h3>
      <a href="#api-discovery">
        
      </a>
    </div>
    <p>Some of our users tell us they can’t keep track of their APIs. Before we even try to protect these endpoints, we need to map them out and understand the <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface area</a>. We call this “<a href="https://www.cloudflare.com/learning/learning/security/api/what-is-api-discovery/">API Discovery</a>.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2l4AcWqZknWW9JvLWjLMV7/d93c1253b1d39a3b4d90991c6f0630e0/image6-20.png" />
            
            </figure><p>The discovery process starts with simplification. Large websites may have thousands of APIs, but a lot of the calls look similar. Consider the following two paths:</p><ul><li><p>api.example.com/<b>login/237</b></p></li><li><p>api.example.com/<b>login/415</b></p></li></ul><p>In this example, “237” and “415” are customer identifiers. Both paths serve the same purpose — they allow users to log into their accounts — but they are not identical. So we map out the paths and immediately <i>collapse</i> them into the following:</p><ul><li><p>api.example.com/<b>login/*</b></p></li><li><p>api.example.com/<b>login/*</b></p></li></ul><p>Notice how we removed the customer identifiers. Our systems can detect the changing parts of an API, allowing us to recognize both paths as the same one. We do this by recording the cardinality of each endpoint. For example, we might have originally found that there were 700 different strings observed in place of the asterisk. “237” and “415” were just two of those possibilities. We then used unsupervised learning to choose a threshold (in this case, let’s say 30). Since we’ve noticed far more than 30 variants of this path, we recognize the customer identifier as a <i>variable</i> and collapse the path. This process is called “path normalization.”</p><p>API Discovery is a building block for many security products to come. But at its core, the technology is about producing a simple, trustworthy map of APIs. Here is a small sample of what you might find:</p>
            <pre><code>login/&lt;customer_identifier&gt;
auth
account/&lt;customer_identifier&gt;
password_reset
logout</code></pre>
            <p>Imagine this list scaled to hundreds, if not thousands of endpoints. Some will be obvious (hopefully login endpoints are expected!), but others could be a surprise. The final map will help identify variables or tokens referenced by each endpoint.</p>
    <div>
      <h3>Detecting Abuse by Volume</h3>
      <a href="#detecting-abuse-by-volume">
        
      </a>
    </div>
    <p>Now that we have discovered APIs, we can begin to look for abuse. Our first approach handles volumetric anomalies. In other words, we make an educated guess about <i>how often</i> each path is reached and set some threshold to manage abuse. This is a form of adaptive rate limiting.</p><p>Consider the API path <b>/update-score</b> for a sports website. You can probably guess what this does — it routinely fetches the latest score for a game, which might happen multiple times per second. We might deploy unsupervised learning and set a high threshold for normal use. Perhaps 150 requests per minute for a specific IP, user agent, or other session identifier.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7s6VcDHxOjW2iND3mUIyXP/b56d43a6b4a4d70a55e463f603c576b1/image7-10.png" />
            
            </figure><p>But that same sports website could require its users to have accounts. In this case, a separate <b>/reset-password</b> API could exist on the same domain. No sports fan would reset their password as much as they check scores, so this path would likely have a lower threshold. The beauty of unsupervised learning (and our form of abuse detection) is that we map out your site, develop separate baselines for each API, and try to predict the intent of requests as they are made. If we see 150 sudden attempts to reset a password, our systems immediately suspect an <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover</a>.</p><p>It’s also important to understand <i>why</i> traffic shifts when it does. For example, we shouldn’t block sports traffic when it surges due to the NBA Finals. Although the <b>/update-score</b> endpoint might temporarily see more use, Cloudflare would recognize the greater context and change any relevant thresholds. We only want to mitigate when an individual is abusing an endpoint.</p>
    <div>
      <h3>Detecting Abuse by Sequence</h3>
      <a href="#detecting-abuse-by-sequence">
        
      </a>
    </div>
    <p>Our team often applies the <a href="https://www.nytimes.com/2020/12/05/health/coronavirus-swiss-cheese-infection-mackay.html">Swiss Cheese Model</a> to security. This approach has been used in healthcare, physical security, and many other industries, but the idea is simple. Any layer of defense will have a few holes — but stacking <i>unique</i> defenses (or slices of cheese) next to each other improves overall safety.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MrZjxJssCNdQ37LbAFNVx/77c3639aa98255aa90f2dc8a0ef29ff2/image5-33.png" />
            
            </figure><p>In the world of Internet security, we call this “defense in depth.” APIs are first protected by Cloudflare’s security suite (DDoS, etc.). The second layer uses volumetric detection (described above). But the third layer is completely different from anything we have done before: it is <i>sequential</i> anomaly detection. We expect this to dramatically change the API landscape.</p><p>Here’s how it works. As usual, we start by running path normalization to find a finite set of states. In one test, this process reduced about 10,000 states to just 60, massively simplifying the API problem. Then we use <a href="https://brilliant.org/wiki/markov-chains/">Markov Chains</a> to build a transition matrix, which is a map of all the states and where they commonly lead. We finish by assigning probabilities to each transition.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YWvGBNdZYEkRmZ0kNmnWV/ab540765056762c31fc3477cea5c2229/image4-39.png" />
            
            </figure><p>The end result? We can conceptually piece together the movement on a site, which might consist of the following steps:</p><ol><li><p>A request is sent to <b>/login/*/enter</b></p></li><li><p>It is redirected to <b>/login/*/verify</b></p></li><li><p>It is finally redirected to <b>/login-successful</b></p></li></ol><p>This looks like a valid user attempting to log in. Again, we use unsupervised learning to detect flows like this one, but our approach detects outliers as well. In this case, we have found that 1 → 2 → 3 is a logical flow, but what if someone arrives directly at step 3? We might flag this request as anomalous.</p><p>This approach, which relies heavily on Markov Chains, is quite efficient. Consider adding a single node to the chain: obviously, the chain itself scales linearly. The transition matrix, which maps out all possible node relationships, scales exponentially. But we’ve found that most of these relationships are not exercised. In practice, no one pursues convoluted paths like logout → upload → auth. The more common transitions, which may look like login → update-score → logout, only made up 2% of all transitions in our tests. We can efficiently store the matrix by ignoring unused transitions.</p><p>That wraps up our overview of sequential anomaly detection. It’s the last layer in our Swiss Cheese Model, and just like the volumetric approach, it utilizes a baseline that we update over time.</p>
    <div>
      <h3>Other Uses</h3>
      <a href="#other-uses">
        
      </a>
    </div>
    <p>API Abuse Detection is remarkably versatile. Although we created this technology for general API use, there are a few use cases worth highlighting.</p><p>The first is Bot Management for mobile apps. While our Bot Management solution has worked well for many apps, API Abuse Detection is significantly more effective. That’s because mobile devices often rely on APIs. While their requests follow the slow, deliberate pace of a human user, mobile apps consume API endpoints and may appear automated. These apps do not offer the same navigational freedom that websites do. But we can use this to our advantage: legitimate users follow predictable sequences based on prior states, which we are now able to validate with API Abuse Detection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2T0NUMcqvCLGh6S0qopxTa/440b1350e0d22d7ab8646979ced66127/image3-38.png" />
            
            </figure><p>Other companies have developed mobile SDKs to approach API abuse. But SDKs are bulky, difficult to integrate, and sometimes ineffective. This client-side approach is also vulnerable to tampering. It performs authentication of the client software, but is not capable of detecting any actual abusive behavior. Anyone who can extract the client-side certificate can immediately bypass bot protections. We believe we can secure mobile apps without any sort of SDK — simply by deploying API Abuse Detection on mobile endpoints.</p><p>Additionally, many API endpoints are crowded. Not everyone can identify their “good” API/bot traffic, which means that a positive security model may not work. This is especially true of companies that work with partners who rotate user agents or can’t align their signals. Our approach avoids this headache entirely. We automatically build a map of API endpoints, develop baselines, and detect abuse.</p>
    <div>
      <h3>Early Access</h3>
      <a href="#early-access">
        
      </a>
    </div>
    <p>Do you have a site that needs API Abuse Detection? Do you want to try the next generation of Bot Management for your mobile app? Please let us know by contacting your account team. We’re excited to bring these models to life in the coming months.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[API]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Mobile]]></category>
            <guid isPermaLink="false">1mcYXdfQWNaFT8FLqcl07C</guid>
            <dc:creator>Ben Solomon</dc:creator>
            <dc:creator>Thomas Vissers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Bot Analytics]]></title>
            <link>https://blog.cloudflare.com/introducing-bot-analytics/</link>
            <pubDate>Thu, 29 Oct 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ Nearly 40% of Internet traffic is automated. Today, Cloudflare is taking its Bot Management product to new heights with the release of Bot Analytics. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Bots — both good and bad — are everywhere on the Internet. <a href="https://radar.cloudflare.com/">Roughly 40% of Internet traffic is automated</a>. Fortunately, Cloudflare offers a tool that can detect and block unwanted bots: we call it <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>. This is the most recent platform in our long history of detecting bots for our customers. In fact, Cloudflare has always offered some form of bot detection. Over the past two years, our team has focused on building advanced detection engines, innovating as bots become more sophisticated, and creating new features.</p><p>Today, we are releasing Bot Analytics to help you visualize your automated traffic.</p>
    <div>
      <h3>Background</h3>
      <a href="#background">
        
      </a>
    </div>
    <p>It’s worth including some background for those who are new to bots.</p><p>Many websites expect human behavior. When I shop online, I behave as anyone else would: I might search for a few items, read reviews when I find something interesting, and eventually complete an order. This is expected. It is a standard use of the Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PKDIUq43ZKgR4GprVqnrC/dc7a40eff6fab0ba678c7e8ab220bf29/image6-10.png" />
            
            </figure><p>Unfortunately, without protection these sites can be ripe for exploitation. Those shoes I was looking at? They are limited edition sneakers that resell for five times the price. Sneaker hoarders clamor at the chance to buy a pair (or fifty). Or perhaps I just added a book to my cart: there are probably hundreds of online retailers that sell the same book, each one eager to offer the best price. These retailers desperately want to know what their competitors’ prices are.</p><p>You can see where this is going. While most humans make good use of the Internet, some use automated tools to perform abuse at scale. For example, attackers will deplete sneaker inventories by using automated bots to check out quickly. By the time humans click “add to cart,” bots have already paid for shipping. Humans hardly stand a chance. Similarly, online retailers keep track of their competitors with “price scraping” bots that collect pricing information. So when one retailer lowers a book price to \$10, another retailer’s bot will respond by pricing at \$9.99. This is how we end up with weird prices like \$12.32 for toilet paper. Worst of all, malicious bots are incentivized to hide their identities. They’re hidden among us.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25XdmwXLYGpXu9BvNPawjh/5a3d3868c3dd7fdb3ea4da0879136ec9/image13-3.png" />
            
            </figure><p>Not all bots are bad. Cloudflare maintains a list of verified good bots that we keep separated from the rest. Verified bots are usually transparent about who they are: DuckDuckGo, for example, <a href="https://help.duckduckgo.com/duckduckgo-help-pages/results/duckduckbot/">publicly lists</a> the IP addresses it uses for its search engine. This is a well-intentioned service that happens to be automated, so we verified it. We also verify bots for error monitoring and other tools.</p>
    <div>
      <h3>Enter: Bot Analytics</h3>
      <a href="#enter-bot-analytics">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78OZrXRrska6hHPQQIdIJB/7b6f186b7d66a45e6895257783368d5e/image2-28.png" />
            
            </figure><p>As discussed earlier, we built a Bot Management platform that intelligently detects bots on the Internet, allowing our customers to block bad ones and allow good ones. If you’re curious about how our solution works, read <a href="/cloudflare-bot-management-machine-learning-and-more/">here</a>.</p><p>Beginning today, we are going to <i>show</i> you the bots that reach your website. You can see these bots with a new tool called Bot Analytics. It’s fast, accurate, and loaded with information. You can query data up to one month in the past with no noticeable lag. To accomplish this, we exposed the data with GraphQL and paired it with <a href="/explaining-cloudflares-abr-analytics/">adaptive bitrate (ABR) technology</a> to dynamically load content. If you already have Bot Management added to your Cloudflare account, Bot Analytics is included in your service. Open up your dashboard and let’s take a tour…</p>
    <div>
      <h3>The Tour</h3>
      <a href="#the-tour">
        
      </a>
    </div>
    <p>First: where to go? Bot Analytics lives under the Firewall tab of the dashboard. Once you’re in the Firewall, go to “Overview” and click the second thumbnail on the left. Remember, Bot Management must be added to your account for full access to analytics.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fb4sfLtgjis1FjxqxOomf/c0d9451aa799eb27fb78432d04d95045/image3.gif" />
            
            </figure><p>It’s worth noting that Enterprise sites <i>without</i> Bot Management can see a snapshot of their bot traffic. This data is updated in real time and should help you determine if you have a bot problem. Generally speaking, if you have a double-digit percentage of automated traffic, you might be spending more on origin costs than you have to. More importantly, you might be losing revenue or sensitive information to inventory hoarding and credential stuffing.</p><p>“Requests by bot score” is the first section on the page. Here, we show traffic over time, but we split it vertically by the traffic <i>type</i>. Green segments represent verified bots, while shades of purple and blue show varying degrees of bot/human likelihood.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZaSbc6cWjucmYClGvzuS5/b9476281515e388c369b281c394423d4/image4-18.png" />
            
            </figure><p>“Bot score distribution” is next. This shows similar data, but we display it horizontally without the notion of time. Use the slider below to filter on subsets of traffic and watch the rest of the page adapt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BYVWPMCGAaG5pXPxaqEmv/b8fcfccc838604708509d6f4cf202cb5/image11.gif" />
            
            </figure><p>We recommend that you use the slider to find your ideal bot threshold. In other words: what is the cutoff for suspicious traffic on your site? We generally consider traffic below 30 to be automated, but customers might choose to challenge traffic below 40 or block traffic below 10 (you can even do both!). You should set a threshold that is ambitious but not too aggressive. If your traffic looks like the example below, consider setting a threshold at a “drop off” point like 3 or 14. Why? Notice that the request density is <i>very</i> high near scores 1-2 and 12-13. Many of these requests will have similar characteristics, meaning that the scores immediately above them (3 and 14) offer some differentiating quality. These are the most promising places to segment your bot rules. Notably, not every graph is this pronounced.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76J7q8lsSDNiYinbUxSbPj/b8d9ed88186174dfbb941b3d9e5e3897/image9-7.png" />
            
            </figure><p>“Bot score source” sits lower on the page. Here, you can examine the detection engines that are responsible for scoring your traffic. If you can’t remember the purpose of each engine, simply hover over the tooltip to view a brief description. Customers may wonder why some requests are flagged as “not computed.” This commonly occurs when Cloudflare has issued an error page on your behalf. Perhaps a visitor’s request was met with a gateway timeout (error 504), in which case Cloudflare responded with a branded error page. The error page would not have warranted a challenge or a block, so we did not spend time calculating a bot score. We <a href="/cloudflare-bot-management-machine-learning-and-more/">published another blog post</a> that provides an overview of the most common sources, including <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> and heuristics.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yoWsQlSyd7sSxwTFNW17w/17113052d600b546717d0c60f56ab2ed/image8-5.png" />
            
            </figure><p>“Top requests by source” is the final section of Bot Analytics. Although it’s not quite as colorful as the sections above, this section grounds Bot Analytics in highly specific data. You can filter or exclude request attributes, including IP addresses, user agents, and ASNs. In the next section, we’ll use this to spot a <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot-attack/">bot attack</a>.</p>
    <div>
      <h3>Let's Spot A Bot Attack!</h3>
      <a href="#lets-spot-a-bot-attack">
        
      </a>
    </div>
    <p>First, I’m going to use the “bot score source” tool to select the most obvious bot requests — those detected by our heuristics engine. This provides us with the following information, some of which has been redacted for privacy reasons:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1tWLaakMDU1XsVQSDfSlYw/dede3d522c458e917a194775333bbc31/image1.jpg" />
            
            </figure><p>I already suspect a correlation between a few of these attributes. First, the IP addresses all have <i>very</i> similar request counts. No human would access a site 22,000 times, and the uniformity across IPs 2-5 suggests foul play. Not surprisingly, the same pattern occurs for user agents on the right. User agents tell us about the browser and device associated with a particular request. When Bot Analytics shows <i>this</i> much uniformity and presents clear anomalies in country and ASN, I get suspicious (and you should too). I’m now going to filter on these anomalies to see if my instinct is right:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4kh839KKKuO74e0jDpBgTu/c1851474055b371718227295e3da76cd/image12.jpg" />
            
            </figure><p>The trends hold true — to be sure, I briefly expanded the table and found nine separate IP addresses exhibiting the same behavior. This is likely an <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">aggressive content scraper</a>. Notably, it is not marked as a verified bot, so Bot Management issued the lowest possible score and flagged it as “automated.” At the top of Bot Analytics, I will narrow down the traffic and keep the time period at 24 hours:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XuwBlGBWjAfic4QHBRht7/1e247556dd965dae20e430e81d75e06d/image10.jpg" />
            
            </figure><p>The most severe attacks come and go. This traffic is clearly sustained, and my best guess is that someone is frequently scraping the homepage for content. This isn’t the most malicious of attacks, but content is still being taken. If I wanted to, I could set a firewall rule to target this bot score or any of the filters I used.</p>
    <div>
      <h3>Try It Out</h3>
      <a href="#try-it-out">
        
      </a>
    </div>
    <p>As a reminder, all Enterprise customers will be able to see a snapshot of their bot traffic. Even if you don’t have <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> for your site, visit the Firewall for some high-level insights that are updated in real time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SxTiDi4jTTjw3BydRiaZG/35091cde80d489f12f843ffbe2a958ae/image5-12.png" />
            
            </figure><p>And for those of you with Bot Management — check out Bot Analytics! It’s live now, and we hope you’ll have fun using it. Keep your eyes open for new analytics features in the coming months.</p> ]]></content:encoded>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">6YS9CdYeBJA3Zzz79f6H8P</guid>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Certificate Transparency Monitoring]]></title>
            <link>https://blog.cloudflare.com/introducing-certificate-transparency-monitoring/</link>
            <pubDate>Thu, 08 Aug 2019 22:00:00 GMT</pubDate>
            <description><![CDATA[ With CT Monitoring, we’ll send you an email whenever a certificate is issued for one of your domains.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we’re launching <b>Certificate Transparency Monitoring</b> (my summer project as an intern!) to help customers spot malicious certificates. If you opt into CT Monitoring, we’ll send you an email whenever a certificate is issued for one of your domains. We crawl all public logs to find these certificates quickly. CT Monitoring is available now in public beta and can be enabled in the <a href="https://dash.cloudflare.com/?zone=crypto">Crypto Tab</a> of the Cloudflare dashboard.</p>
    <div>
      <h2>Background</h2>
      <a href="#background">
        
      </a>
    </div>
    <p>Most web browsers include a lock icon in the address bar. This icon is actually a button — if you’re a security advocate or a compulsive clicker (I’m both), you’ve probably clicked it before! Here’s what happens when you do just that in Google Chrome:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XvfkfThYBIJKSknSrYtC/bc218dbd4886c16992917dc01042d9f0/image7.png" />
            
            </figure><p>This seems like good news. The Cloudflare blog has presented a valid certificate, your data is private, and everything is secure. But what does this actually mean?</p>
    <div>
      <h2>Certificates</h2>
      <a href="#certificates">
        
      </a>
    </div>
    <p>Your browser is performing some behind-the-scenes work to keep you safe. When you request a website (say, cloudflare.com), the website should present a certificate that proves its identity. This certificate is like a stamp of approval: it says that your connection is secure. In other words, the certificate proves that content was not intercepted or modified while in transit to you. An altered Cloudflare site would be problematic, especially if it looked like the actual Cloudflare site. Certificates protect us by including information about websites and their owners.</p><p>We pass around these certificates because <b>the honor system doesn’t work on the Internet</b>. If you want a certificate for your own website, just request one from a Certificate Authority (CA), or sign up for Cloudflare and we’ll do it for you! CAs issue certificates just as real-life notaries stamp legal documents. They confirm your identity, look over some data, and use their special status to grant you a digital certificate. Popular CAs include DigiCert, Let’s Encrypt, and Sectigo. This system has served us well because it has kept imposters in check, but also promoted trust between domain owners and their visitors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6rSjggcosa2uxJsC5WHSq/f22de7e8f2fcf233037a18a3f69010c2/image12.png" />
            
            </figure><p>Unfortunately, nothing is perfect.</p><p>It turns out that CAs make mistakes. In rare cases, they become reckless. When this happens, <i>illegitimate</i> certificates are issued (even though they appear to be authentic). If a CA accidentally issues a certificate for your website, but you did <i>not</i> request the certificate, you have a problem. Whoever received the certificate might be able to:</p><ol><li><p>Steal login credentials from your visitors.</p></li><li><p>Interrupt your usual services by serving different content.</p></li></ol><p><a href="https://slate.com/technology/2016/12/how-the-2011-hack-of-diginotar-changed-the-internets-infrastructure.html">These attacks <i>do</i> happen</a>, so there’s good reason to care about certificates. More often, domain owners lose track of their certificates and panic when they discover unexpected certificates. We need a way to prevent these situations from ruining the entire system.</p>
    <div>
      <h2>Certificate Transparency</h2>
      <a href="#certificate-transparency">
        
      </a>
    </div>
    <p>Ah, Certificate Transparency (CT). CT solves the problem I just described by making all certificates public and easy to audit. When CAs issue certificates, they must submit certificates to at least two “public logs.” This means that collectively, the logs carry important data about all trusted certificates on the Internet. Several companies offer CT logs — Google has launched a few of its own. <a href="/introducing-certificate-transparency-and-nimbus/">We announced Cloudflare's Nimbus log last year</a>.</p><p>Logs are really, really big, and often hold hundreds of millions of certificate records.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GbvFMP5eeaj2RWq6Yaxsf/a1055a89cd2f34496b18f5a71e7ad117/image1.png" />
            
            </figure><p>The log infrastructure helps browsers validate websites’ identities. When you request cloudflare.com in Safari or Google Chrome, the browser will actually require Cloudflare’s certificate to be registered in a CT log. If the certificate isn’t found in a log, you won’t see the lock icon next to the address bar. Instead, the browser will tell you that the website you’re trying to access is not secure. Are you going to visit a website marked “NOT SECURE”? Probably not.</p><p>There are systems that audit CT logs and report illegitimate certificates. Therefore, if your browser finds a valid certificate that is also trusted in a log, everything is secure.</p>
    <div>
      <h2>What We're Announcing Today</h2>
      <a href="#what-were-announcing-today">
        
      </a>
    </div>
    <p>Cloudflare has been an industry leader in CT. In addition to Nimbus, <a href="/a-tour-through-merkle-town-cloudflares-ct-ecosystem-dashboard/">we launched a CT dashboard called Merkle Town and explained how we made it.</a> Today, we’re releasing a public beta of Certificate Transparency Monitoring.</p><p>If you opt into CT Monitoring, we’ll send you an email whenever a certificate is issued for one of your domains. When you get an alert, don’t panic; we err on the side of caution by sending alerts whenever a possible domain match is found. Sometimes you may notice a suspicious certificate. Maybe you won’t recognize the issuer, or the subdomain is not one you offer (e.g. slowinternet.cloudflare.com). Alerts are sent quickly so you can contact a CA if something seems wrong.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5aHufY0b0kBy8dvmJ3dums/99a4d663cb449b11cfc697355ddb9bc1/image6.png" />
            
            </figure><p>This raises the question: if services already audit public logs, why are alerts necessary? Shouldn’t errors be found automatically? Well no, because auditing is not exhaustive. The best person to audit your certificates is <i>you</i>. You know your website. You know your personal information. Cloudflare will put relevant certificates right in front of you.</p><p>You can enable CT Monitoring on the Cloudflare dashboard. Just head over to the <a href="https://dash.cloudflare.com/?zone=crypto">Crypto Tab</a> and find the “Certificate Transparency Monitoring” card. You can always turn the feature off if you’re too popular in the CT world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5nCWrURoHLrjcm1nScYuBR/12c998fde2cbffb1b68d63907db06c20/ct-free.png" />
            
            </figure><p>If you’re on a Business or Enterprise plan, you can tell us who to notify. Instead of emailing the zone owner (which we do for Free and Pro customers), we accept up to 10 email addresses as alert recipients. We do this to avoid overwhelming large teams. These emails do not have to be tied to a Cloudflare account and can be manually added or removed at any time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6F3T0DoxkHboFcrAlluK9n/aca3ec4078c5e6745cfe41e70e51370c/ct-enterprise.png" />
            
            </figure>
    <div>
      <h2>How This Actually Works</h2>
      <a href="#how-this-actually-works">
        
      </a>
    </div>
    <p>Our Cryptography and SSL teams worked hard to make this happen; they built on the work of some clever tools mentioned earlier:</p><ul><li><p><a href="https://ct.cloudflare.com/">Merkle Town</a> is a hub for CT data. We process <i>all</i> trusted certificates and present relevant statistics on our website. This means that every certificate issued on the Internet passes through Cloudflare, and all the data is public (so no privacy concerns here).</p></li><li><p>Cloudflare Nimbus is our very own CT log. It contains more than 400 million certificates.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2B2hYIC9O5TDhAiESAODVG/383c7a9ab11fcdd7ad695b3c3c730943/image11.png" />
            
            </figure><p>Note: Cloudflare, Google, and DigiCert are not the only CT log providers.</p><p>So here’s the process... At some point in time, you (or an impostor) request a certificate for your website. A Certificate Authority approves the request and issues the certificate. Within 24 hours, the CA sends this certificate to a set of CT logs. This is where we come in: Cloudflare uses an internal process known as “The Crawler” to look through millions of certificate records. Merkle Town dispatches The Crawler to monitor CT logs and check for new certificates. When The Crawler finds a new certificate, it pulls the entire certificate through Merkle Town.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7r0eW4WoQeH64mvg354HO6/81ed08a9d6b3264a44ea74ce3694b8c3/image4.png" />
            
            </figure><p>When we process the certificate in Merkle Town, we also check it against a list of monitored domains. If you have CT Monitoring enabled, we’ll send you an alert immediately. This is only possible because of Merkle Town’s existing infrastructure. Also, The Crawler is ridiculously fast.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NncFdAIyDlEDUo5BmKKZC/95ff61f627f90e9c56b58d8b8fa43b1a/image13.png" />
            
            </figure>
    <div>
      <h2>I Got a Certificate Alert. What Now?</h2>
      <a href="#i-got-a-certificate-alert-what-now">
        
      </a>
    </div>
    <p>Good question. Most of the time, certificate alerts are routine. Certificates expire and renew on a regular basis, so it’s totally normal to get these emails. If everything looks correct (the issuer, your domain name, etc.), go ahead and toss that email in the trash.</p><p>In rare cases, you might get an email that looks suspicious. <a href="https://support.cloudflare.com/hc/en-us/articles/360031379012">We provide a detailed support article that will help</a>. The basic protocol is this:</p><ol><li><p>Contact the CA (listed as “Issuer” in the email).</p></li><li><p>Explain <i>why</i> you think the certificate is suspicious.</p></li><li><p>The CA should revoke the certificate (if it really is malicious).</p></li></ol><p>We also have a friendly support team that can be reached <a href="https://support.cloudflare.com/hc/en-us/articles/200172476">here</a>. While Cloudflare is not at CA and cannot revoke certificates, our support team knows quite a bit about certificate management and is ready to help.</p>
    <div>
      <h2>The Future</h2>
      <a href="#the-future">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yBCtqs81a22hZy4ri78Nb/f61cf359f273a3cbb7be0d7e763e1a86/image2.png" />
            
            </figure><p>Certificate Transparency has started making regular appearances on the Cloudflare blog. Why? It’s required by Chrome and Safari, <a href="http://gs.statcounter.com/">which dominate the browser market</a> and <a href="https://github.com/chromium/ct-policy">set precedents for Internet security</a>. But more importantly, CT can help us spot malicious certificates <i>before</i> they are used in attacks. This is why we will continue to refine and improve our certificate detection methods.</p><p>What are you waiting for? Go enable <a href="https://dash.cloudflare.com/?zone=crypto">Certificate Transparency Monitoring</a>!</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[Certificate Transparency]]></category>
            <guid isPermaLink="false">35mDBlzR372BwHY48iYqK4</guid>
            <dc:creator>Ben Solomon</dc:creator>
        </item>
    </channel>
</rss>