Skip to main content

Dynamic Action: Inflate the Attacking Cost

Traditional bot mitigation relies on predefined static responses - such as Allow, Block, Bypass, Redirect, Display a static HTML, and Challenge - to handle suspicious requests, as well as some widely-adopted advanced actions:

Traditional Actions

Rate Limiting

Controls request frequency from high-risk IPs, preventing API flooding and credential stuffing.

Response Blocking

Identifies and blocks malicious payloads through pattern matching and content inspection.

Payload Inspection

Analyses the content structure and payload composition to detect obfuscation, injection, or malformed requests.

These actions can provide certain control but still lack flexibility and adaptability. Thus, they are insufficient against evolving, sophisticated bot threats.

vMaxGuard's Dynamic Action Framework

vMaxGuard's Dynamic Action framework enhances this by introducing two advanced mechanisms: Intensifiers and Triggering Probability, enabling intelligent, risk-aware defence escalation.

Intensifiers

Request Delay (configurable)

Applies configurable delays to suspicious requests, disrupting bot automation cycles without affecting legitimate users.

Auto-ACL (Access Control List)

Automatically updates IP- or behaviour-based ACLs based on observed anomalies or risk scores, improving long-term mitigation.

Triggering Probability

Always

Actions are executed unconditionally once triggered.

Triggering By Probability

Actions are executed based on configurable threat probability thresholds.