Applies To:
Show VersionsBIG-IP ASM
- 15.0.1, 15.0.0, 14.1.2, 14.1.0
Writing Custom Bot Signatures
About custom bot signatures
If your organization has additional needs for bot defense, you can write a custom bot signature to identify web robots by looking for specific patterns in the headers of incoming HTTP requests.
Bot signatures are similar to attack signatures; they are written using a limited subset of allowed keywords. You can design custom bot signatures to handle emergency situations, to support security policy enforcement unique to your networking environment, or to provide an analysis of specific activity on the network.
Being able to classify bots into different classes allows you to treat each class differently. You can report, block, or do nothing when a signature matches a malicious or trusted bot class. Further, malicious and trusted bots fall into more specific bot signature categories that can be handled as needed. You can create new categories if they are needed to classify custom bot signatures.
Bot signature syntax limitations
Bot signatures are developed using Snort syntax to search for bots in either the User-Agent field of the header or the URL, or both. The User-Agent field is examined to identify the browser and operating system. The URL is searched to locate bots that access specific peculiar URLs within a site, regardless of whether the site has such a URL (in most cases it does not).
The syntax of bot signatures is similar to that of attack signatures using the general format keyword: "value"; modifier; but bot signatures can include only the following attributes:
- uricontent (objonly flag is not allowed)
- headercontent (useragentonly flag is mandatory)
- ipp (for regular expressions)
- offset
- depth
- nocase
The following are not allowed in bot signatures:
- negation
- norm (normalization is predefined)
- distance modifiers
- within modifiers
Refer to the Signature Options, Signature Syntax, and examples for additional details on the syntax used in bot signatures.