Online Bot Statistics on the Rise

Picture of Saxons Blog

Saxons Blog

Last year we discussed Imperva’s online bot and traffic statistics for 2022. At the time, they estimated that 42.3% of total web traffic consisted of online bots. Now, as of the 2023 reporting, a total of 49.6% of online traffic wasn’t human. This marks the fifth consecutive year where levels have increased – and this is only expected to rise with the increased usage of Artificial Intelligence.

What is a Bot?

A bot is a software program that runs automated tasks and operates on the Internet. Usually, bots are used to perform simple and repetitive tasks in a manner much faster than any human could. It should be noted that some online bots are “good”, while others are “bad” and used to launch malicious attacks.

Good Bots

Good bots are a critical part of the internets ecosystem, serving an important purpose. An example of this is a search engine spider – or “web crawler” – allowing internet search companies (such as Google) to analyse millions of files on servers throughout the world. Around 15% of total web traffic consists of these good bots.

Bad Bots

Bad bots are are malicious with their intent. Bots can prove to be quite persistent on their targets, presenting a challenge for businesses that want to maintain smooth operations. Bots can impact bandwidth consumption, thus effecting the experiences for a businesses legitimate customers visiting their site. OWASP, Open Web Application Security Project, detail an extensive list of automated threats bots present. Some of which include:

  • Scraping data from sites without permission from site owners with the intent to reuse it to gain a competitive edge.
  • Scalping stock from websites through automation, especially for limited availability items, and reselling them at a higher price.
  • Creating distributed denial of service (DDoS) attacks targeted at networks or applications.
  • Spamming website comments or emails with unsavoury comments and phishing links.

How do “Bad Bots” Operate?

Bad bots operate by attempting to interact with applications in the same way a legitimate human user would – masking themselves to avoid detection. This makes bots increasingly difficult to identify and block, especially with technology and bot methods advancing over the years. Through the nature of their automation, bots enable high-speed abuse, misuse, and attacks on websites, mobile apps, and APIs.

It’s important to remember that these malicious online bots do not act on their own, but are the product of “bot operators”. These bot operators can range from being antagonistic hobbyists that enjoy wreaking havoc, to immoral competitors wanting to gain an upper hand in their industry, to fraudsters utilising the online landscape to conduct their scams in mass.

Share this post on...
Facebook
Twitter
LinkedIn

LATEST POSTS

digital hygiene
Tech

Digital Hygiene Tips

Keeping good digital hygiene is an important aspect of being online. Below are 5 tips to keep in mind. 5 Tips for Good Digital Hygiene

Read More »

We provide a comprehensive range of IT solutions for Australian businesses

continuity

Business Continuity

Business Continuity is the planned process employed by companies to re-instate their business process. It details the procedures acted upon to ensure the continuance of essential functions during and post event.

connectivity

Business Connectivity

Business Connectivity is the underlying framework including applications designed to keep your business talking. It allows for fluid communication between project teams, clients and management.

mobility

Business Mobility

Business Mobility is the practice of IT strategy supporting work on any device or in any location. It allows for work to continue on the go, while reducing costs and promoting more open corporate culture.

relocation

Business Relocation

Business Relocation is the planning and implementation of new site operations. It allows for the seamless IT operation of new offices with zero downtime.

scalable

Scalable Solutions

Scalable IT Solutions allow you to only pay for what you use, with the ability to rapidly increase your resources in response to business growth or other changes.

security

IT Security

IT Security protects your data, business processes and IP from threats and intrusions, in a secure, enterprise-grade computing environment.