-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IDEA: security loopback/controller #129
Labels
enhancement
New feature or request
Comments
orubel
changed the title
IDEA: dynamically generated loopback for securty
IDEA: security loopback/controller
Aug 21, 2024
we could also assign a separate session variable and header to do additional detection of how it is routing; this could be good for detection with your proxy and ISP in tracking it down. |
orubel
added
enhancement
New feature or request
and removed
bug
Something isn't working
labels
Aug 29, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
say you have people attempting to mine your apis by hitting them over and over and over and your system detects this and flags it...
what next?
You can kick them out but then you won't be able to block their next attack or they will just attempt from another bot in their network.
If you keep their script looping indefinitely in your system, it will THINK it is mining when you can just feed it a pre-built dataset.
If we have a template or even a prebuilt template to work off, we can
In fact being able to loopback traffic detected as different would be very good for analysis
The text was updated successfully, but these errors were encountered: