If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network. The DPM uses packet redirection to send the malware to the Bot Trap, where several techniques will be used to attempt near real-time remediation of the compromised host. If the Bot Trap cannot remediate the threat, security application will activate its countermeasure manager to remove the malicious software from the infected device.
2. Resource Abuse
If a bot is able to establish