"Traps" , as the name suggests, are instances of logic which analyse every click or an impression which goes through Botman.
These traps are threat handlers. Traps which handle high level threat , medium level threat, and low level threat.
Once a trap identifies a certain threat, it can neutralise it or forward it for analysis. These settings are left to the customer. Having the concept of traps helps in being selective for the type of traffic which is being handled. There are some traps which must be enabled, and there are some which can be optional for the type of campaign which is running.
Examples of traps
Data Center Trap
Identifies traffic from data centers
Identifies traffic from C&C botnets
Identifies traffic from invisible 1x1 source pixels
Identifies traffic from non-viewable sources
Click Flood Trap
Identifies click flood in campaigns
Identifies emulator and fake device traffic
Identifies spoofed domain traffic
Identifies Pop Traffic
Identifies Torrent Traffic
Identifies Malware originated Traffic
Identifies AdWare originated Traffic
Identifies Non-Brand Safe Traffic
Identifies Public Proxy , TOR Exit Nodes Traffic
Identifies Trojan, Spam Traffic
Having these traps enabled strengthens the analysis of campaign traffic and helps in decision making.