Websites hosted for public access are accessed by various entities. Majority are genuine users. Others include software based scanners and automated probes from attackers. Automated probes are sophisticated enough to act like human visitors. Work out a solution to distinguish automated web traffic from human generated traffic.
Notes : Participants have to simulate the web server required for POC. The solution should work on Windows and Linux platform.
Sample Data Required: No