Avoid Evasive Scraping with Stronger Content Protection

Emily Lyons

Mar 10, 2026

Emily Lyons

Emily Lyons

Written by

Emily Lyons

Emily Lyons leads product marketing initiatives across Akamai's Application and API security solutions. She began her career in marketing and technology, holding a variety of roles in both North America and the United Kingdom. She leverages this background to help solve global business challenges, build effective communications, and market purpose-built cloud, networking, and security solutions. Emily works directly with Akamai Product Management, Engineering, and Sales teams.

Share

Today’s scrapers don’t just send obvious automated requests. They rotate IPs, mimic browsers, replay sessions, simulate user behavior, and increasingly target mobile applications directly. For publishers, streaming platforms, ticketing companies, and retailers, that means traditional detection methods are no longer enough.

To stay ahead of evasive scraping and content abuse, we’re introducing two major enhancements to Akamai Content Protector:

  • Native mobile app traffic protection

  • A dynamic advanced validation framework (AVF) with interactive behavioral challenges

Together, these updates extend protection beyond the browser, improve detection precision, and reduce false positives, without compromising user experience.

Protect native mobile applications from scraping

Mobile applications are a growing target for scraping operations. Attackers reverse engineer APIs, automate traffic through emulators, and attempt to bypass browser-based defenses entirely. With the Native App Traffic Protection SDK, Content Protector now defends against unwanted bot activity in native mobile application traffic.

How the Native App Traffic Protection SDK works

As users interact with your native application, the SDK collects behavioral data from the device and securely sends it to the Content Protector detection engine for evaluation. This enables Akamai to:

  • Detect automated frameworks that are targeting mobile apps

  • Identify scripted abuse that bypasses browser controls

  • Apply the correct mobile-specific detection workflow

To enable this protection, customers configure their mobile app under a custom client definition, ensuring that Content Protector applies the appropriate detection logic to those requests. 

It’s important to note that the SDK needs to be integrated into the app, and the app needs to be compiled and published to stores. If your mobile app serves traffic inside a WebView that supports JavaScript and cookies, that traffic is classified as web traffic. In that case, the Native App Traffic Protection SDK is not required.

Adaptive detection with the advanced validation framework

Modern scraping operations are designed to evade static detection. They mimic legitimate users and carefully manage request patterns to avoid triggering traditional controls.

Content Protector relies on numerous detection methods, each requiring specific signals. If a detection method lacks sufficient information to make a confident decision, the new AVF dynamically requests additional data from the device.

This makes detection:

  • Adaptive and self-healing

  • More precise

  • Less prone to false positives

Rather than relying solely on passive data collection, Content Protector has always actively gathered the information needed to confidently distinguish legitimate users from evasive scrapers

What's different now is that we only collect additional information when it's required. This way, we can keep the impact on end users to the absolute minimum, while making sure that we always have the required information. Challenges are only applied dynamically when and where they’re truly needed.

With a typical false-positive rate below 0.1% for most detection methods, legitimate users rarely encounter a challenge — and when they do, they won’t be re-challenged for at least 50 minutes.

Interactive behavioral challenge: Stopping human-like scrapers

The most evasive scraping tools attempt to simulate real-user behavior. That makes simple fingerprinting insufficient. AVF introduces an opt-in interactive behavioral challenge that evaluates how users actually interact with the page.

Unlike traditional transparent challenges that collect only device fingerprints, this method gathers rich behavioral telemetry, including:

  • Mouse movement

  • Touch interactions

  • Key presses

This allows Content Protector to detect subtle inconsistencies in automation even when scrapers attempt to replicate human browsing patterns.

What users see

For GET or POST HTML requests, the interactive challenge appears as a short interstitial page before the original site content loads. Users complete a quick tile-based puzzle that typically takes only seconds. 

The challenge includes five mini-game types using grids of numbers or letters. When anomalies are detected during initial evaluation, AVF determines whether a challenge is required and selects the most appropriate format to minimize friction.

All validation processing occurs in real time with HTTP 200 responses — and once the challenge is completed, the original content request is reloaded seamlessly.

Custom-branded challenge pages

Security should not feel disconnected from your digital experience. The interactive challenge page can be fully customized with your logo, fonts, brand colors, and other design elements.

Customers can host custom HTML and CSS on their origin or NetStorage, ensuring responsive behavior across desktop, tablet, and mobile devices. The result: Strong validation that feels native to your site.

Stronger protection without compromising user experience

Evasive scraping forces many organizations into a difficult position: tighten controls and risk user friction, or relax enforcement and risk content loss. With the Native App Traffic Protection SDK, content protection now extends to native mobile apps, securing confidence in stopping evasive scraping beyond the browser. And AVF with behavioral challenges helps secure against human-like scraping attempts while not compromising user experience. 

These added capabilities enable Content Protector to deliver comprehensive protection across web and mobile, while preserving the experience your legitimate users expect.

Learn more

To learn more about Content Protector and these new capabilities, contact an expert.

Emily Lyons

Mar 10, 2026

Emily Lyons

Emily Lyons

Written by

Emily Lyons

Emily Lyons leads product marketing initiatives across Akamai's Application and API security solutions. She began her career in marketing and technology, holding a variety of roles in both North America and the United Kingdom. She leverages this background to help solve global business challenges, build effective communications, and market purpose-built cloud, networking, and security solutions. Emily works directly with Akamai Product Management, Engineering, and Sales teams.

Tags

Share

Related Blog Posts

Security
The API Weak Spot: Study Shows AI Is Compounding Security Pressures
April 28, 2026
Nearly 90% of businesses faced API security incidents last year at an average cost of US$700,000. A new study shows how AI is increasing API risks.
Security
The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
April 24, 2026
Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.
Security
Why AI-Powered Vulnerability Discovery Strengthens Akamai's Security Mission
April 10, 2026
Read about the implications of AI-powered vulnerability discovery — and learn how Akamai can help navigate the resulting new security landscape.