This technology pertains to the use of a logical robot detection system that locates automated processes and systems that attempt to access and/or send data in any way to any of the systems on a secured network. This includes multiple layers of logical robot intrusion detection systems that filter traffic based on known patterns, and conduct scans of suspect robots and automated systems that are unknown to build profiles of the robots and systems, and the secured network determines all traffic input and output based on authorization rather than secured access, such that secured access occurs above authorization, and the secure network scans for half-open connections to determine what the purpose of the traffic is before determining if the internal traffic should be routed to the attempt to open a circuit. All attempts of third party systems to conduct scans using half-open / partial packets are automatically closed.