×

System and method to protect a webserver against application exploits and attacks

  • US 10,432,650 B2
  • Filed: 03/30/2017
  • Issued: 10/01/2019
  • Est. Priority Date: 03/31/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method of protecting, from packet data communication exploits, a target computer server system having a request handling interface that responds to a data processing request of a packet data communication, the method comprising:

  • receiving over a data communication network a plurality of data processing requests;

    identifying as being anomalous, by an automated anomaly analyzer, a first data processing request of the plurality of data processing requests, the first data processing request having been transmitted by a first packet data protocol sending device,wherein in response to the identifying as being anomalous, the automated anomaly analyzer;

    (1) directs the first data processing request to a first diagnostic instrumented module configured to provide virtualization of the request handling interface in processing the first data processing request and to determine an anomaly severity of the first data processing request, and(2) performs a second data processing comprising;

    (a) transmitting, to the first packet data protocol remote sending device, a packet data protocol redirect request for accessing the target computer server system,(b) transmitting, to the first packet data protocol sending device, a response to the first data processing request at a reduced content data byte per second rate compared with the rate of the response to the second data processing request, and(c) transmitting, to the first packet data protocol sending device, a response including invoking code requesting additional data from a network server resource other than the first packet data protocol sending device; and

    identifying as being non-anomalous, by the automated anomaly analyzer, a second data processing request of the plurality of data processing requests,wherein in response to the identifying as being non-anomalous, the automated anomaly analyzer transmits the second data processing request to the target computer server system.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×