Real-time monitoring of web page code
First Claim
1. A computer-implemented method for monitoring by a virtual document object model (DOM) firewall executed in response to a web browser request by a web browser rendering a web page, the method executed by at least one hardware processor of a web server hosting the web page code in network communication with a client terminal accessing the web page code hosted by the web-server, the method comprising:
- receiving over a network from the web browser executing on the client terminal, a request to access the web page code hosted by the web server;
monitoring, by a monitoring code, at least one of attempted actions and attempted events initiated by each of a plurality of components of the web page code, wherein the at least one of attempted actions and attempted events include instructions for manipulation of a document object model (DOM) of the web page code, and the monitoring code includes a virtual DOM firewall that simulates the DOM by intercepting the at least one of attempted actions and attempted events targeting the DOM without execution of the at least one of attempted actions and attempted events on the DOM;
identifying a deviation from a set-of-rules according to an analysis of the monitored at least one of attempted actions and attempted events, wherein the set-of-rules define allowable manipulation of the DOM, and prohibited manipulation of the DOM;
wherein the virtual DOM firewall is stored on the web server and executed by the hardware processor of the web server in associated with the web page code;
wherein a common set-of-rules is defined for the web page code for execution by the web server when each client terminal of a plurality of client terminals access the web page code, the set-of-rules are stored in association with the web server hosting the web page; and
wherein the at least one of attempted actions and attempted events that deviate from the set-of-rules are prevented from execution on the DOM, and the at least one of attempted actions and attempted events that adhere to the set-of-rules are allowed to continue execution on the DOM.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for monitoring web page code comprising: monitoring attempted actions and/or attempted events initiated by components of the web page code for manipulation of a document object model (DOM), the monitoring performed by a virtual DOM firewall that simulates the DOM by intercepting the attempted actions and/or attempted events targeting the DOM without execution of the attempted actions and/or attempted events on the DOM, and identifying a deviation from a set-of-rules defining allowable manipulation of the DOM, and prohibited manipulation of the DOM, wherein the virtual DOM firewall is stored on the web server and executed by the hardware processor of the web server in associated with the web page code, wherein attempted actions and/or attempted events that deviate from the set-of-rules are prevented from execution on the DOM, and attempted actions and/or attempted events that adhere to the set-of-rules are allowed to continue execution on the DOM.
13 Citations
36 Claims
-
1. A computer-implemented method for monitoring by a virtual document object model (DOM) firewall executed in response to a web browser request by a web browser rendering a web page, the method executed by at least one hardware processor of a web server hosting the web page code in network communication with a client terminal accessing the web page code hosted by the web-server, the method comprising:
-
receiving over a network from the web browser executing on the client terminal, a request to access the web page code hosted by the web server; monitoring, by a monitoring code, at least one of attempted actions and attempted events initiated by each of a plurality of components of the web page code, wherein the at least one of attempted actions and attempted events include instructions for manipulation of a document object model (DOM) of the web page code, and the monitoring code includes a virtual DOM firewall that simulates the DOM by intercepting the at least one of attempted actions and attempted events targeting the DOM without execution of the at least one of attempted actions and attempted events on the DOM; identifying a deviation from a set-of-rules according to an analysis of the monitored at least one of attempted actions and attempted events, wherein the set-of-rules define allowable manipulation of the DOM, and prohibited manipulation of the DOM; wherein the virtual DOM firewall is stored on the web server and executed by the hardware processor of the web server in associated with the web page code; wherein a common set-of-rules is defined for the web page code for execution by the web server when each client terminal of a plurality of client terminals access the web page code, the set-of-rules are stored in association with the web server hosting the web page; and wherein the at least one of attempted actions and attempted events that deviate from the set-of-rules are prevented from execution on the DOM, and the at least one of attempted actions and attempted events that adhere to the set-of-rules are allowed to continue execution on the DOM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system for monitoring by a virtual document object model (DOM) firewall executed in response to a web browser request by a web browser rendering a web page, the system comprising:
a non-transitory memory having stored thereon a code for execution by at least one hardware processor of a web server hosting web page code in network communication with a client terminal accessing the web page code hosted by the web-server, the code comprising; code for receiving over a network from the web browser executing on the client terminal, a request to access the web page code hosted by the web server; code for monitoring, by a monitoring code, at least one of attempted actions and attempted events initiated by each of a plurality of components of the web page code, wherein the at least one of attempted actions and attempted events include instructions for manipulation of a document object model (DOM) of the web page code, and the monitoring code includes a virtual DOM firewall that simulates the DOM by intercepting the at least one of attempted actions and attempted events targeting the DOM without execution of the at least one of attempted actions and attempted events on the DOM; code for identifying a deviation from a set-of-rules according to an analysis of the monitored at least one of attempted actions and attempted events, wherein the set-of-rules define allowable manipulation of the DOM, and prohibited manipulation of the DOM; wherein the virtual DOM firewall is stored on the web server and executed by the hardware processor of the web server in associated with the web page code; wherein a common set-of-rules is defined for the web page code for execution by the web server when each client terminal of a plurality of client terminals access the web page code, the set-of-rules are stored in association with the web server hosting the web page; and wherein the at least one of attempted actions and attempted events that deviate from the set-of-rules are prevented from execution on the DOM, and the at least one of attempted actions and attempted events that adhere to the set-of-rules are allowed to continue execution on the DOM.
-
36. A computer program product for monitoring by a virtual document object model (DOM) firewall executed in response to a web browser request by a web browser rendering a web page, the computer program product comprising:
a non-transitory memory having stored thereon a code for execution by at least one hardware processor of a web server hosting web page code in network communication with a client terminal accessing the web page code hosted by the web-server, the code comprising; instructions for receiving over a network from the web browser executing on the client terminal, a request to access the web page code hosted by the web server; instructions for monitoring, by a monitoring code, at least one of attempted actions and attempted events initiated by each of a plurality of components of the web page code, wherein the at least one of attempted actions and attempted events include instructions for manipulation of a document object model (DOM) of the web page code, and the monitoring code includes a virtual DOM firewall that simulates the DOM by intercepting the at least one of attempted actions and attempted events targeting the DOM without execution of the at least one of attempted actions and attempted events on the DOM; instructions for identifying a deviation from a set-of-rules according to an analysis of the monitored at least one of attempted actions and attempted events, wherein the set-of-rules define allowable manipulation of the DOM, and prohibited manipulation of the DOM; wherein the virtual DOM firewall is stored on the web server and executed by the hardware processor of the web server in associated with the web page code; wherein a common set-of-rules is defined for the web page code for execution by the web server when each client terminal of a plurality of client terminals access the web page code, the set-of-rules are stored in association with the web server hosting the web page; and wherein the at least one of attempted actions and attempted events that deviate from the set-of-rules are prevented from execution on the DOM, and the at least one of attempted actions and attempted events that adhere to the set-of-rules are allowed to continue execution on the DOM.
Specification