Techniques for identifying and managing potentially harmful web traffic
First Claim
Patent Images
1. A method of identifying a potentially harmful request comprising:
- assigning a threat rating to a received request in accordance with one or more attribute values of said received request; and
determining an action in accordance with said threat rating.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for identifying a potentially harmful request. A threat rating is assigned to a received request in accordance with one or more attribute values of the received request. An action is determined in accordance with the threat rating.
-
Citations
20 Claims
-
1. A method of identifying a potentially harmful request comprising:
-
assigning a threat rating to a received request in accordance with one or more attribute values of said received request; and
determining an action in accordance with said threat rating. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of identifying a potentially harmful request comprising:
-
receiving one or more threat profiles identifying threat ratings for associated attribute values included in incoming request;
tagging an incoming request with a request threat rating in accordance with one or more attribute values of said incoming request; and
determining an action in accordance with said request threat rating. - View Dependent Claims (17, 18)
-
-
19. A computer readable medium having computer executable instructions stored thereon for performing steps comprising:
-
receiving one or more threat profiles identifying threat ratings for associated attribute values included in incoming request;
tagging an incoming request with a request threat rating in accordance with one or more attribute values of said incoming request;
determining an action in accordance with said request threat rating; and
performing said action. - View Dependent Claims (20)
-
Specification