Prioritizing Malicious Website Detection
First Claim
Patent Images
1. A computer implemented method comprising:
- identifying a universal resource locator;
characterizing a traffic pattern associated with the universal resource locator, wherein the traffic pattern can include information selected from the group consisting of referrer information, referring information, advertising network relationship information, and any combination thereof; and
classifying the universal resource locator into a risk category based on characterizing the traffic pattern.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method includes identifying a universal resource locator and characterizing a traffic pattern associated with the universal resource locator. The traffic pattern can include referrer information, referring information, advertising network relationship information, and any combination thereof. The method can further include classifying the universal resource locator into a risk category based on the traffic pattern.
-
Citations
20 Claims
-
1. A computer implemented method comprising:
-
identifying a universal resource locator; characterizing a traffic pattern associated with the universal resource locator, wherein the traffic pattern can include information selected from the group consisting of referrer information, referring information, advertising network relationship information, and any combination thereof; and classifying the universal resource locator into a risk category based on characterizing the traffic pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
a processor configured to; obtain click stream information for a plurality of user systems; identify a universal resource locator accessed by at least one of the user systems; characterize a traffic pattern associated with the universal resource locator based on the click stream information, the traffic pattern including information selected from the group consisting of referrer information, referring information, advertising network relationship information, and any combination thereof; and classify the universal resource locator into a risk category based on the traffic pattern. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-volatile computer readable medium comprising a plurality of instructions to manipulate a processor, the plurality of instructions comprising:
-
instructions to obtain click stream information for a plurality of user systems; instructions to identify a universal resource locator accessed by at least one of the plurality of user systems; instructions to characterize a traffic pattern associated with the universal resource locator based on the click stream information, the traffic pattern including information selected from the group consisting of referrer information, referring information, ad network relationship information, and any combination thereof; and instructions to classify the universal resource locator into a risk category based on the traffic pattern. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification