×

IDENTIFYING A SECURITY THREAT TO A WEB-BASED RESOURCE

  • US 20180219890A1
  • Filed: 02/01/2017
  • Published: 08/02/2018
  • Est. Priority Date: 02/01/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • monitoring access logs associated with user requests for a web-based resource;

    identifying, based on the access logs, one or more parameters that index records of the web-based resource;

    generating at least one baseline distribution of values of the one or more parameters;

    calculating, based on the at least one baseline distribution, a baseline entropy of the one or more parameters;

    generating at least one distribution of values of the one or more parameters associated with user requests made by a particular user;

    calculating, based on the distribution, an entropy of the one or more parameters associated with the user requests made by the particular user;

    comparing the entropy to the baseline entropy; and

    if a difference between the baseline entropy and the entropy exceeds a threshold, determining that the user requests made by the particular user poses a security threat to the web-based resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×