Apparatus and method for defending against internet-based attacks
First Claim
1. A method for defending against internet-based attacks, the method comprising:
- receiving a script request when a web request is transmitted by a device to a customer server to access a web page, wherein the script request is generated based on a code segment of the web page;
determining that the web request was generated by a script if the script request is not received and if there is no data for a challenge status associated with the device;
receiving information associated with the device based on the script request generated based on the code segment;
determining, utilizing instructions stored in memory and executed by a processor, whether traffic associated with the web request from the device to the customer server is suspected of being used for malicious activity;
enabling the device to access the web page if the traffic is determined not to be suspected of being used for malicious activity;
transmitting a challenge to the device if the traffic is determined to be suspected of being used for malicious activity;
receiving information associated with the web request, wherein the information associated with the web request is provided by a uniform resource locator invoked in response to the traffic being determined to be suspected of being used for malicious activity; and
authorizing the device to access the web page based on a correct response to the challenge being received from the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for defending against internet-based attacks is disclosed. The system may include a processor which may be configured to receive information associated with a device when a web request is transmitted by the device to access a web page monitored by the processor. The processor may also determine whether traffic associated with the web request from the device is suspected of being used for malicious activity and, if not, enable the device to access the web page. If the traffic is suspected of being used for malicious activity, then the processor may transmit a challenge to the device if the traffic is determined to be suspected. Furthermore, the processor may receive information associated with the web request, which may be provided by a uniform resource locator invoked in response to the traffic being determined to be suspected.
18 Citations
20 Claims
-
1. A method for defending against internet-based attacks, the method comprising:
-
receiving a script request when a web request is transmitted by a device to a customer server to access a web page, wherein the script request is generated based on a code segment of the web page; determining that the web request was generated by a script if the script request is not received and if there is no data for a challenge status associated with the device; receiving information associated with the device based on the script request generated based on the code segment; determining, utilizing instructions stored in memory and executed by a processor, whether traffic associated with the web request from the device to the customer server is suspected of being used for malicious activity; enabling the device to access the web page if the traffic is determined not to be suspected of being used for malicious activity; transmitting a challenge to the device if the traffic is determined to be suspected of being used for malicious activity; receiving information associated with the web request, wherein the information associated with the web request is provided by a uniform resource locator invoked in response to the traffic being determined to be suspected of being used for malicious activity; and authorizing the device to access the web page based on a correct response to the challenge being received from the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for defending against internet-based attacks, the system comprising:
-
a memory that stores instructions; a processor that executes the instructions to perform operations, the operations comprising; receiving a script request when a web request is transmitted by a device to a customer server to access a web page, wherein the script request is generated based on a code segment of the web page; determining that the web request was generated by a script if the script request is not received and if there is no data for a challenge status associated with the device; receiving information associated with the device when the web request is transmitted by the device to access the web page monitored by the electronic data processor; determining if traffic associated with the web request from the device is suspected of being used for malicious activity; enabling the device to access the web page if the traffic is determined not to be suspected of being used for malicious activity; transmitting a challenge to the device if the traffic is determined to be suspected of being used for malicious activity; receiving information associated with the web request, wherein the information associated with the web request is provided by a uniform resource locator invoked in response to the traffic being determined to be suspected of being used for malicious activity; and authorizing the device to access the web page based on a correct response to the challenge being received from the device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable device comprising instructions, which, when loaded and executed by a processor, cause the processor to perform operations comprising:
-
receiving a script request when a web request is transmitted by a device to a customer server to access a web page, wherein the script request is generated based on a code segment of the web page; determining that the web request was generated by a script if the script request is not received and if there is no data for a challenge status associated with the device; receiving information associated with a device when the web request is transmitted by the device to access the web page; determining if traffic associated with the web request from the device is suspected of being used for malicious activity; enabling the device to access the web page if the traffic is determined not to be suspected of being used for malicious activity; transmitting a challenge to the device if the traffic is determined to be suspected of being used for malicious activity; receiving information associated with the web request, wherein the information associated with the web request is provided by a uniform resource locator invoked in response to the traffic being determined to be suspected of being used for malicious activity; and authorizing the device to access the web page based on a correct response to the challenge being received from the device. - View Dependent Claims (18, 19, 20)
-
Specification