Real-time identification of URLs accessed by automated processes
First Claim
1. A computer implemented method for identifying requests to access URLs that are made automatically by processes, the method comprising the steps of:
- monitoring, by a computer, outbound network traffic originating from a client computer;
detecting requests to access URLs in the outbound network traffic, by a computer;
comparing a plurality of rules to detected requests to access URLs, by a computer, in order to determine whether specific ones of the detected requests were initiated automatically by at least one computerized process as opposed to manually by a human user;
responsive to a rule of the plurality applying to a specific detected request, adjusting a rating concerning the specific detected request, by a computer, the rating indicating a likelihood as to whether the specific detected request was initiated automatically;
categorizing, by a computer, some detected requests to access URLs as being initiated automatically, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically;
categorizing, by a computer, some detected requests to access URLs as being initiated manually by a human user, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically; and
at client side, logging, by a computer, only human user activity of interest comprising requests categorized as being manually initiated by the human user, while avoiding logging of information that is superfluous to monitoring of the human user.
5 Assignments
0 Petitions
Accused Products
Abstract
Outbound network traffic originating from a client computer is monitored, and requests to access URLs in the outbound network traffic are detected. Detected requests to access URLs are compared to each of a plurality of rules, in order to determine whether specific ones of the detected requests were initiated automatically by a process or manually by a human user. Where a rule of the plurality applies to a detected request, a rating concerning the request is adjusted. The rating indicates a likelihood as to whether the request was initiated automatically or manually. Depending upon whether the rating concerning the request reaches a threshold, the request is categorized as being either automatically initiated by a process, or manually initiated by a human user. Only those requests categorized as being manually initiated by a human user are logged.
22 Citations
18 Claims
-
1. A computer implemented method for identifying requests to access URLs that are made automatically by processes, the method comprising the steps of:
-
monitoring, by a computer, outbound network traffic originating from a client computer; detecting requests to access URLs in the outbound network traffic, by a computer; comparing a plurality of rules to detected requests to access URLs, by a computer, in order to determine whether specific ones of the detected requests were initiated automatically by at least one computerized process as opposed to manually by a human user; responsive to a rule of the plurality applying to a specific detected request, adjusting a rating concerning the specific detected request, by a computer, the rating indicating a likelihood as to whether the specific detected request was initiated automatically; categorizing, by a computer, some detected requests to access URLs as being initiated automatically, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically; categorizing, by a computer, some detected requests to access URLs as being initiated manually by a human user, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically; and at client side, logging, by a computer, only human user activity of interest comprising requests categorized as being manually initiated by the human user, while avoiding logging of information that is superfluous to monitoring of the human user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. At least one computer readable storage medium storing a computer program product for identifying requests to access URLs that are made automatically by processes, the computer program product comprising:
-
program code for monitoring outbound network traffic originating from a client computer; program code for detecting requests to access URLs in the outbound network traffic; program code for comparing a plurality of rules to detected requests to access URLs, in order to determine whether specific ones of the detected requests were initiated automatically by at least one computerized process as opposed to manually by a human user; program code for, responsive to a rule of the plurality applying to a specific detected request, adjusting a rating concerning the specific detected request the rating indicating a likelihood as to whether the specific detected request was initiated automatically; program code for categorizing some detected requests to access URLs as being initiated automatically, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically; program code for categorizing some detected requests to access URLs as being initiated manually by a human user, responsive to an associated rating indicating a likelihood as to whether the request was initiated automatically; and program code for, at client side, logging only human user activity of interest comprising requests categorized as being manually initiated by the human user, while avoiding logging of information that is superfluous to monitoring of the human user. - View Dependent Claims (15, 16, 17, 18)
-
Specification