Internet-based proxy service to limit internet visitor connection speed
First Claim
1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:
- receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat;
responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open;
determining whether the requested resource is available in cache;
responsive to a determination that the requested resource is available in cache, transmitting, at a reduced speed to the client device, a response having the requested resource without transmitting the request to the origin server;
responsive to a determination that the requested resource is not available in cache, performing the following;
transmitting the request at a reduced speed to the origin server,receiving a response to the request from the origin server, andtransmitting the response to the client device at the reduced speed; and
wherein the transmitted response includes a set of one or more false links to one or more false pages of one or more of the different domains of the origin servers such that if the visitor follows one of those false links, the corresponding request is received at the proxy server and processed at the reduced speed and will cause another response to be generated that includes another set of one or more false links to one or more false pages of one or more of the different domains that are processed at the reduced speed in an attempt to occupy that visitor and prevent the visitor from performing suspicious activity on any of the plurality of origin servers that resolve to the proxy server and other origin servers that do not resolve to the proxy server.
3 Assignments
0 Petitions
Accused Products
Abstract
A proxy server for limiting Internet connection speed of visitors that pose a threat. The proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to the request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server reduces the speed at which the proxy server processes the request while keeping a connection to the client device open.
-
Citations
12 Claims
-
1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open; determining whether the requested resource is available in cache; responsive to a determination that the requested resource is available in cache, transmitting, at a reduced speed to the client device, a response having the requested resource without transmitting the request to the origin server; responsive to a determination that the requested resource is not available in cache, performing the following; transmitting the request at a reduced speed to the origin server, receiving a response to the request from the origin server, and transmitting the response to the client device at the reduced speed; and wherein the transmitted response includes a set of one or more false links to one or more false pages of one or more of the different domains of the origin servers such that if the visitor follows one of those false links, the corresponding request is received at the proxy server and processed at the reduced speed and will cause another response to be generated that includes another set of one or more false links to one or more false pages of one or more of the different domains that are processed at the reduced speed in an attempt to occupy that visitor and prevent the visitor from performing suspicious activity on any of the plurality of origin servers that resolve to the proxy server and other origin servers that do not resolve to the proxy server. - View Dependent Claims (2, 3, 4)
-
-
5. A proxy server to limit Internet connection speed of visitors that pose a threat, comprising:
-
a memory to store instructions; a processor coupled with the memory to process the stored instructions to; receive, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyze the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, reduce the speed at which the proxy server processes the request while keeping a connection to the client device open; determine whether the requested resource is available in cache; responsive to a determination that the requested resource is available in cache, transmit, at a reduced speed to the client device, a response having the requested resource without transmitting the request to the origin server; responsive to a determination that the requested resource is not available in cache, perform the following; transmit the request at a reduced speed to the origin server, receive a response to the request from the origin server, and transmit the response to the client device at the reduced speed; and wherein the transmitted response includes a set of one or more false links to one or more false pages of one or more of the different domains of the origin servers such that if the visitor follows one of those false links, the corresponding request is received at the proxy server and processed at the reduced speed and will cause another response to be generated that includes another set of one or more false links to one or more false pages of one or more of the different domains that are processed at the reduced speed in an attempt to occupy that visitor and prevent the visitor from performing suspicious activity on any of the plurality of origin servers that resolve to the proxy server and other origin servers that do not resolve to the proxy server. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor of a proxy server, cause said processor to perform operations comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open; determining whether the requested resource is available in cache; responsive to a determination that the requested resource is available in cache, transmitting, at a reduced speed to the client device, a response having the requested resource without transmitting the request to the origin server; responsive to a determination that the requested resource is not available in cache, performing the following; transmitting the request at a reduced speed to the origin server, receiving a response to the request from the origin server, and transmitting the response to the client device at the reduced speed; and wherein the transmitted response includes a set of one or more false links to one or more false pages of one or more of the different domains of the origin servers such that if the visitor follows one of those false links, the corresponding request is received at the proxy server and processed at the reduced speed and will cause another response to be generated that includes another set of one or more false links to one or more false pages of one or more of the different domains that are processed at the reduced speed in an attempt to occupy that visitor and prevent the visitor from performing suspicious activity on any of the plurality of origin servers that resolve to the proxy server and other origin servers that do not resolve to the proxy server. - View Dependent Claims (10, 11, 12)
-
Specification