Methods and systems for providing a token-based application firewall correlation
First Claim
1. A method comprising:
- receiving a request for access to a resource within a secure computing environment from a remote user device, the request received by an application-level firewall;
associating a token with the request, by the application-level firewall, wherein the token is added to a session context and the token is injected into multiple events that originate from the request to service the request within the secure computing environment during the session to allow the application-level firewall to correlate the request with a corresponding session;
storing, by the application-level firewall, the token and associated information in an event correlator within the secure computing environment that is communicatively coupled with the application-level firewall;
associating, by the application-level firewall, the token with one or more subsequent actions within the secure computing environment during the session by the resource to service the request, wherein the one or more subsequent actions comprises at least generating a database query based on the request, the database query including the token and the token is included in a logic of the database query;
creating, by the application-level firewall, at least one statistical model to identify abnormalities and react based on security policies;
generating a response to the request, the response including the token; and
transmitting the response with the token to the remote user device via the application-level firewall, wherein the application-level firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information.
1 Assignment
0 Petitions
Accused Products
Abstract
Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A token is associated with the request. The token and associated information are stored in an event correlator coupled with the application firewall. The token is associated with one or more subsequent actions by the resource in response to receiving the request. A response to the request including the token is generated. The response with the token is transmitted to the remote user device via the application firewall. The application firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information.
131 Citations
19 Claims
-
1. A method comprising:
-
receiving a request for access to a resource within a secure computing environment from a remote user device, the request received by an application-level firewall; associating a token with the request, by the application-level firewall, wherein the token is added to a session context and the token is injected into multiple events that originate from the request to service the request within the secure computing environment during the session to allow the application-level firewall to correlate the request with a corresponding session; storing, by the application-level firewall, the token and associated information in an event correlator within the secure computing environment that is communicatively coupled with the application-level firewall; associating, by the application-level firewall, the token with one or more subsequent actions within the secure computing environment during the session by the resource to service the request, wherein the one or more subsequent actions comprises at least generating a database query based on the request, the database query including the token and the token is included in a logic of the database query; creating, by the application-level firewall, at least one statistical model to identify abnormalities and react based on security policies; generating a response to the request, the response including the token; and transmitting the response with the token to the remote user device via the application-level firewall, wherein the application-level firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An article comprising a non-transitory computer-readable storage medium having stored thereon instructions that are configurable to, when executed by one or more processors, cause the one or more processors to:
-
receive a request for access to a resource within a secure computing environment from a remote user device, the request received by an application-level firewall; associate a token with the request, by the application-level firewall, wherein the token is added to a session context and the token is injected into multiple events that originate from the request to service the request within the secure computing environment during the session to allow the application-level firewall to correlate the request with a corresponding session; store the token and associated information in an event correlator within the secure computing environment that is communicatively coupled with the application-level firewall; associate the token with one or more subsequent actions within the secure computing environment during the session by the resource to service the request, wherein the one or more subsequent actions comprises at least generating a database query based on the request, the database query including the token and the token is included in a logic of the database query; create at least one statistical model to identify abnormalities and react based on security policies; generate a response to the request, the response including the token; and transmit a response including the token to the remote user device via the application-level firewall, wherein the application-level firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a plurality of hardware server computing platforms coupled over a network to communicate with multiple user computing systems to provide a multitenant environment comprising at least an application-level firewall and an application running on at least one of the hardware server computing platforms, both coupled to receive traffic from the multiple user computing systems, the application-level firewall and the application configurable to; receive a request for access to a resource within a secure computing environment from a remote user device, the request received by an application-level firewall; associate a token with the request, by the application-level firewall, wherein the token is added to a session context and the token is injected into multiple events that originate from the request to service the request within the secure computing environment during the session to allow the application-level firewall to correlate the request with a corresponding session; store the token and associated information in an event correlator within the secure computing environment that is communicatively coupled with the application-level firewall; associate the token with one or more subsequent actions within the secure computing environment during the session by the resource to service the request, wherein the one or more subsequent actions comprises at least generating a database query based on the request, the database query including the token and the token is included in a logic of the database query; create at least one statistical model to identify abnormalities and react based on security policies; generate a response to the request, the response including the token; and transmit a response including the token to the remote user device via the application-level firewall, wherein the application-level firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information. - View Dependent Claims (16, 17, 18, 19)
-
Specification