Flagging security threats in web service requests
First Claim
1. A computer-implemented method for flagging security threats in web service requests, the method comprising:
- receiving, by at least one processor, a request addressed to an addressee;
analyzing, by the at least one processor, the request based on at least one security signature;
based on the analysis, determining, by the at least one processor, a threat level associated with the request;
determining, by the at least one processor, a flag and a location associated with the threat level;
inserting, by the at least one processor, the flag into a network packet associated with the request to create a modified request, the inserting into the network packet being at a position in the network packet indicated by the location; and
sending, by the at least one processor, the modified request to the addressee, wherein an application associated with the addressee is operable to process the request based on the threat level.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods and systems for flagging security threats in web service requests. Specifically, a method for flagging security threats in web service requests can include receiving a request addressed to an addressee. The method can further include analyzing the request based on at least one security signature. The method can continue with determining a threat level associated with the request. The determination can be carried out based on the analysis. The method can further include creating a flag corresponding to the threat level. The method can further include inserting the flag into a network packet associated with the request, thereby creating a modified request. The method may further include sending the modified packet to the addressee. An application associated with the addressee can be operable to selectively process the request based on the threat level.
-
Citations
20 Claims
-
1. A computer-implemented method for flagging security threats in web service requests, the method comprising:
-
receiving, by at least one processor, a request addressed to an addressee; analyzing, by the at least one processor, the request based on at least one security signature; based on the analysis, determining, by the at least one processor, a threat level associated with the request; determining, by the at least one processor, a flag and a location associated with the threat level; inserting, by the at least one processor, the flag into a network packet associated with the request to create a modified request, the inserting into the network packet being at a position in the network packet indicated by the location; and sending, by the at least one processor, the modified request to the addressee, wherein an application associated with the addressee is operable to process the request based on the threat level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for flagging security threats in web service requests, the system comprising:
-
at least one hardware processor operable to; receive a request addressed to an addressee; analyze the request based on at least one security signature; based on the analysis, determine a threat level associated with the request; determine a flag and a location associated with the threat level; insert the flag into a network packet associated with the request to create a modified request, the inserting into the network packet being at a position in the network packet indicated by the location; and send the modified request to the addressee, wherein an application associated with the addressee is operable to process the request based on the threat level; and a database in communication with the at least one hardware processor, the database comprising computer-readable instructions for execution by the at least one hardware processor. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising instructions, which when executed by one or more processors, perform the following operations:
-
receive a request addressed to an addressee; analyze the request based on at least one security signature; based on the analysis, determine a threat level associated with the request; determine a flag and a location associated with the threat level; insert the flag into a network packet associated with the request to create a modified request, the inserting into the network packet being at a position in the network packet indicated by the location; and send the modified request to the addressee, wherein an application associated with the addressee is operable to process the request based on the threat level.
-
Specification