Systems and methods for enforcing policies in the discovery of anonymizing proxy communications
First Claim
Patent Images
1. A computer program product for enforcing policies with respect to anonymizer proxy communications, the computer program product comprising computer-executable code embodied in a non-transitory computer readable medium that, when executing on one or more computers, performs the steps of:
- analyzing, at a web gateway for an enterprise network, website HTML content that is retrieved based on a website request from a computing facility within the enterprise network by looking for patterns within the website HTML content that are similar to patterns found in a known non-proxy website'"'"'s HTML content through inspecting website page structure and the website HTML content delivered;
in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website;
in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as associated with an anonymizer proxy used to indirectly access network content outside the enterprise network while obscuring a sender or receiver of information, wherein categorizing at least a portion of the requested website'"'"'s identifier as a suspect proxy website identifier involves determining a longest common portion of URLs requested of the requested website and categorizing the longest common portion as indicative of a proxy website; and
blocking access by the computing facility to content at the requested website'"'"'s identifier according to the policy for anonymizer proxy communications.
9 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for systems and methods that enforce policies with respect to proxy communications.
-
Citations
18 Claims
-
1. A computer program product for enforcing policies with respect to anonymizer proxy communications, the computer program product comprising computer-executable code embodied in a non-transitory computer readable medium that, when executing on one or more computers, performs the steps of:
-
analyzing, at a web gateway for an enterprise network, website HTML content that is retrieved based on a website request from a computing facility within the enterprise network by looking for patterns within the website HTML content that are similar to patterns found in a known non-proxy website'"'"'s HTML content through inspecting website page structure and the website HTML content delivered; in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as associated with an anonymizer proxy used to indirectly access network content outside the enterprise network while obscuring a sender or receiver of information, wherein categorizing at least a portion of the requested website'"'"'s identifier as a suspect proxy website identifier involves determining a longest common portion of URLs requested of the requested website and categorizing the longest common portion as indicative of a proxy website; and blocking access by the computing facility to content at the requested website'"'"'s identifier according to the policy for anonymizer proxy communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for enforcing policies with respect to anonymizer proxy communications, the method comprising:
-
analyzing, at a web gateway for an enterprise network, website HTML content that is retrieved based on a website request from a computing facility within the enterprise network by looking for patterns within the website HTML content that are similar to patterns found in a known non-proxy website'"'"'s HTML content through inspecting website page structure and the website HTML content delivered; in response to finding a similar pattern between the requested website and the known non-proxy website, comparing the requested website'"'"'s identifier with an identifier of the known non-proxy website; in response to finding a mismatch between the two website identifiers, categorizing at least a portion of the requested website'"'"'s identifier as associated with an anonymizer proxy used to indirectly access network content outside the enterprise network while obscuring a sender or receiver of information, wherein categorizing at least a portion of the requested website'"'"'s identifier as a suspect website identifier involves determining a longest common portion of URLs requested of the requested website and categorizing the longest common portion as indicative of a proxy website; and blocking access by the computing facility to content at the requested website'"'"'s identifier according to the policy for anonymizer proxy communications. - View Dependent Claims (18)
-
Specification