METHODS FOR PROACTIVELY SECURING A WEB APPLICATION AND APPARATUSES THEREOF
First Claim
Patent Images
1. A method for proactively securing a web application, the method comprising:
- injecting with a proactive administrative proxy server one or more decoys into an executing web application;
identifying with the proactive administrative proxy server an attempt to exploit one of the one more injected decoys in the executing application; and
performing with the proactive administrative proxy server at least one action to secure the executing application from the attempted exploitation.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, non-transitory computer readable medium, and apparatus that proactively secures a web application includes injecting one or more decoys into an executing web application. An attempt to exploit one of the one more injected decoys in the executing application is identified. At least one action to secure the executing application from the attempted exploitation is performed.
162 Citations
21 Claims
-
1. A method for proactively securing a web application, the method comprising:
-
injecting with a proactive administrative proxy server one or more decoys into an executing web application; identifying with the proactive administrative proxy server an attempt to exploit one of the one more injected decoys in the executing application; and performing with the proactive administrative proxy server at least one action to secure the executing application from the attempted exploitation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable medium having stored thereon instructions for proactively securing a web application comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
injecting one or more decoys into an executing web application; identifying an attempt to exploit one of the one more injected decoys in the executing application; and performing at least one action to secure the executing application from the attempted exploitation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A proactively secured computing apparatus comprising:
-
one or more processors; a memory coupled to the one or more processors which are configured to execute programmed instructions stored in the memory comprising; injecting one or more decoys into an executing web application; identifying an attempt to exploit one of the one more injected decoys in the executing application; and performing at least one action to secure the executing application from the attempted exploitation. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification