Source request monitoring

A method includes establishing an IP address whitelist including an acceptable IP address, establishing a resource whitelist including an acceptable resource request, establishing a resource blacklist including an indicator of a malicious resource request, and analyzing a resource request. Analyzing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KUHN DAVID, HELD TIM, BUTTS BRADLEY, SHERIDAN WILLIAM ALEXANDER, ANGEL MARK
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A method includes establishing an IP address whitelist including an acceptable IP address, establishing a resource whitelist including an acceptable resource request, establishing a resource blacklist including an indicator of a malicious resource request, and analyzing a resource request. Analyzing the resource request includes determining if a requestor IP address of the resource request is in the IP address whitelist, determining if the requested resource is in the resource whitelist, and determining if the requested resource is in the resource blacklist. A whitelist violation review is initiated, responsive to determining the requestor IP address is not in the IP address whitelist and the requested resource is not in the resource whitelist. A blacklist violation review is initiated, responsive to determining the requested resource is in the resource blacklist and the requestor IP address is not in the IP address whitelist and the requested resource is not in the resource whitelist.