Restricting network spidering
Abstract:
Disclosed are various embodiments for a request monitoring application. Content identifiers are generated according to a known sequence or pattern. Requests for invalid content identifiers are logged. Response behavior to subsequent requests is modified when a number of requests from a source having invalid content identifiers meets a threshold.
Public/Granted literature
Information query
Patent Agency Ranking
0/0