Performing security assessments based on user credentials

    公开(公告)号:US11019089B1

    公开(公告)日:2021-05-25

    申请号:US15906969

    申请日:2018-02-27

    Abstract: A security assessment service for implementing security assessments based on security credentials utilized to access network-based services. The system implements security assessments associated with various actions attributed to different types of techniques that can be utilized for compromised security information. The processing result of the security assessment can be utilized to determine the result of the techniques associated with the security assessment, the performance of security monitoring services, and an anticipated result on a virtual network.

    Measuring effectiveness of intrusion detection systems using cloned computing resources

    公开(公告)号:US10769045B1

    公开(公告)日:2020-09-08

    申请号:US15716400

    申请日:2017-09-26

    Abstract: A simulated attack service of a computing resource service provider generates a cloned computing resource environment on which a simulated attack is executed. The cloned computing resource environment may be based at least in part on a computing resource environment including a set of computing resources. The simulated attack service may execute the simulated attack by at least directing a simulated attack payload to the cloned computing resource environment based at least in part on a signature included in the simulated attack payload. A measure of the effectiveness of an intrusion detection system may then be generated based at least in part on threat analysis information generated by the intrusion detection system and the simulated attack payloads of the simulated attack.

    Load Balancer Metadata Forwarding On Secure Connections

    公开(公告)号:US20200280519A1

    公开(公告)日:2020-09-03

    申请号:US16875899

    申请日:2020-05-15

    Abstract: Network devices, such as load balancers may be configured to forward client metadata to back-end nodes using defined fields of a security protocol. For example, client metadata may be inserted into an extension field or certificate defined by a security protocol that is used for a secure connection between the load balancer and the back-end node. In some instances, a source IP address based on a received request may be inserted into the extension field or certificate defined by the security protocol before the request is forwarded to the back-end node. The back-end node may extract the client metadata and use the client metadata for any of a number of processes (e.g., billing, tracking, security, logging, etc.).

    Load balancer metadata forwarding on secure connections

    公开(公告)号:US10659366B1

    公开(公告)日:2020-05-19

    申请号:US14932577

    申请日:2015-11-04

    Abstract: Network devices, such as load balancers may be configured to forward client metadata to back-end nodes using defined fields of a security protocol. For example, client metadata may be inserted into an extension field or certificate defined by a security protocol that is used for a secure connection between the load balancer and the back-end node. In some instances, a source IP address based on a received request may be inserted into the extension field or certificate defined by the security protocol before the request is forwarded to the back-end node. The back-end node may extract the client metadata and use the client metadata for any of a number of processes (e.g., billing, tracking, security, logging, etc.).

    END-TO-END CHANGE TRACKING FOR TRIGGERING WEBSITE SECURITY REVIEW

    公开(公告)号:US20190377883A1

    公开(公告)日:2019-12-12

    申请号:US16548733

    申请日:2019-08-22

    Abstract: An end-to-end request path associated with an application frontend is determined. A change to a service in the end-to-end request path is identified. A weight value to associate with the change is determined based at least in part on the characteristics of the change. The weight value is aggregated with weight values associated with other code changes is obtained from aggregating the weight value with the weight values of other code changes to produce a collective weight of the code changes. A security review is determined to be triggered based at least in part on the collective weight reaching a value relative to a threshold.

    Dynamic diagnostic data generation
    96.
    发明授权

    公开(公告)号:US10481993B1

    公开(公告)日:2019-11-19

    申请号:US15296569

    申请日:2016-10-18

    Abstract: A computing function may be executed on a computing node by a computing services provider. Execution of the computing function may generate diagnostic information. A first set of diagnostic information may be analyzed to identify an operational state associated with an elevated risk of an error condition. The identified operational state may be mapped to a property associated additional diagnostic information that may be generated and stored in response to the identification of the operational state. Diagnostic information not associated with the operational state may be discarded.

    Load balancer that avoids short circuits

    公开(公告)号:US10320680B1

    公开(公告)日:2019-06-11

    申请号:US14932580

    申请日:2015-11-04

    Abstract: Network devices, such as load balancers may be configured to route requests to hosts that are responding in a shorter period of time than other hosts. Sometimes hosts respond in shorter periods of time due to errors (they short-circuit). Such behavior may cause a spike in failed requests and increase the impact of a host malfunction. Disclosed is an enhanced load balancing algorithm that reduces request loads to hosts that are responding to request more quickly than expected or historically observed. A load balancer tracks the hosts' performance. Upon detecting response times shorter than expected from a host, the load balancer will reduce the load on the host. The request routing will go back to normal distribution after the host behaving according to its known performance profile.

    Session-based access control determinations

    公开(公告)号:US10291589B1

    公开(公告)日:2019-05-14

    申请号:US14569611

    申请日:2014-12-12

    Abstract: A computer system enforces access control rules based at least in part on a set of parameters for cryptographic protection of communications that has been negotiated with another computer system. A cryptographically protected communications session is established. A request is transmitted over the cryptographically protected communications session. Fulfillment of the request is dependent on a set of parameters for cryptographic protection of communications of the cryptographically protected communications session.

Patent Agency Ranking