Privacy protection for proxy auto-configuration files

    公开(公告)号:US11005926B2

    公开(公告)日:2021-05-11

    申请号:US16522244

    申请日:2019-07-25

    Abstract: A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

    Combining internet routing information with access logs to assess risk of user exposure

    公开(公告)号:US10721270B2

    公开(公告)日:2020-07-21

    申请号:US16401860

    申请日:2019-05-02

    Abstract: The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet protocol addresses associated with the attack on the service. The device assigns a severity score to the attack based on a type of the attack. The device identifies a probability of a user account accessing the service during an attack window based on the type of attack. The device generates an impact score for the user account based on the severity score and the probability of the user account accessing the service during the attack window. The device selects a mitigation policy for the user account based on the impact score.

    SYSTEMS AND METHODS FOR IMPROVING SECURITY OF SECURE SOCKET LAYER (SSL) COMMUNICATIONS

    公开(公告)号:US20190182288A1

    公开(公告)日:2019-06-13

    申请号:US16266931

    申请日:2019-02-04

    Abstract: The disclosure is directed to a system for improving security of SSL communications. The system can include an device intermediary between one or more servers, one or more clients, a plurality of agents, and a web service. The servers can be configured to receive SSL connections and issue SSL certificates. The device can include a virtual server associated with a respective one of the servers, such that the SSL certificate of the respective server is transmitted through the device. The device can generate service fingerprints for the one or more servers. Each service fingerprint can include information corresponding to an SSL certificate of the virtual server, one or more DNS aliases for a virtual IP address of the respective virtual server, one or more port numbers serving the SSL certificate, and an IP address serviced by the device. The device also can transmit the service fingerprints to a web service.

    Systems and methods for improving security of secure socket layer (SSL) communications

    公开(公告)号:US10218734B2

    公开(公告)日:2019-02-26

    申请号:US15148374

    申请日:2016-05-06

    Abstract: The disclosure is directed to a system for improving security of SSL communications. The system can include an device intermediary between one or more servers, one or more clients, a plurality of agents, and a web service. The servers can be configured to receive SSL connections and issue SSL certificates. The device can include a virtual server associated with a respective one of the servers, such that the SSL certificate of the respective server is transmitted through the device. The device can generate service fingerprints for the one or more servers. Each service fingerprint can include information corresponding to an SSL certificate of the virtual server, one or more DNS aliases for a virtual IP address of the respective virtual server, one or more port numbers serving the SSL certificate, and an IP address serviced by the device. The device also can transmit the service fingerprints to a web service.

    CONSTRAINING RESOURCE ALLOCATION RATE FOR STATEFUL MULTI-TENANT HTTP PROXIES AND DENIAL-OF-SERVICE ATTACK PREVENTION

    公开(公告)号:US20210377294A1

    公开(公告)日:2021-12-02

    申请号:US17063230

    申请日:2020-10-05

    Abstract: Implementations of the systems and methods discussed herein provide for distributed HTTP proxy services with synchronization of per-server or per-tenant resource allocation counters amongst the proxy devices, allowing devices to quickly identify denial of service attacks or other malicious or erroneous behavior. In some implementations, a database server may receive resource consumption notifications from each of a plurality of proxy devices and may aggregate the notifications or increment a counter on a per-server or per-tenant basis, and provide updated counter values to proxy devices via callbacks. Each proxy device may check the counter value before utilizing resources, and may disable or block proxy processing responsive to the counter exceeding a threshold.

    Systems and methods for improving security of secure socket layer (SSL) communications

    公开(公告)号:US10819734B2

    公开(公告)日:2020-10-27

    申请号:US16266931

    申请日:2019-02-04

    Abstract: The disclosure is directed to a system for improving security of SSL communications. The system can include an device intermediary between one or more servers, one or more clients, a plurality of agents, and a web service. The servers can be configured to receive SSL connections and issue SSL certificates. The device can include a virtual server associated with a respective one of the servers, such that the SSL certificate of the respective server is transmitted through the device. The device can generate service fingerprints for the one or more servers. Each service fingerprint can include information corresponding to an SSL certificate of the virtual server, one or more DNS aliases for a virtual IP address of the respective virtual server, one or more port numbers serving the SSL certificate, and an IP address serviced by the device. The device also can transmit the service fingerprints to a web service.

    Systems and methods for performing targeted scanning of a target range of IP addresses to verify security certificates

    公开(公告)号:US10129239B2

    公开(公告)日:2018-11-13

    申请号:US15148425

    申请日:2016-05-06

    Abstract: The present disclosure is directed towards systems and methods for scanning of a target range of IP addresses to verify security certificates associated with the target range of IP addresses. Network traffic may be monitored between a plurality of clients and a plurality of servers over an IP address space. Traffic monitors positioned intermediary to the plurality of client and the plurality of servers can identify a target range of IP addresses in the address space for targeted scanning. The target range of IP address may be grouped into a priority queue and a scan can be performed of the target range of IP addresses to verify a security certificate associated with each IP address in the target range of IP addresses. In some embodiments, a rogue security certificate is detected that is associated with at least one IP address in the target range of IP addresses.

    COMBINING INTERNET ROUTING INFORMATION WITH ACCESS LOGS TO ASSESS RISK OF USER EXPOSURE
    8.
    发明申请
    COMBINING INTERNET ROUTING INFORMATION WITH ACCESS LOGS TO ASSESS RISK OF USER EXPOSURE 审中-公开
    组合互联网路由信息与访问日志,以评估用户暴露的风险

    公开(公告)号:US20160330236A1

    公开(公告)日:2016-11-10

    申请号:US15148400

    申请日:2016-05-06

    CPC classification number: H04L63/1466 H04L63/1416 H04L63/1425 H04L2463/146

    Abstract: The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet protocol addresses associated with the attack on the service. The device assigns a severity score to the attack based on a type of the attack. The device identifies a probability of a user account accessing the service during an attack window based on the type of attack. The device generates an impact score for the user account based on the severity score and the probability of the user account accessing the service during the attack window. The device selects a mitigation policy for the user account based on the impact score.

    Abstract translation: 本公开涉及用于评估或减轻网络攻击的系统和方法。 设备确定与该服务的攻击相关联的一个或多个客户端因特网协议地址。 设备根据攻击的类型为攻击分配严重性分数。 该设备基于攻击类型识别在攻击窗口期间用户帐户访问服务的概率。 该设备基于攻击窗口中的严重性得分和用户帐户访问服务的概率,为用户帐户生成影响分数。 该设备根据影响分数选择用户帐户的缓解策略。

Patent Agency Ranking