Detection of cross-site attacks using runtime analysis

    公开(公告)号:US10581878B2

    公开(公告)日:2020-03-03

    申请号:US15617048

    申请日:2017-06-08

    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.

    Infrastructure rule generation
    2.
    发明授权

    公开(公告)号:US10310962B2

    公开(公告)日:2019-06-04

    申请号:US15500522

    申请日:2014-09-24

    Abstract: In one implementation, a system can comprise a probe monitor engine to monitor a probe passed to a function of a set of instructions, a propagation engine to identify an infrastructure connection based on an attribute of the probe during a runtime session, and a rule engine to generate an infrastructure rule based on the infrastructure connection and the attribute of the probe.

    DETECTION OF CROSS-SITE ATTACKS USING RUNTIME ANALYSIS

    公开(公告)号:US20180359265A1

    公开(公告)日:2018-12-13

    申请号:US15617048

    申请日:2017-06-08

    Abstract: A method for attack detection includes: intercepting, by a runtime security agent, a request for a web resource; determining whether the intercepted request was triggered from an external website; determining whether the intercepted request was triggered from a current session; determining whether the intercepted request is requesting a static file type; and in response to a determination that the intercepted request was triggered from an external website and was not triggered from a current session, or a determination that the intercepted request was triggered from an external website and is not requesting a static file type, providing, by the runtime security agent, an indication of a potential attack.

Patent Agency Ranking