Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat detection in a data processing system

A database and statistical information technology, applied in the field of threat detection, can solve problems such as application layer attacks

Inactive Publication Date: 2012-05-30
IBM CORP
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as mentioned above, application layer attacks are often unintentional
Frequently, application layer attacks are caused by web crawlers (also known as robots or simply bots), business partners, or users that engage in unusual but non-malicious behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat detection in a data processing system
  • Threat detection in a data processing system
  • Threat detection in a data processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Although an illustrative implementation of one or more embodiments is provided below, the disclosed systems and / or methods can be implemented using any of a variety of techniques. The invention is in no way limited to the illustrative implementations, drawings and techniques presented below, including the exemplary designs and implementations shown and described herein, but may be modified within the full scope of the appended claims and their equivalents.

[0015] Those skilled in the art will understand that the present invention can be implemented as a system, method or computer program product. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects, all of which are generally referred to herein as " circuit", "module" or "system". Furthermore, the present invention may take the form of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An illustrative embodiment provides a method for resolving a detected threat. The method receives a request from a requester to form a received request, extracts statistics associated with the received request to form extracted statistics, performs rules validation for the received request using the extracted statistics, and determines whether the request is a threat. Responsive to a determination that the request is a threat, escalate the requester using escalation increments, wherein the using escalation increments further comprises increasing user identity and validation requirements through one of percolate to a next user level or direct entry to a user level.

Description

technical field [0001] The present invention generally relates to threat detection in data processing systems. Background technique [0002] Web applications can be subject to misuse and attacks, intentional or unintentional. Application-layer attacks such as denial of service (DoS), brute force, or exploiting unbounded conditions affect enterprises by limiting the availability and integrity of applications. Identifying problems and deploying solutions can be time-consuming. While the problem exists, the application continues to be unavailable, often resulting in lost revenue. Instead, restricting access to the application is ineffective, as attacking agents can easily change locations, and any barrier placed at the network layer can have a dramatic impact on the application's effective user community. [0003] Typical solutions target the network layer when suspicious activity occurs. However, as mentioned above, application layer attacks are often unintentional. Frequ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCG06F2221/2133G06F2221/2101H04L63/105G06F21/316H04L63/1425H04L63/168
Inventor A·H·沃尔德曼J·考迪斯
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products