Correlating network level and application level traffic

    公开(公告)号:US11038803B2

    公开(公告)日:2021-06-15

    申请号:US16779071

    申请日:2020-01-31

    Abstract: Methods, systems, and devices supporting network and container level traffic analysis and correlation are described. An application server may receive network traffic data from a network-level data capture system and receive container-level application traffic data from a container-level data capture system. The application server may then hash the destination addresses, the time stamp information, and the data amount information from the network traffic data to create a first set of hash values and hash the destination addresses, the time stamp information, and the data amount information from the application traffic data to create a second set of hash values. The application server may then identify matching hash values from the first set of hash values and the second set of hash values and then merge into a data queue the corresponding network traffic with metadata associated with the corresponding application traffic data to create a merged data set.

    Hierarchical rules for displaying user interface pages

    公开(公告)号:US11030210B2

    公开(公告)日:2021-06-08

    申请号:US15861354

    申请日:2018-01-03

    Abstract: A system receives an action override rule and stores it, including display criteria associated with a user interface page, into a hierarchy of rules for displaying multiple user interface pages. The system determines whether the action override rule in the hierarchy of rules matches request criteria associated with a user action, in response to receiving the user action. The system displays the user interface page associated with the display criteria if the action override rule in the hierarchy of rules matches the request criteria associated with the user action. If the action override rule in the hierarchy of rules does not match the request criteria associated with the user action, then the system can identify a hierarchical rule that is a hierarchical match for the request criteria associated with the user action; and display a user interface page associated with the hierarchical rule that is the hierarchical match.

    MONITORING RESOURCE UTILIZATION OF AN ONLINE SYSTEM BASED ON STATISTICS DESCRIBING BROWSER ATTRIBUTES

    公开(公告)号:US20210168147A1

    公开(公告)日:2021-06-03

    申请号:US16698970

    申请日:2019-11-28

    Abstract: An online system monitors resources utilization by users connecting with the online system and detects unauthorized resource utilization. The online system collects samples of browser attributes from browsers interacting with the online system. The online system determines statistics describing the browser attributes based on the collected samples for that user. The online system receives values of browser attributes for a new request received from a user and determines a browser score indicating a likelihood that the new request was sent from a new client device different from the client devices used by the user during the time interval. If the online system determines that the score indicates that the new request was sent by the new client device, the online system takes mitigating actions to control the unauthorized resource utilization, for example, by requesting credentials for authenticating the request.

    In-app behavior-based attack detection

    公开(公告)号:US11025652B2

    公开(公告)日:2021-06-01

    申请号:US16247445

    申请日:2019-01-14

    Abstract: Architectures and techniques for in-app behavior detection. A behavior detection agent within an application running on a hardware computing device captures events within the application. The events are inputs received from one or more sources external to the application. The behavior detection agent generates an event stream from the captured events. The behavior detection agent analyzes the event stream for significant feature frequencies and associations corresponding to one or more attack profiles. The behavior detection agent initiates an attack response in response to finding one or more significant feature frequencies and associations. The attack response comprises at least changing an operational configuration of the application.

Patent Agency Ranking