Abstract: Techniques for preventing attacks of web servers are provided. In one embodiment, a secure web application firewall (“WAF”) service server is provided to protect one or more web servers from malicious activity. The secure WAF service server is located at a location that is remote from the one or more web servers. Incoming traffic to the web servers and outbound traffic from the web servers is directed through the secure WAF service server. A secure WAF associated with the secure WAF service server analyzes the incoming and outbound traffic and can perform various responsive actions if malicious activity is detected.
Abstract: A system and method for protection of Web based applications are described. Anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. Excessive access rates are one type of anomalous traffic that is detected by monitoring a source and determining whether the number of requests that the source generates within a specific time frame is above a threshold. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat. Various responsive actions may be taken in response to detection of an excessive access rate.
Abstract: A method of data transmission including receiving a request for data over an Internet, by a data provider; obtaining data, in response to the request, at the data provider; applying a quality assurance procedure to the obtained data, responsive to the request, at the provider and other than any virus scanning of said data; and transmitting the data over the Internet responsive to the assurance. Preferably, the quality assurance procedure includes assuring that the data is pre-approved for transmission. Preferably, the procedure includes verifying a digital signature of the data.
Type:
Grant
Filed:
March 22, 2004
Date of Patent:
June 23, 2009
Assignee:
Breach Security, Inc.
Inventors:
Shaul Levi, Rafael Feitelberg, Assaf Topaz