TWO-TIER DEEP ANALYSIS OF HTML TRAFFIC

    公开(公告)号:CA2712542C

    公开(公告)日:2012-09-11

    申请号:CA2712542

    申请日:2010-08-25

    Applicant: IBM CANADA

    Abstract: An illustrative embodiment of a computer-implemented process for two-tier deep analysis of hypertext transport protocol data, monitors Web traffic, receives a packet of Web traffic from a network to form a received packet, wherein the received packet represents Web traffic, and stores the Web traffic temporarily to form stored Web traffic. The computer-implemented process further determines whether the Web traffic is suspicious using a first tier analysis and responsive to a determination that the Web traffic is suspicious, consumes the stored Web traffic using a deep analysis module. The computer-implemented process further determines whether the stored Web traffic is a case of misuse using a second tier analysis and responsive to a determination that the stored Web traffic is a case of misuse, feeding back data about a malicious connection to an intrusion protection system before returning to monitor the Web traffic.

    A METHOD AND SYSTEM FOR PREVENTING CROSS-SITE REQUEST FORGERY ATTACKS ON A SERVER

    公开(公告)号:CA2694326A1

    公开(公告)日:2010-05-18

    申请号:CA2694326

    申请日:2010-03-10

    Applicant: IBM CANADA

    Abstract: A method and system for preventing Cross-Site Request Forgery (CSRF) security attacks on a server in a client-server environment. The method includes embedding a nonce and a script to all responses from the server to the client wherein when executed the script will add the nonce to each request from the client to the server; sending the response with the nonce and the script to the client; and verifying that each said request from the client includes the nonce sent by the server from the server to the client. The script modifies all objects, including dynamically generated objects, in a server response that may generate future requests to the server to add the nonce to the requests. The server verifies the nonce value in a request and confirms the request with the client if the value is not the same as the value previously sent by the server. Server-side aspects of the invention might be embodied in the server or a proxy between the server and the client.

    Verfahren und Einheit zum Entschärfen von seitenübergreifenden Sicherheitslücken

    公开(公告)号:DE112011101943T5

    公开(公告)日:2013-07-18

    申请号:DE112011101943

    申请日:2011-06-08

    Applicant: IBM

    Abstract: Ein Verfahren, um zu verhindern, dass zerstörerischer Code innerhalb einer Skriptsprache einer Web-Anwendung eingebettet wird, auf die durch einen Web-Browser (308) zugegriffen wird, wobei das Verfahren Folgendes umfasst: Überwachen sämtlichen eingehenden Datenverkehrs (310), der durch den Web-Browser erzeugt wird, und ausgehenden Datenverkehrs (326), der durch einen Server (318) erzeugt wird, um einen überwachten Datenverkehr zu bilden; Ermitteln, ob ein eindeutiges Element, das in einer Konfigurationsdatei definiert ist, mit einem Eingabewert des überwachten Datenverkehrs übereinstimmt, um einen übereinstimmenden Eingabewert zu bilden; in Reaktion auf eine Ermittlung, dass das eindeutige Element mit einem Eingabewert des überwachten Datenverkehrs übereinstimmt, Speichern des übereinstimmenden Eingabewertes, wobei ermittelt wird, ob eine Ausgabe den übereinstimmenden Eingabewert an einer erwarteten Position enthält; in Reaktion auf eine Ermittlung, dass die Ausgabe den übereinstimmenden Eingabewert an einer erwarteten Position enthält, Codieren des übereinstimmenden Eingabewertes mithilfe einer jeweiligen Definition aus der Konfigurationsdatei; und Zurückgeben der Ausgabe (330) an den Anforderer.

    Method and device for mitigating cross-site vulnerabilities

    公开(公告)号:GB2491059A

    公开(公告)日:2012-11-21

    申请号:GB201214630

    申请日:2011-06-08

    Applicant: IBM

    Abstract: A method for preventing malicious code being embedded within a scripting language of a web application accessed by a web browser (308), the method comprising: monitoring all incoming traffic (310), generated by the web browser, and outgoing traffic (326) generated by a server (318) to form monitored traffic; determining whether a unique element, defined in a configuration file, is matched with an input value of the monitored traffic to form a matched input value; responsive to a determination that the unique element is matched with an input value of the monitored traffic, saving the matched input value, determining whether an output contains the matched input value in an expected location; responsive to a determination that the output contains the matched input value in an expected location, encoding the matched input value using a respective definition from the configuration file; and returning the output (330) to the requester.

    TWO-TIER DEEP ANALYSIS OF HTML TRAFFIC

    公开(公告)号:CA2712542A1

    公开(公告)日:2010-11-09

    申请号:CA2712542

    申请日:2010-08-25

    Applicant: IBM CANADA

    Abstract: An illustrative embodiment of a computer-implemented process for two-tier deep analysis of hypertext transport protocol data, monitors Web traffic, receives a packet of Web traffic from a network to form a received packet, wherein the received packet represents Web traffic, and stores the Web traffic temporarily to form stored Web traffic. The computer-implemented process further determines whether the Web traffic is suspicious using a first tier analysis and responsive to a determination that the Web traffic is suspicious, consumes the stored Web traffic using a deep analysis module. The computer-implemented process further determines whether the stored Web traffic is a case of misuse using a second tier analysis and responsive to a determination that the stored Web traffic is a case of misuse, feeding back data about a malicious connection to an intrusion protection system before returning to monitor the Web traffic.

    Method and device for mitigating cross-site vulnerabilities

    公开(公告)号:GB2491059B

    公开(公告)日:2013-01-09

    申请号:GB201214630

    申请日:2011-06-08

    Applicant: IBM

    Abstract: A method for preventing malicious code being embedded within a scripting language of a web application accessed by a web browser (308), the method comprising: monitoring all incoming traffic (310), generated by the web browser, and outgoing traffic (326) generated by a server (318) to form monitored traffic; determining whether a unique element, defined in a configuration file, is matched with an input value of the monitored traffic to form a matched input value; responsive to a determination that the unique element is matched with an input value of the monitored traffic, saving the matched input value, determining whether an output contains the matched input value in an expected location; responsive to a determination that the output contains the matched input value in an expected location, encoding the matched input value using a respective definition from the configuration file; and returning the output (330) to the requester.

    INJECTION ATTACK MITIGATION USING CONTEXT SENSITIVE ENCODING OF INJECTED INPUT

    公开(公告)号:CA2704863A1

    公开(公告)日:2010-08-16

    申请号:CA2704863

    申请日:2010-06-10

    Applicant: IBM CANADA

    Abstract: A method for preventing malicious code being embedded within a scripting language of a web application accessed by a web browser (308), the method comprising: monitoring all incoming traffic (310), generated by the web browser, and outgoing traffic (326) generated by a server (318) to form monitored traffic; determining whether a unique element, defined in a configuration file, is matched with an input value of the monitored traffic to form a matched input value; responsive to a determination that the unique element is matched with an input value of the monitored traffic, saving the matched input value, determining whether an output contains the matched input value in an expected location; responsive to a determination that the output contains the matched input value in an expected location, encoding the matched input value using a respective definition from the configuration file; and returning the output (330) to the requester.

Patent Agency Ranking