Defense for malicious requests – Identifying attacks