Security defense system based on network acceleration equipment

A network acceleration and security defense technology, applied in transmission systems, electrical components, etc., can solve problems such as poor adaptability, false alarms, and high false alarm rate of abnormal detection, and achieve the effect of speeding up detection

Active Publication Date: 2011-12-21
CHINANETCENT TECH
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Anomaly detection can only identify those behaviors that deviate greatly from the normal process. Due to the poor adaptability to various network environments and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense system based on network acceleration equipment
  • Security defense system based on network acceleration equipment
  • Security defense system based on network acceleration equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below with reference to the drawings and embodiments.

[0029] Such as figure 1 As shown, the CDN server group 3 is installed between the user 1 and the customer origin server 2, and the security defense system 4 is installed between the CDN server group 3 and the customer origin server 2. Install a security defense system on CDN acceleration equipment (such as a cache machine), so that the security defense system 4 and the cache system are combined. The network acceleration device includes a cache cache server or an upper-level load balancing server on the cache. The web attacks targeted by the security defense system 4 include cross-site scripting and SQL injection.

[0030] figure 2 The overall architecture of the embodiment of the security defense system based on the network acceleration device of the present invention is shown. See figure 2 The security defense system of this embodiment includes a system rule library m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security defense system based on network accelerating equipment. The system aims to effectively protect various web sites purchasing network accelerating service. The technical scheme provided by the invention is that: the system comprises a system rule base module, a system decision module, a system intrusion detection module and a system feedback module, wherein the system rule base module initializes rule base files aiming at web attack; the system decision module registers a decision algorithm required by security detection; the system intrusion detection module receives a request from a web application program client, performs content detection and verification on the request according to the decision algorithm in the system decision module so as to guarantee the security of the request, and then transmits a detection result to the system feedback module; and if the request meets the security requirement, the system feedback module allows the request to directly access the next flow after security defense, and if the request cannot meet the security requirement, the system feedback module adopts corresponding defending measures.

Description

Technical field [0001] The invention relates to a computer network web security field, in particular to a system that adds a layer of web security defense to a network acceleration product, so as to achieve the purpose of defending client sources from being attacked. Background technique [0002] Computer networks are rapidly spreading in various fields of economy and life, and the whole society is increasingly dependent on the network. The network has become a powerful driving force for social and economic development, and its status is becoming more and more important. With the development of the network, various problems have also arisen, among which security problems are particularly prominent. Due to the inherent openness of the system network, the security loopholes in the network protocol itself, the imperfections of various software or the artificially set "backdoors", the incorrect settings of the network managers and the illegal operations of the internal personnel, et...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 洪珂陈小芬刘成彦
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products