Method and device for intercepting web attacks, and customer premise equipment

A technology of web pages and command line programs, which is applied in the field of network security and can solve problems such as the inability to block web pages and Trojan horses

Active Publication Date: 2013-02-06
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the blocking technology of the above-mentioned black and white lists cannot completely block the webpage Trojans.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for intercepting web attacks, and customer premise equipment
  • Method and device for intercepting web attacks, and customer premise equipment
  • Method and device for intercepting web attacks, and customer premise equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0086] Embodiments of the invention may be applied to computer systems / servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and / or configurations suitable for use with computer systems / servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for intercepting web attacks, and customer premise equipment, solving the problem that the web attacks come round intercept of black and white lists through an action command running program, and finally a rogue program is successfully carried out, wherein the method comprises the following steps: obtaining a program of a browser execution process; detecting whether the program of the browser execution process is the command running program; when the program of the browser execution process is the command running program, obtaining a command running parameter of the command running program; analyzing the command running parameter of the command running program, detecting whether a malicious command running parameter exists in the command running program; and when the malicious command running parameter exists in the command running program, preventing execution of the process. According to the method and the device, the security of browsing a webpage is improved, and a hostile attack of the webpage can be more effectively intercepted.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and client equipment for intercepting web page attacks. Background technique [0002] Web page Trojan horse attack is one of the most popular vulnerability attack methods at present. The process of web page Trojan horse attack is generally: the attacker manipulates the browser's heap memory through javascript, writes malicious code shellcode into the browser's heap memory address, and overflows the browser through buffer overflow. The vulnerability changes the execution flow of the program, allowing the shellcode in the browser heap memory to be executed. [0003] At present, various security software's interception technologies for web page Trojans are generally divided into the following three categories: [0004] 1. Intercept the malicious script code content of the web page Trojan horse. [0005] 2. Intercept the API functions called by the overflo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 宋申雷刘起肖鹏
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products