Website access request parameter legal range analysis method and device

A technology of request parameters and access requests, applied in the field of network security, can solve the problems of unrecognizable, inflexible, and not fully utilizing the rich information of log files, etc., and achieve the effect of accurate identification and interception

Active Publication Date: 2013-05-22
重庆云流未来科技有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the prior art, either identifying illegal requests based on log files or intercepting illegal requests based on a predetermined matching strategy is a method similar to blacklist filtering, which has the following disadvantages: it can only identify or inter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website access request parameter legal range analysis method and device
  • Website access request parameter legal range analysis method and device
  • Website access request parameter legal range analysis method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] To facilitate a better understanding of the present invention, a brief introduction to the access log files of the website is firstly given here.

[0038] IIS is the abbreviation of Internet Information Server, which means Internet Information Service. The WEB log of IIS is the operation record of the website under IIS. Every time a visitor sends an http request to the website, no matter whether the visit is successful or not, the log file will record it.

[0039] The logs include information such as who visited the site, what the visitor viewed, and when the information was last viewed. Since IIS faithfully records all related records of accessing Web services, making full use of the logs can perform intrusion detection, traffic statistics analysis, solve IIS server failures, and solve page failures.

[0040] The default storage location of the WEB log files of IIS6.0 is %systemroot%\system32\LogFiles, and there is one log per day by default. If the log file is not p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a website access request parameter legal range analysis method and device and belongs to the technical field of network safety. The website access request parameter legal range analysis method includes that an http access journal file of a website is obtained; journal records corresponding to legal http requests are screened from the journal file to obtain a legal journal record set; and the legal range of access request parameters is extracted according to the legal journal record set. The website access request parameter legal range analysis method and device can accurately and conveniently obtain the legal range of the request parameters and are favorable for accurately distinguishing and intercepting illegal requests according to the obtained legal range.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for analyzing the legal range of website access request parameters. Background technique [0002] At present, the security problem of the website is becoming more and more serious. The website administrator can take many measures to prevent the server from being attacked and invaded. Among them, checking the log records of the webpage (Web) server in time is the most direct, most commonly used, and a relatively effective method. By monitoring the log files of the web server, you can look for signs of suspicious activities, obtain hacker intrusion methods and related operations, as well as the loopholes of the system, so as to prevent them. [0003] However, it is not very simple and clear to find out the clues of attacking the web server in the log file, because there are many entries in the log file, which requires the administrator to have rich knowledge and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈逸
Owner 重庆云流未来科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products