Method, device and system for defending against Web attacks

A web application and statistical result technology, applied in the field of network security, can solve difficult problems such as web attacks and defenses, achieve the effect of defending against new types of attacks, defending against web attacks, and simplifying the development process

Active Publication Date: 2014-01-01
BEIJING FEINNO COMM TECH
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, device, and system for defending against Web attacks, so as to solve the problem that it is difficult to do special defense against Web attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for defending against Web attacks
  • Method, device and system for defending against Web attacks
  • Method, device and system for defending against Web attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0036] see figure 1 , a device for defending against web attacks, a device for defending against web attacks, the device includes a web probe embedded in the device.

[0037] The web probes include:

[0038] The parameter extraction module 110 is used to extract the parameters in the Web application request according to the rules in the rule base;

[0039] The request processing module 120 is configured to match the parameters with the conditions of the rules in the rule base, and when the matching is successful, process the web application request according to the operation of the matched rules.

[0040] In a preferred embodiment, the request processing module is further configured to process the web application request according to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and system for defending against Web attacks. The device comprises Web probes embedded in the device. Each probe comprises a parameter extraction module and a request processing module, wherein the parameter extraction module is used for extracting parameters in Web application requests according to rules in a rule base, and the request processing module is used for enabling the parameters to be matched with conditions in the rule base. When matching succeeds, the Web application requests are processed according to the matching rules. The method, device and system for defending against the Web attacks can carry out special defense against the Web attacks.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method, device and system for defending against Web attacks. Background technique [0002] With the rapid development of the Internet and Web applications, the security threats and hazards that Web applications are facing are becoming more and more serious, and various loopholes emerge in an endless stream. Traditional firewalls and IDS (Intrusion Detection System) are becoming more and more powerless in this regard. . [0003] In the prior art, the firewall mainly implements access control between different networks, allowing or denying network requests according to some basic rules such as ports and IPs, and generally there is no complicated judgment logic. IDS is mainly aimed at the network packet level, through statistical analysis, finds suspicious packets and sends an alarm or intercepts them. It is difficult for firewalls and IDS to do special defense against Web attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 周圣吴昊范世杰
Owner BEIJING FEINNO COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products