Web vulnerability protection method and apparatus

A vulnerability and device technology, applied in the field of network security, can solve the problems that cannot be transformed into a WEB security scanner, lack of comprehensive analysis and conversion of WEB vulnerabilities, etc., to achieve the effect of improving timeliness and accuracy, and enhancing WEB security

Inactive Publication Date: 2014-09-24
BEIJING KNOWNSEC INFORMATION TECH
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the existing WEB vulnerability protection methods lack the comprehensive analysis and transformation of WEB vulnerabilities. They only analyze and study a single WEB vulnerability, and cannot convert the results of WEB security research and analysis into the rules of WEB security scanners and WEB security firewalls.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web vulnerability protection method and apparatus
  • Web vulnerability protection method and apparatus
  • Web vulnerability protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Reference will now be made in detail to specific embodiments of the present invention, examples of which are illustrated in the accompanying drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like reference numerals refer to like elements throughout.

[0038] It will be understood that, although the terms "first", "second", etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.

[0039] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the" are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a web vulnerability protection method and apparatus. The web vulnerability protection method includes collecting web vulnerabilities; reproducing the web vulnerabilities; analyzing the web vulnerabilities; utilizing the web vulnerabilities according to the reproduction and analysis results of the web vulnerabilities; protecting the web vulnerabilities according to the reproduction, analysis and utilization results of the web vulnerabilities.

Description

technical field [0001] The present invention generally relates to network security, in particular to a method and equipment for protecting against WEB loopholes. Background technique [0002] With the development of network and computer technology, the number of people using the network is increasing, and the network security environment is deteriorating day by day. The increasing sophistication of network and software technologies has provided fertile ground for all kinds of cyber attacks and hacking. The endless attacks and loopholes on the network make network users extremely annoying, especially WEB developers who have frequent contact with the network, administrators of various websites, etc. suffer greatly. [0003] Among all kinds of network hazards, WEB vulnerabilities are very harmful. Specifically, WEB vulnerabilities refer to potential security risks in WEB applications, WEB frameworks, WEB languages, and WEB servers. Common WEB vulnerabilities include SQL inje...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
Inventor 练晓谦
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products