Unlock instant, AI-driven research and patent intelligence for your innovation.

An intrusion detection method and device based on browser tag attributes

An intrusion detection and browser technology, applied in the field of information security, can solve the problem that anti-virus service providers cannot effectively detect and contain network attacks

Active Publication Date: 2018-05-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the diversity of attack methods, anti-virus service providers in the prior art cannot effectively detect and contain network attacks represented by XSS and CSRF

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An intrusion detection method and device based on browser tag attributes
  • An intrusion detection method and device based on browser tag attributes
  • An intrusion detection method and device based on browser tag attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] A detailed description will be given below of embodiments of the present invention. Although the present invention will be described and illustrated in conjunction with some specific embodiments, it should be noted that the present invention is not limited to these embodiments. On the contrary, any modification or equivalent replacement made to the present invention shall be included in the scope of the claims of the present invention.

[0087] In addition, in order to better illustrate the present invention, numerous specific details are given in the specific embodiments below. It will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, processes, components and circuits are not described in detail so as to highlight the gist of the present invention.

[0088] figure 1 Shown is an intrusion detection method 100 based on browser tag attributes according to an emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection method and device based on browser label attributes. The intrusion detection method includes: detecting the attribute of a first label according to a first rule to determine whether the first label is a malicious label, and the first label includes at least one of an iframe label, an img label and an embed label; according to the first rule The second rule detects the attribute of the second tag to judge whether the second tag is a malicious tag, and the second tag includes at least one of the SCRIPT tag and the CSS tag; detects the attribute of the third tag according to the third rule to judge whether the second tag is a malicious tag. Whether the third tag is a malicious tag, the third tag includes a div tag; the attribute of the fourth tag is detected according to the fourth rule to determine whether the fourth tag is a malicious tag, and the fourth tag includes a form tag ; and detecting the attributes of the fifth tag according to the fifth rule to determine whether the fifth tag is a malicious tag.

Description

technical field [0001] The invention relates to the field of information security, in particular to an intrusion detection method and device based on browser label attributes. Background technique [0002] With the wide application of Internet technology, more and more information resources are shared through Web services. For example, various applications in the process of enterprise informatization choose the Web platform for erection. In addition, Internet products such as social networks and microblogs have been rapidly applied, making web browsing the most frequently used network service on the Internet. An effective propagation route exploited by malicious code. [0003] Among these malicious attacks, XSS (Cross Site Scripting, cross-site scripting attack) and CSRF (Cross-site Request Forgery, cross-site request forgery) are very harmful. Among them, XSS refers to malicious attackers inserting malicious html codes into web pages. When the user browses the page, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/14
Inventor 张小松刘小垒牛伟纳陈瑞东王东黄金罗荣森向琦唐海洋
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More