Web attack protection method

A whitelist and sub-process technology, applied in the field of web application security, can solve the problems of difficulty in rapid protection, difficulty in preventing unknown attacks, and WAF's inability to quickly defend against unknown attacks.

Active Publication Date: 2015-02-18
CHINANETCENT TECH
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the blacklist technology is used alone, since the attack signature is based on known vulnerabilities, it is difficult to protect against unknown attacks, and if the whitelist technology is used alone, it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web attack protection method
  • Web attack protection method
  • Web attack protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The detailed features and advantages of the present invention are described in detail below in the specific embodiments, the content of which is sufficient to enable any person skilled in the art to understand the technical content of the present invention and implement it accordingly, and according to the specification, claims and drawings disclosed in this specification , those skilled in the art can easily understand the related objects and advantages of the present invention.

[0030] Embodiments of the present invention describe a method of protecting against web attacks that uses blacklist protection and whitelist protection in combination. Blacklist protection mainly extracts the attack signature library by collecting known vulnerabilities, so it can protect against known attacks. Whitelist protection is mainly aimed at the traffic of the website. After a period of study, a set of normal behavior baselines can be established to protect against unknown attacks. I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Web attack protection method, which comprises the following steps that for each access request, at least one of the following protection combinations is provided: A, a blacklist protection sub flow process is firstly executed, and then, a white list protection sub flow process is executed; B, the blacklist protection sub flow process is executed, and meanwhile, the white list protection sub flow process is executed for the mirror flow rate of the access request; C, whether a URI (uniform resource identifier) of the access request is in a URI library sufficiently learning the white list or not is judged, if so, the white process protection sub flow process is executed on the access request, and if not, the blacklist protection sub flow process is executed for the access request, wherein in each combination, after the execution of the blacklist protection sub flow process on the access request for each access request, the white list learning sub flow process is executed, and the white list is learned by using the URI in the access request as the unit.

Description

technical field [0001] The invention relates to the field of Web application security, in particular to a method for protecting against Web attacks. Background technique [0002] Web Application Firewall (WAF) is a product designed to provide protection for Web applications by implementing a series of security policies for HTTP / HTTPS. With the emergence of Advanced Persistent Threat (APT) attacks, it can be seen that hackers frequently use new vulnerabilities to attack, and the attacks are becoming more targeted and persistent. Protection against unknown attacks and rapid protection have become the main challenges encountered by WAF. [0003] In the field of web application security protection, existing protection strategies mainly include blacklist technology and whitelist technology. The blacklist technology mainly extracts the attack signature library by collecting known vulnerabilities, and identifies the attack behavior based on this library; if the access request mat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 洪珂许少年黄延福
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products