Dynamic application address conversion method and gateway system

An address translation and dynamic application technology, applied in the field of web application security, can solve the problems of high construction cost of application instructions, lack of versatility, low practicability, etc., to achieve good security and operability, increase attack difficulty, guarantee safe effect

Active Publication Date: 2015-02-25
INST OF INFORMATION ENG CAS
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These technologies can reflect the MTD idea to a certain extent, but the construction cost of application instruction randomization is high, and it is related to specific applications, so it is not univ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic application address conversion method and gateway system
  • Dynamic application address conversion method and gateway system
  • Dynamic application address conversion method and gateway system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] Such as figure 1 Shown is a schematic diagram of the deployment of the Dynamic Application Address Translation (DAAT) gateway of the present invention. We use Privoxy in the DAAT gateway as proxy software to implement the DAAT method.

[0040] The dynamic application address translation (DAAT) gateway system of the present invention includes an encryptor, a secret key generator, a decryptor, a URL locator and a redirector.

[0041] The encryptor converts and encodes the original URL. The conversion function can be a symmetric encryption function, an asymmetric encryption function, or an XOR algorithm, etc. Generally, a symmetric encryption function is used;

[0042] The secret key generator is used to generate the master secret key and session secret key, where: the master key can be a random number generator, or the current time of the system o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dynamic application address conversion method and gateway system. A novel Web application attack defense method is achieved. URL addresses are dynamically converted, attack faces of an application system are converted, vulnerability of Web applications is hidden, the attack difficulty of an attacker is increased, and the difficulty in which the attacker conducts vulnerability scanning and attack injection on Websites through URLs is greatly increased. By the adoption of a DAAT method, the security threats of the attacker to the Web applications can be dynamically and effectively reduced, and security of the Web application system is improved.

Description

technical field [0001] The invention belongs to the field of Web application security, and in particular relates to a dynamic application address translation (DAAT) method and a gateway system thereof. Background technique [0002] With the development of the Internet, Web applications have become an indispensable part of life, and attacks against Web applications have also intensified. Today's web application systems are very complex, and there are many pages and links in web applications, which inevitably contain some programming defects and software vulnerabilities. Therefore, it is impossible to identify and check out all system vulnerabilities before the system is released, and the lag of updating patches makes the threat of 0day vulnerabilities exist objectively for a long time. Since most web applications are in an open environment, users and attackers can access them anytime and anywhere. The static nature of network and application configurations brings great conve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12H04L9/08
CPCH04L61/25H04L63/02H04L63/1433
Inventor 马多贺徐震黄亮陈凯吕双双杨倩姜帆
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products