Webpage tamper-resistant method based on file-driven watermark comparison

A file-driven, anti-tampering technology, applied in the direction of digital data protection, etc., can solve the problems of inability to prevent database attacks, increase publishing servers, single inspection timing, etc., and achieve the goal of reducing external environment requirements, system resource requirements, and configuration volume Effect

Active Publication Date: 2015-07-15
FUZHOU BOKE WANGAN INFORMATION TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantages of this technology are: (1) It has a certain impact on server access performance and resource occupation
(3) An independent publisher needs to be added during deployment
(4) Cannot prevent attacks on the database through the Web
This technology is based on the development of the driver in the kernel, and can promptly alarm and intercept captured tampering behaviors, but there are also some inherent defects: (1) There are many known methods to bypass file system-based inspections
(2) The implementation method is too dependent on the characteristics of the operating system, and some technologies use undocumented technology, which is unstable and non-upgradable
(3) The timing of the inspection is single, and once the capture is missed, there is no protective means
(4) Cannot prevent attacks on the database through the Web

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage tamper-resistant method based on file-driven watermark comparison
  • Webpage tamper-resistant method based on file-driven watermark comparison

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0029] The present invention is based on the webpage anti-tampering method of file-driven watermark comparison, such as figure 1 shown, including the following steps:

[0030] (1) When the driver installed on the server monitors that the webpage file is accessed, the kernel layer intercepts the IRP request.

[0031] (2) Analyze the intercepted IRP request to determine whether it is satisfied at the same time: the process that initiates the IRP request is a specified Web container process, and the purpose of the IRP request is to read a file, and the file read by the IRP request is a user For files that need to be protected, if the above three conditions are met at the same time, the watermark comparison will be started, and the next step will be turned. As long as one of the conditions is not satisfied, the IRP request will be releas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a webpage tamper-resistant method based on file-driven watermark comparison. The webpage tamper-resistant method comprises the following steps: 1, when a driving program installed on a server side monitors that a webpage is accessed, a kernel layer captures an IRP (I/O Request Package) request; 2, judging whether the conditions that a process of initiating the IRP request is an appointed Web container process, the IRP request is for a purpose of reading a file and the file read by the IRP request is a file needing to be protected by a user are simultaneously met or not, starting watermark comparison when the three conditions are met and turning to the next step, and normally releasing as long as one condition is not met; 3, calculating watermarks of the webpage file, comparing the calculated water marks with backup watermarks in a watermark library, if the watermark comparison result is consistent, normally releasing the IRP request, or else sending a request of recovering a tampered webpage file to a user layer and refusing the IRP request. The webpage tamper-resistant method can be used for effectively protecting a Web website from being tampered and improving the watermark comparison efficiency.

Description

technical field [0001] The invention relates to the technical field of Web site security protection, in particular to a webpage tamper-proof method based on file-driven watermark comparison. Background technique [0002] With the rapid development of the Internet, the website as an information carrier has become an important way for enterprises and institutions to release information. However, more and more hackers use the loopholes of the website to illegally tamper with the information on the website. impact and serious economic losses. In response to this threat of network tampering, many software providers have developed various anti-tampering systems for web pages. [0003] At present, there are three related technologies of the anti-tampering system for static web pages: [0004] 1. Plug-in polling technology. The technical solution works independently and has nothing to do with the operating system, web container, etc., and is implemented by polling and monitoring ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
Inventor 王琦杨大志刘坤朋
Owner FUZHOU BOKE WANGAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products