Unlock instant, AI-driven research and patent intelligence for your innovation.

A Website Structure Mimicry Method for Protecting the Security of Web Applications

A technology for application security and websites, applied in the direction of website content management, digital data protection, computer security devices, etc., can solve problems such as web security threats, tampering with webpage content, technical passiveness, etc., and achieve the effect of defending against new types of attacks and protecting information

Active Publication Date: 2017-11-07
ZHEJIANG UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the birth of a series of new Internet products such as Web2.0, social network, and Weibo, Internet applications based on the Web environment are becoming more and more extensive. In the process of enterprise informatization, various applications are set up on the Web platform. The rapid development of business has also attracted the strong attention of hackers, followed by the emergence of web security threats. Hackers use the loopholes in the website operating system and the SQL injection loopholes in the web service program to gain control of the web server, and at least tamper with the webpage. The serious one is to steal important internal data, and the more serious one is to implant malicious code in the webpage, so that the website visitors are violated
At present, the common means of protecting web application security include firewall, IDS, pattern recognition, URL filtering and other technologies, but these technologies are very passive. Only when an intrusion event occurs, corresponding protection measures are taken against this intrusion. It is often difficult to defend against new attack methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Website Structure Mimicry Method for Protecting the Security of Web Applications
  • A Website Structure Mimicry Method for Protecting the Security of Web Applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] specific implementation plan

[0020] The purpose and effects of the present invention will become more apparent by describing the present invention in detail below with reference to the accompanying drawings.

[0021] The website structure mimetic method for protecting web application security of the present invention comprises the following steps:

[0022] Step 1: Insert a url in all pages which is invisible in browser.

[0023] Step 2: Analyze the request initiated by the client to the background server.

[0024] (2.1) Take out the IP address of the client that initiated the request, and determine whether the IP address is marked.

[0025] (2.2) If the IP address is flagged, go to step (2.4).

[0026] (2.3) Determine whether the requested URL is the URL we inserted into the page. If not, the request is forwarded to the real web server in the background. Otherwise, go to step (2.4).

[0027] (2.4) Mark the IP and update the time when the IP accesses the backgrou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website structure mimicry method for protecting web application safety. According to the method, a website structure map of a background web application is dynamically transformed, the transformed website structure map is shown outwards, and a real website structure is hidden. By means of the method, an attacker cannot obtain the real structure of a website, and therefore background web application analysis of the attacker can be effectively hindered, and a web application program can be protected.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a website structure imitation method for protecting web application security. Background technique [0002] With the birth of a series of new Internet products such as Web2.0, social network, and Weibo, Internet applications based on the Web environment are becoming more and more extensive. In the process of enterprise informatization, various applications are set up on the Web platform. The rapid development of business has also attracted the strong attention of hackers, followed by the emergence of web security threats. Hackers use the loopholes in the website operating system and the SQL injection loopholes in the web service program to gain control of the web server, and at least tamper with the webpage. The serious one is to steal important internal data, and the more serious one is to implant malicious code in the webpage, so that the website visitors are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F17/30
CPCG06F16/986G06F21/6227G06F2221/2119
Inventor 吴春明申旺强高文
Owner ZHEJIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More