Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway

A sensitive information and security gateway technology, applied in the field of computer network security, can solve problems such as lack of active response methods and powerlessness, and achieve the effects of good scalability, leakage prevention, and flexible configuration

Active Publication Date: 2015-10-21
ZHEJIANG UNIV +1
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of new attack methods that continue to emerge, traditional passive defense methods are becoming more and more powerless, lacking a proactive response method, often responding only after the system is attacked, and such defenses are always laun

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
  • Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Hereinafter, the present invention will be described in detail based on the drawings, and the purpose and effects of the present invention will become more apparent.

[0037] The present invention is a method for server fingerprint mimicry and sensitive information mimicry based on WEB security gateway, including the following steps:

[0038] Step 1: Set up a reverse proxy server between the real web server and the user. The reverse proxy server is implemented based on Nginx. Realize the setting of forwarding and routing rules on the reverse proxy server, and then the message transfer between the user and the web server is processed and forwarded by the reverse proxy server, and the reverse proxy server is transparent to the user and the server; network topology Picture attached figure 1 ;

[0039] Step 2: Configure the mimic security gateway module on the reverse proxy server, including the fingerprint information mimic module of the Web server and the sensitive information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a server fingerprint mimicry and sensitive information mimicry method based on a WEB security gateway. The method comprises the following steps: returning information mimicry when an attacker scans Web server fingerprint information and bug information to confuse effective information acquired by the attacker; and after the attacker finishes the attacking through the bug, performing mimicry substitution on the sensitive information acquired by the attacker through the sensitive information mimicry to prevent the sensitive information from being leaked. Compared with the traditional Web security gateway, the method disclosed by the invention can confuse the seeing and hearing of the attacker before the attacking, and can interfere the acquisition of the sensitive information after the attacking is finished; the security gateway can be flexibly configured and is transparent facing to the normal user, and has good expandability and portability.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to the Web application security gateway technology. Background technique [0002] In Tsuda, where the Internet penetration rate is getting higher and higher, the Internet has become ubiquitous in daily life. From the PC era to the mobile Internet era to the future Internet of Things era, the convenience and speed brought by the Internet have already benefited people greatly. However, whether it is the vast number of Internet users or IT companies, the emphasis on network security has not been able to prevent it before it happens, and most of the cases are "remedy". In recent years, various attacks on the network have occurred frequently, which has sounded the alarm for network security. Although people have adopted various methods and tools to strengthen the security of network communication, the number of successful attacks is still increasing. The relatively "f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1491H04L67/02
Inventor 吴春明曹魏
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products