Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method and device of attack for Web server group

A server group and detection device technology, applied in the Internet field, can solve problems such as inability to respond to web attacks

Active Publication Date: 2016-01-06
HUAWEI TECH CO LTD +1
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

None of these defense methods can cope with today's rapidly changing Web attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and device of attack for Web server group
  • Detection method and device of attack for Web server group
  • Detection method and device of attack for Web server group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The embodiment of the present invention provides a method and device for detecting an attack on a Web server group, which are used to cope with the current rapidly changing Web attacks.

[0068] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0069] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention and the above ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose detection method and device of an attack for a Web server group, and the method and device are used to respond to a rapidly changing Web attack. The method comprises obtaining a potential attack set which is determined according to request character strings of Web requests sent to the Web server group in a preset period, performing cluster analysis on the request character strings, diving the request character strings to potential attack clusters according to a result of the cluster analysis, calculating a filtering factor, which is a ratio of the number of request character strings in the potential attach clusters to the number of Web servers corresponding to the request character strings, lurked in each potential attack cluster, and determining whether an attack exists according to the filtering factor. The rapidly changing Web attack can be responded.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for detecting an attack on a Web server group. Background technique [0002] With the birth of a series of new Internet products such as Web2.0, social network, and Weibo, Internet applications based on the Web environment are becoming more and more extensive, and various applications in the process of enterprise informatization are set up on the Web platform. [0003] The rapid development of web services has also aroused greater interest from attackers, and they adopt a dragnet-style web vulnerability scanning method to obtain the maximum attack benefits. When a new vulnerability appears, attackers often use writing tools to scan the Internet to maximize the discovery of vulnerable Web servers and attack them. [0004] However, the commonly used defense methods against Web attacks in the prior art are generally protection against certain types of attacks, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/55
Inventor 王东晖邹福泰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products