Website security detection method and website security detection device

A security detection and website technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of out-of-sync servers, difficult to find security problem servers, out-of-sync server codes, etc., to achieve the effect of improving security

Active Publication Date: 2016-04-20
BEIJING QIANXIN TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, many large websites use multiple servers to jointly perform load balancing operations. In this case, if the systems or applications or codes in each server are not synchronized, it may cause serious security problems.
For example, there is a serious security vulnerability in the website xxx.20m.cn. This website has 10 mirror servers. After the developer fixes the security vulnerability, he needs to update all 10 servers. If there is a server that has not been updated, the code of this server is not synchronized with other servers, that is, the security hole of this server still exists, which may cause serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security detection method and website security detection device
  • Website security detection method and website security detection device
  • Website security detection method and website security detection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] In order to clarify the website security detection method provided by the preferred embodiments above, a preferred embodiment is used to introduce the website security detection method provided by the embodiment of the present invention. Figure 5 A processing flow chart of a method for detecting website security according to a preferred embodiment of the present invention is shown. see Figure 5 , the process includes at least step S502 to step S514.

[0050] Step S502, perform bypass interception for the network, and capture the HTTP request packet.

[0051] Step S504, obtaining and recording the IP address corresponding to the website in the request packet.

[0052] Step S506, summarizing the IP addresses to generate a server IP address list.

[0053] Step S508, updating the IP address list.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a website security detection method and a website security detection device. The method comprises the following steps: acquiring a server Internet Protocol IP address list of a website, wherein each server has an IP address, and the IP addresses of different servers are different; and performing security detection of the website based on the server IP address list. By using the website security detection method in the embodiment of the invention, security detection of websites can be performed more efficiently and reasonably, and the efficiency of website security detection can be improved.

Description

technical field [0001] The invention relates to the field of website security detection, in particular to a method and device for website security detection. Background technique [0002] With the development of network technology, people's dependence on the network is also increasing. This dependence is not only reflected in the fact that people need to obtain or share or transmit information through the Internet in their daily study and work, but also in the fact that people conduct economic and financial operations through the Internet, such as online shopping or online remittance. With the increase of this dependence, especially people rely on the network for information transmission and financial operations, it directly leads to the increasing attention of network security. [0003] At present, many large websites use multiple servers to jointly perform load balancing operations. In this case, if the systems or applications or codes in each server are not synchronized,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06H04L29/12
Inventor 龙专
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products