Link security detection method and client

A security detection and client-side technology, applied in electrical components, transmission systems, platform integrity maintenance, etc., can solve problems such as reducing the role of security detection on network security protection, inefficiency, and inability to remove in time, to ensure network security, Improve user experience and improve real-time effect

Inactive Publication Date: 2016-04-27
BEIJING QIANXIN TECH
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, when performing security detection, due to the existence of a large number of invalid and / or duplicate network links, and the prior art cannot remove invalid and / or duplicate connections in time, there are often too many links that cannot be processed in time problems, resulting in low efficiency of security testing operations
In addition, due to too many invalid and / or repeated links, in addition to causing low operational efficiency of security testing, it also directly affects the real-time performance of security testing, reducing the protective effect of security testing on network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link security detection method and client
  • Link security detection method and client
  • Link security detection method and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In order to clarify the link security detection method provided by the above preferred embodiments more clearly, a preferred embodiment is now used to introduce the link security detection method provided by the embodiment of the present invention. Figure 5 A processing flowchart of a link security detection method according to a preferred embodiment of the present invention is shown. see Figure 5 , the process includes at least step S502 to step S516.

[0046] Step S502, perform bypass interception for network data, and capture the HTTP request packet.

[0047] Step S504, making statistics on the initiator IP addresses of the request packets captured in step S502.

[0048] Specifically, after capturing the request packet, count the number of requests initiated by the initiator of the request packet within a predetermined time.

[0049] Step S506, judging whether the number of requests initiated by the initiator within a predetermined time exceeds a predetermined t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a link security detection method and a client. The method comprises steps: bypass interception is carried out for network data, and a hypertext transfer protocol request packet is grabbed; the link in the hypertext transfer protocol request packet is extracted; effective filtering is carried out on the link to acquire a to-be-detected link; and security detection is carried out on the to-be-detected link. In the embodiment of the invention, after the link is acquired, effective filtering is firstly carried out on the link, security detection is then carried out on the acquired to-be-detected link, the real-time performance of the security detection is improved, the security detection efficiency is greatly enhanced, the network security is ensured more reasonably, and the user experience is enhanced.

Description

technical field [0001] The invention relates to the field of link security, in particular to a link security detection method and a client. Background technique [0002] With the development of network technology, people's dependence on the network is also increasing. This dependence is not only reflected in the fact that people need to obtain or share or transmit information through the Internet in their daily study and work, but also in the fact that people conduct economic and financial operations through the Internet, such as online shopping or online remittance. With the increase of this dependence, especially people rely on the network for information transmission and financial operations, it directly leads to the increasing attention of network security. [0003] In the prior art, a method usually adopted to ensure network security is to perform security detection on the links in the request message, such as vulnerability scanning. However, in the prior art, when pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/55
Inventor 龙专
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products