Detection method and system of webpage bugs
A vulnerability detection and vulnerability technology, applied in the field of network security, can solve the problems of high maintenance cost, excessive occupation, and high false negative rate, and achieve the effect of low maintenance cost, low false negative rate, and strong preventive effect.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] See figure 2 , Shown is a schematic flow diagram of the method for detecting web page loopholes in the present invention. The method for detecting web page vulnerabilities includes:
[0047] In step S201, a vulnerability rule library is created to store the vulnerability rules, where the vulnerability rules include the name of the vulnerability function, the name of each execution function and its corresponding one or more vulnerability parameter structures.
[0048] The vulnerabilities in the vulnerability rules, according to common types, include: structured query language (SQL) injection vulnerability, auto-completion vulnerability, directory traversal vulnerability, hidden field manipulation vulnerability, buffer overflow vulnerability, cross-site scripting vulnerability, and rejection One or a combination of service attack vulnerabilities.
[0049] The method for creating the vulnerability rule base specifically includes: (1) analyzing the above known vulnerabilities ac...
Embodiment 2
[0067] See image 3 , Shown is a schematic diagram of modules of the web page vulnerability detection system of the present invention.
[0068] A detection system for web page vulnerabilities is applied to the server 30. It can be understood that: the server 30 may be a server host or a cloud server platform.
[0069] The web page vulnerability detection system is used to receive user requests, analyze whether there are web page vulnerabilities, and send risk warning information accordingly. The webpage vulnerability detection system includes at least: a vulnerability rule library 31, a preprocessing module 32, a matching module 33, and a risk warning module 34.
[0070] The vulnerability rule library 31 is used to store the vulnerability rules, where the vulnerability rules include the name of the vulnerability function, the name of each execution function and its corresponding one or more vulnerability parameter structures.
[0071] The vulnerabilities in the vulnerability rules, a...
Embodiment 3
[0092] See Figure 4 , Shown is a schematic diagram of the defense framework of the web page vulnerability detection system of the present invention. The webpage vulnerability detection system is explained from the perspective of defense architecture.
[0093] A web page vulnerability detection system includes a vulnerability analysis part 41 and a data support part 42.
[0094] It is understandable that the vulnerability analysis part 41 is generally located at figure 1 The analysis server 31 of the vulnerabilities, and the vulnerability rule generation part can be located on the analysis server 31, or located figure 1 The data is supported on the server 33.
[0095] The vulnerability analysis part 41 is used to receive user requests, analyze whether there are web page vulnerabilities, and send risk warning information accordingly. Specifically, the vulnerability analysis part includes: a preprocessing module 411, a matching module 412, a risk warning module 413, and a preset vulne...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com