Method and device for preventing HTTP proxy attack

A technology of quantity and request packets, applied in the field of network security, can solve the problem of inability to identify the attacker, and achieve the effect of accurately intercepting and preventing HTTP proxy attacks

Inactive Publication Date: 2016-09-21
HANGZHOU DPTECH TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The method and device for preventing HTTP proxy attacks provided by this application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing HTTP proxy attack
  • Method and device for preventing HTTP proxy attack
  • Method and device for preventing HTTP proxy attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0044] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and device for preventing HTTP proxy attacks provided by the present application, the method is applied to a network security device, and the method includes: the network security device receives an HTTP request message, and parses out the message of the HTTP request message header; inquire whether there is a proxy field in the message header; if there is a proxy field in the message header, obtain the ip of the original client in the proxy field; update the quantity of the ip, and judge Whether the updated ip number conforms to the preset rule; if the updated ip number meets the preset rule, intercept the message corresponding to the ip. By applying the embodiment of the present application, the real attacker can be identified, so as to accurately intercept the HTTP request message sent by the attacker.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for preventing HTTP proxy attacks. Background technique [0002] With the continuous development of network technology, there are more and more network attacks, how to effectively prevent network attacks becomes very important. [0003] A network (Web) server (hereinafter referred to as a server) is extremely important in Internet applications, and it can provide services such as web page browsing, email sending and receiving, and network resource downloading. Protocol (Hypertext Transfer Protocol) protocol, so the server will often be attacked by the network. [0004] In the prior art, the protection against network attacks is mainly based on the source ip to count the rate of request packets. The basic processing flow is to parse the source ip carried in the HTTP request message, and then count the packets corresponding to the source ip ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1475H04L63/1491
Inventor 杨学良
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products