A non-real-time information website security protection method and device
A non-real-time, website technology, applied in the transmission system, electrical components, etc., can solve the problems of not being able to avoid tampering of webpage information in a timely and fast manner, complex execution process, high hardware cost, etc., to achieve rapid tampering, low cost, and avoid public Image damage effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a non-real-time information website security protection method embodiment according to an embodiment of the present invention, which may specifically include the following steps:
[0072] Step 110, monitor whether the website file of the target website is maliciously modified in the target website virtual machine; the target website is a non-real-time information website; if the website file of the target website is maliciously modified, go to step 120.
[0073] Wherein, a virtual machine (Virtual Machine) can create a virtual environment between the computer platform and the end user, and the end user operates software in the computer platform based on the virtual environment created by the virtual machine, such as visiting a website.
[0074] In the embodiment of the invention, the provider of the non-real-time information website can apply for a virtual machine to the cloud platform of the ...
Embodiment 2
[0090] refer to figure 2 , which shows a flow chart of the steps of an embodiment of a non-real-time information website security protection method embodiment according to an embodiment of the present invention, which may specifically include the following steps:
[0091] Step 210, recording the website file information of the backup target website at a safe moment.
[0092]In order to conveniently judge whether the website file of the target website is maliciously modified, in the embodiment of the present invention, the information of the website file of the backup target website can be recorded at any safe moment, so that it can be used as a reference for subsequent steps to judge whether the website file has been maliciously modified object.
[0093] In the embodiment of the present invention, when the website file of the target website is scanned by the first daemon process and has not been modified, the information of the website file of the target website is regularly...
Embodiment 3
[0146] refer to image 3 , which shows a structural block diagram of an embodiment of a non-real-time information website security protection device according to an embodiment of the present invention, which may specifically include the following modules:
[0147] The monitoring module 310 is adapted to monitor whether the website files of the target website are maliciously modified in the virtual machine of the target website; the target website is a non-real-time information website; if the website files of the target website are maliciously modified, enter the recovery modification module 320.
[0148] The restoring and modifying module 320 is adapted to obtain the backed up website file, replace the modified website file with the backed up website file, and modify the operation authority to the website file.
[0149] In the embodiment of the present invention, it is possible to monitor whether the website file of the target website is maliciously modified in the target web...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


