System and method for website attack defense verification

A verification system and verification method technology, applied in the field of website attack prevention verification system, to achieve high security, ensure safe operation, and prevent illegal requests and network attacks

Active Publication Date: 2019-07-09
WUHAN DOUYU NETWORK TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, live video websites need to store various sensitive information, such as user personal identity information, credit card payment data, and website business information, when performing various businesses on a daily basis, so it is very easy to become the target of attack by unscrupulous users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for website attack defense verification
  • System and method for website attack defense verification
  • System and method for website attack defense verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Terminology Explanation:

[0034] Lua is a scripting language embedded in the server.

[0035] Nginx is a lightweight web server, reverse proxy server and email (IMAP / POP3) proxy server.

[0036] The verification code is a user identification picture for behavior verification.

[0037] TCP (Transmission Control Protocol Transmission Control Protocol).

[0038] MD5 (Message Digest Algorithm Fifth Edition) is a hash function widely used in the field of computer security to provide message integrity protection.

[0039] HMAC (Hash-based Message Authentication Code) is a key-related hash operation message authentication code. HMAC operation uses a hash algorithm, takes a key and a message as input, and generates a message digest as output.

[0040] HMACMD5 is a keyed hash algorithm constructed from the MD5 hash function and is used as a hash-based message authentication code. This HMAC process mixes a key with the message data, hashes the result of the mix using a hash ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a website attack defense verification system and method, and relates to the technical field of network security. The system includes: a first-level detection module, which is used to use the authentication password to detect whether the user is a safe user identified by the system; a second-level detection module, which is used to request the URL of the uniform resource locator accessed by the user, the user's access time and the user's IP Determine whether the user behavior of the non-secure user identified by the first-level detection module is a network attack. The invention adopts the method of verifying and authenticating passwords, which can not only ensure that the requests of safe users are not affected, but also effectively intercept the connection requests of non-safe users, prevent illegal requests and network attacks on the website, and ensure the safe operation of the website.

Description

[0001] The invention relates to the technical field of network security, in particular to a website attack prevention verification system and method. Background technique [0002] At present, live video streaming websites need to store various sensitive information, such as user personal identity information, credit card payment data, and website business information, when performing various businesses on a daily basis, so they are very easy to become the target of illegal users. In order to protect the interests of users and websites, it is necessary to verify the client requesting connection to prevent various illegal requests from illegal users or network attacks. Clients generally refer to browsers or app applications. However, Internet sites, especially live video sites, have a large number of users and a huge amount of visits. How to ensure the normal operation of legitimate users and maintain the normal operation of the website, and ensure the security of legitimate user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 彭友顺杨鹭
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products