Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security monitoring method and device, and cloud WEB application firewall

An application firewall and network security technology, applied in the field of cloud web application firewall and network security monitoring. low effect

Active Publication Date: 2017-02-22
三六零数字安全科技集团有限公司
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, with this mode, when the traffic passes through the reverse proxy server, the WAF rules will be compared and blocked, which will affect the experience and performance of the business website
[0006] Port mirroring mode, although no changes to the network are required, but in this mode, devices need to be added for traffic collection in each computer room, and the deployment cost of hardware devices is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method and device, and cloud WEB application firewall
  • Network security monitoring method and device, and cloud WEB application firewall
  • Network security monitoring method and device, and cloud WEB application firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0084] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security monitoring method and device, and a cloud WEB application firewall. The network security monitoring method comprises the steps of configuration a WEB application firewall client side at a WEB server side; capturing online request data packets through the WEB application firewall client side, thereby obtaining traffic data; and copying the traffic data and sending the data traffic obtained through copying to the cloud WEB application firewall, thereby enabling the cloud WEB application firewall to carry out anomaly detection on the traffic data according to a preset request data judgment rule and returns a corresponding alarm prompt when it is monitored that an anomaly occurs in the data traffic. According to the method, the device and the firewall, a hardware device does not need to be added in the traffic collection process; the device deployment cost is low and the maintenance is convenient; the service is senseless and the configuration is flexibly; the performance of a WEB server is not influenced; and the service experience of a user is not influenced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security monitoring method, device and cloud WEB application firewall. Background technique [0002] With the continuous development of network technology, such as the prevalence of e-commerce, online banking, and e-government affairs, the business value carried by WEB servers is getting higher and higher, and the security threats faced by WEB servers are also increasing. Therefore, defense against the WEB application layer has become an inevitable trend, and WAF (Web Application Firewall, WEB Application Firewall) has also attracted more and more attention. [0003] At present, existing WAFs are generally physical hardware devices, and the security protection schemes adopted are mainly reverse proxy mode and port mirroring mode. [0004] In the process of realizing the present invention, the inventor finds that there are at least the following defects in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/0263H04L63/101H04L63/1416H04L63/1425H04L67/02
Inventor 李响
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products