Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior detection method and apparatus

A detection method and detection device technology, applied in the Internet field, can solve problems such as information leakage and failure to identify scanning behaviors in time

Inactive Publication Date: 2017-03-22
HANGZHOU DPTECH TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a sensitive sentence is detected, the detection is actually an action after the attacker obtains the information on the web page, and the information has been leaked; Protection means, there is a problem that the scanning behavior cannot be identified in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior detection method and apparatus
  • Behavior detection method and apparatus
  • Behavior detection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0019] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior detection method and apparatus. The method comprises the steps of receiving an access request of an application to target interfaces; and determining whether the access request is an abnormal access request or not according to whether the access request accesses a predetermined page element or not, wherein the predetermined page element is configured in at least one interface of the target interfaces and is in an invisible state in the interface.

Description

technical field [0001] The present application relates to Internet technology, in particular to a behavior detection method and device. Background technique [0002] With the increasing development of network technology, network security incidents targeting website vulnerabilities are becoming more and more frequent. The industry usually uses vulnerability scanning tools to detect websites, find and solve weak links, and prevent problems before they happen. However, vulnerability scanning is like a double-edged sword. It not only allows system administrators to discover security vulnerabilities in the network, but also becomes a tool for attackers to obtain website information before carrying out vulnerability attacks. In the prior art, protective equipment is usually deployed at the exit of the system, or the system has its own scanning protection function, and the scanning behavior is determined by identifying the suspected attack behavior during the vulnerability detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/552G06F2221/2119
Inventor 李小龙王树太
Owner HANGZHOU DPTECH TECH