Method and device for security protection based on nginx
A security protection and server technology, applied in the field of network security, can solve problems such as high development and maintenance costs, affecting website requests, and inability to do more data association analysis, so as to reduce development and maintenance costs and avoid impact
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] figure 1 It is a flow chart of a method for security protection based on Nginx provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of security protection based on Nginx logs, and the method can be performed by a device for security protection based on Nginx. The device can be implemented by software and / or hardware, and generally can be integrated into a security analysis server. The method specifically includes the following steps:
[0021] Step 110, obtaining log data of the Nginx server.
[0022] In the data layer, the Nginx server writes the changes of the Nginx process into the log, and synchronizes the newly added log data to the security analysis server in real time. The Nginx server monitors the log changes in real time. When the log changes, that is, when new log data is generated, the log data is sent to the security analysis server in the form of log data stream. After the security analysis server receives the l...
Embodiment 2
[0036] figure 2 It is a flow chart of a method for Nginx-based security protection provided by Embodiment 2 of the present invention. This embodiment has been optimized on the basis of the foregoing embodiments. The method specifically includes the following steps:
[0037] Step 210, obtaining log data of the Nginx server.
[0038] Step 220, acquiring request-related information of the client in the log data.
[0039] Step 230, if the request-related information of the client satisfies the pre-defined prohibition rules, then send a prohibition instruction to the Nginx server to instruct the Nginx server to prohibit the request permission of the client.
[0040]Step 240, after the client's request permission is prohibited for a first preset time, send a release instruction to the Nginx server, so as to release the prohibition of the client's request permission.
[0041] The client may return to normal after a period of time, and there is no longer a threat to the site. At th...
Embodiment 3
[0048] image 3 It is a flow chart of a method for Nginx-based security protection provided by Embodiment 3 of the present invention. This embodiment has been optimized on the basis of the foregoing embodiments. The method specifically includes the following steps:
[0049] Step 310, obtaining log data of the Nginx server.
[0050] Step 320, acquiring request-related information of the client in the log data.
[0051] Step 330, if the request-related information of the client satisfies the pre-defined prohibition rules, send a prohibition instruction to the Nginx server to instruct the Nginx server to prohibit the request permission of the client.
[0052] Step 340, according to the log data, summarize related request information for the same site.
[0053] Wherein, the request related information to the same site includes at least one of the following: within the second preset time, the number of requests to the same site, the request response type to the same site, the req...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


