Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for determining attack request

A determination method and redirection technology, applied in the field of network security, can solve the problem of inability to identify and intercept backdoor files, and achieve the effect of avoiding attacks

Active Publication Date: 2021-07-23
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a determination method and device for an attack request to solve the problems in the prior art that the backdoor files cannot be effectively identified and intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining attack request
  • Method and device for determining attack request
  • Method and device for determining attack request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The terms used in this application are only for the purpose of describing particular embodiments, not to limit the invention. "One", "one", "one", "one", "" "," and "" "as used in the present application and the appended claims are also intended to include many forms unless otherwise clearly indicated. It should also be understood that the terms "and / or" as used herein refer to any or from any or more of the associated listing items.

[0028] It will be appreciated that various information may be described in the present application, which may be described in terms of the terms first, second, and third, etc., but this information should not be limited to these terms. These terms are used only to distinguish the same type of information from each other. For example, the first information may be referred to as a second information without departing from the scope of the present application, and the second information can also be referred to as the first information. Dependi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for determining an attack request. The method is applied on a server and includes: receiving requests for different files in a website, and redirecting requests directed to different files to a script-based security detection program; The security detection program analyzes the parameters of the request, and determines whether the request is an attack request based on the analysis result. Through the technical solution of this application, the problem that the attack request for the backdoor file cannot be effectively identified in the prior art is solved, and all received requests can be automatically identified and intercepted when it is judged to be an attack request without modifying the file code, so as to avoid the attack request from causing an attack on the website.

Description

Technical field [0001] The present application relates to the field of network security technology, and more particularly to a judgment method and apparatus for attack requests. Background technique [0002] In the prior art, WAF (Website Application Firewall, website application firewall) can protect and intercept the attack requests received in Web (Website, Website) Application, which is a known attack feature rule to HTTP (Hyper TEXT) Transfer Protocol, Hypertext Transfer Protocols requests and responds to detect and intercept firewalls. [0003] Script-based WAF uses the same scripting language as the current web application, such as php (HypertExtPreprocessor, hypertext pre-processing), ASP (Active Server Page, Dynamic Server Page), etc., by writing the WAF script file In a global file that is referenced by most of the other files, the self-code is injected into the application to be protected to implement filtering and interception of the attack request, but for the back d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 庞申杰
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products