Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for fuzzy detection and analysis of web server security

A WEB server and security technology, applied in transmission systems, electrical components, etc., can solve the problem of low security of WEB servers, achieve the effect of improving security and preventing malicious orders

Active Publication Date: 2021-09-21
ZTE CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] According to the method and device for fuzzy detection and analysis of WEB server security provided by the embodiment of the present invention, the problem of low WEB server security is solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for fuzzy detection and analysis of web server security
  • A method and device for fuzzy detection and analysis of web server security
  • A method and device for fuzzy detection and analysis of web server security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0038] figure 1 It is a flow chart of a method for fuzzy detection and analysis of WEB server security provided by an embodiment of the present invention, as figure 1 As shown, the steps include:

[0039] Step S101: By analyzing the user request message during service execution, predict whether there is an abnormality in the user request message.

[0040] By analyzing the fluctuation of the number of user request messages per unit time during business execution, it is possible to predict whether there is an abnormal user request message. For example, a period can be set. If the number of user request messages received in the historical period is basical...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for performing fuzzy detection and analysis on WEB server security, and relates to the field of WEB server security. Pre-judgment; if the pre-judgment result is that there is an abnormal user request message, then obtain the weight matrix and judgment matrix of the corresponding business action matrix; use the weight matrix and judgment matrix of the business corresponding action matrix to perform fuzzy operations, and according to the fuzzy The calculation result determines the security of the WEB server. The embodiment of the present invention detects and analyzes the security of the WEB server based on user behavior, which can prevent abnormal behaviors such as malicious ordering and improve the security of the WEB server.

Description

technical field [0001] The invention relates to the field of WEB server security, in particular to a method and device for fuzzy detection and analysis of WEB server security. Background technique [0002] In the Internet environment, the importance of WEB server security is beyond doubt. [0003] Usually, for WEB servers that are already running online, the common WEB security detection methods are as follows: security vendors use security tools to scan for vulnerabilities in the system, or conduct security assessments on the WEB servers through manual penetration testing and other programs, and then the developers conduct the assessment. For the problems pointed out in the report, adopt corresponding security hardening solutions. [0004] In practical applications, the commonly used security hardening scheme is completed through the cooperation of two aspects. On the one hand, a firewall mechanism is added, the main purpose is to isolate or protect the server from attacks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L67/02
Inventor 令周扬
Owner ZTE CORP