Alarm method for script injection attack and alarm system

A script injection attack and alarm information technology, applied in the direction of instrumentation, electrical digital data processing, platform integrity maintenance, etc., can solve the problems that malicious scripts have no filtering function, scripts that cannot identify malicious scripts, etc.

Inactive Publication Date: 2018-08-10
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the defense methods against malicious script attacks adopt the method of characteristic filtering, mainly to identify malicious scripts by setting the general characteristics of malicious scripts, but this method needs to set as many general characteristics of malicious scripts as filtering rules , to improve the identification success rate of malicious scripts, but there is still no filtering function for malicious scripts outside the filtering rules, that is to say, the defense method against script injection attacks in the prior art can only identify script injection of known malicious scripts attack, but cannot identify unknown malicious script script injection attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method for script injection attack and alarm system
  • Alarm method for script injection attack and alarm system
  • Alarm method for script injection attack and alarm system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0059] The embodiment of the present application provides a warning method for script injection attacks, such as figure 1 As shown, it is applied to a Web service system, and the Web service system includes: a plurality of servers, each of which includes a preset random label and an application source code obtained after preprocessing the original application source code according to the random label; The random label of each server is different from the random labels of other serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an alarm method of script injection attack and an alarm system. The method is realized according to a Web service system comprising a plurality of servers, each server comprises a preset random tag and an application source code obtained after an original application source code is preprocessed according to the random tag; the random tag of each server is different from random tags of other servers, so that the application source codes obtained after the same application source code is preprocessed according to the random tags of all the servers are different; during the subsequent use, a received access request is copied to be a plurality of access requests, and whether the Web service system is subjected to script injection attack is judged according to response results of all the servers, so that purposes of identification and alarm about the script injection attack of known and unknown malicious scripts are achieved.

Description

technical field [0001] The present application relates to the field of computer application technology, and more specifically, to a warning method and warning system for script injection attacks. Background technique [0002] In today's network environment, the web (World Wide Web) service system, as an important service bearing and providing platform, is a virtual representative of the government, enterprises and individuals on the Internet, and brings together massive value information, such as user information, enterprise data, financial The importance of financial information, business secrets, intellectual property information, and customer order information is self-evident. Therefore, attacks on Web services have become the main attack direction of network hackers. However, in the current network environment of Web services, quite a lot of software has various known and unknown vulnerabilities and backdoors, which provide convenient attack paths for attackers. Attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 张铮邬江兴王晓梅李卫超王立群张杰鑫马博林谢光伟刘镇武刘浩
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products