Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of intelligently resisting Web vulnerability scanning and realizing self-repairing based on detection system

A vulnerability scanning and detection system technology, applied in the field of information security, can solve problems such as server danger and insufficient protection methods, and achieve the effect of enhancing protection capabilities and realizing self-healing.

Inactive Publication Date: 2018-08-14
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these current protection methods are not comprehensive enough. There are certain methods to bypass detection. Users can use manual browsers to detect whether there are loopholes in the server, or use programs to simulate analysis and send the js code set by the detection system and send corresponding http request; or if the vulnerability signature database is not updated immediately, the server is in a dangerous state at this time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of intelligently resisting Web vulnerability scanning and realizing self-repairing based on detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0012] 1. Read the http request information of the access terminal, and use the vulnerability signature database to match whether the resource path accessed in the request has a vulnerability in the vulnerability signature database. If so, the detection system thinks that this IP is implementing a vulnerability scanning attack, and will send the request of this IP to the vulnerability scanning protection object processing module within a period of time. If not, a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of intelligently resisting Web vulnerability scanning and realizing self-repairing based on a detection system, in the method, a Web vulnerability scanning behavior isdiscovered by combination of detection based on a vulnerability feature library and detection which is not based on the feature library, and by a request of a hacker, the method is used for self testof whether a server has vulnerabilities, and thus, capability of protection and detection for vulnerability scanning is realized and an aim of vulnerability self-repairing is realized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a detection system-based intelligent anti-Web vulnerability scanning and self-repairing method. Background technique [0002] At present, most of the protection technologies for vulnerability scanning are based on the public vulnerability publishing platform on the Internet, summarizing the feature library of vulnerabilities, and using these features to generate corresponding protection strategies. There is also a method of implanting js code into the access terminal, and judging whether the detection is a web vulnerability scanning behavior based on whether the access terminal sends a code-based HTTP request. However, these current protection methods are not comprehensive enough. There are certain methods to bypass detection. Users can use manual browsers to detect whether there are loopholes in the server, or use programs to simulate analysis and send the js code s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F17/30
CPCG06F16/9566H04L63/101H04L63/1416H04L63/1433H04L63/1441
Inventor 杨育斌江浩良柯宗贵
Owner BLUEDON INFORMATION SECURITY TECH CO LTD