Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A website vulnerability detection method, detection server, system and storage medium

A technology of website vulnerability and detection method, which is applied in the direction of transmission system, electrical components, etc., can solve the problems of attackers' exploitation, website security impact, and website causing large traffic, so as to achieve light traffic burden, light website vulnerability detection, and realize website burden effect

Active Publication Date: 2021-04-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When there are loopholes in the website, it is very easy to be exploited by attackers, which will affect the security of the website; therefore, how to optimize the vulnerability detection method of the website has always been the focus of research by technicians in the field
[0003] At present, the website vulnerability detection method is mainly realized through the URL (Uniform ResoureLocator, Uniform Resource Locator) link of the website captured by the web crawler, such as capturing the URL of the website through the web crawler, and performing vulnerability detection on the website according to the captured URL; The problem in this method of crawling the URL of the website by web crawlers to detect website vulnerabilities is that: web crawlers crawling the website will cause a lot of traffic pressure on the website; therefore, how to provide a website with a lighter burden The website vulnerability detection method has become a problem that those skilled in the art need to consider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A website vulnerability detection method, detection server, system and storage medium
  • A website vulnerability detection method, detection server, system and storage medium
  • A website vulnerability detection method, detection server, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] The embodiment of the present invention provides a schematic diagram of the system architecture for realizing the vulnerability detection method of the website, referring to figure 1 , including a terminal device 201, a detection server 202 and a website server 203;

[0037] Wherein, the terminal device 201 can be an electronic device on the user side such as a mobile phone, a tablet computer, a notebook computer, etc.; a browsing component with a brows...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the website vulnerability detection method provided in the embodiment of the present application, the server can obtain task data corresponding to the target website, and the task data includes URL links corresponding to the target website collected by the browsing component during the process of loading pages of the target website by the browsing component; Thus the server can add the task data to the preset task queue when the website vulnerability detection has not been performed according to the task data, so as to retrieve the task data according to the queue sequence of the task queue; After obtaining the task data, the parameter value of each URL link in the task data can be replaced with the corresponding vulnerability characteristic value recorded in the preset website vulnerability rules to obtain the detection URL link corresponding to each URL link, so as to use This generates a detection request corresponding to each detection URL link, and according to each detection request, determines the website vulnerability detection result of the URL link corresponding to each detection URL link, so as to realize the detection of website vulnerability.

Description

technical field [0001] The invention relates to the technical field of website security, in particular to a website vulnerability detection method, detection server and system. Background technique [0002] When there are loopholes in the website, it is very easy to be exploited by attackers, thus affecting the security of the website; therefore, how to optimize the vulnerability detection method of the website has always been the focus of research by technicians in the field. [0003] At present, the website vulnerability detection method is mainly realized through the URL (Uniform ResoureLocator, Uniform Resource Locator) link of the website captured by the web crawler, such as capturing the URL of the website through the web crawler, and performing vulnerability detection on the website according to the captured URL; The problem in this method of crawling the URL of the website by web crawlers to detect website vulnerabilities is that: web crawlers crawling the website wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1441
Inventor 唐文韬胡珀郑兴王放郭晶张强范宇河杨勇
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products