Unlock instant, AI-driven research and patent intelligence for your innovation.

Illegal page detection method, system, computer system and readable storage medium

A detection method and page technology, applied in transmission systems, network data retrieval, other database retrieval, etc., can solve problems such as hacker bypass and staff maintenance.

Active Publication Date: 2021-07-23
BEIJING QIANXIN TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the process of realizing the concept of the present disclosure, the inventors have found that there are at least the following defects in the related technologies: detecting whether there is hacking based on text features is not only easy to be bypassed by hackers through variant Http requests and Http responses, but also due to the variant Http Too many requests and Http responses cause staff to maintain a huge rule base

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal page detection method, system, computer system and readable storage medium
  • Illegal page detection method, system, computer system and readable storage medium
  • Illegal page detection method, system, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0034] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a method for detecting an illegal page, including: acquiring first frame feature information of the current page; acquiring second frame feature information of a predetermined page; comparing the first frame feature information with the second frame feature information to obtain the current page and the second frame feature information. The similarity of the predetermined page; and based on the similarity, judging whether the current page is an illegal page. The present disclosure also provides an illegal page detection system, a computer system and a computer-readable storage medium.

Description

technical field [0001] The present disclosure relates to an illegal page detection method, system, computer system and readable storage medium. Background technique [0002] Webshell is a command execution environment that exists in the form of web pages and can be used to manage web servers. At present, hackers usually use various means to upload the variant Webshell to the website server and use the management feature of the Webshell to invade the website. [0003] After the webshell is uploaded, the hacker must connect to the webshell to achieve intrusion. Therefore, it is possible to determine whether there is a hacker intrusion by detecting the connection behavior of the webshell. [0004] Since Http requests and Http responses are usually involved in the process of connecting to a Webshell, and Http requests and Http responses generally have corresponding text features, so related technologies generally detect whether there is hacking based on text features. [0005]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/958
CPCH04L63/1416
Inventor 李忠
Owner BEIJING QIANXIN TECH