Detection and protection system for SQL injection attacks
A technology that injects attacks and protection systems. It is used in transmission systems, digital data protection, and platform integrity maintenance. It can solve problems affecting network protection effects.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] like figure 1 As shown, a detection and protection system for SQL injection attacks includes an analysis module 2 interconnected with a switch 1 signal, a firewall 3 interconnected with the switch 1 signal, and a linkage connected between the analysis module 2 and the firewall 3 Module 4, the linkage module 4 and the analysis module 2 are interconnected through the first interface component 5, and the linkage module 4 and the firewall 3 are interconnected through the second interface component 6. The analysis module 2 is used for The data packets containing SQL injection attacks in the network are analyzed and alarmed, and the linkage module 4 is configured to issue a control policy to the firewall 3 and block the attacks when the analysis module 2 finds SQL injection attacks.
[0038] The analysis module 2 includes a mirror port 21 arranged on the switch 1, and a packet capture analysis unit 22 connected to the mirror port 21 and matched with the uplink port of the swi...
Embodiment 2
[0044] like figure 2 As shown, a detection and protection system for SQL injection attacks includes an analysis module 2 interconnected with a switch 1 signal, a firewall 3 interconnected with the switch 1 signal, and a linkage connected between the analysis module 2 and the firewall 3 Module 4, the linkage module 4 and the analysis module 2 are interconnected through the first interface component 5, and the linkage module 4 and the firewall 3 are interconnected through the second interface component 6. The analysis module 2 is used for The data packets containing SQL injection attacks in the network are analyzed and alarmed, and the linkage module 4 is configured to issue a control policy to the firewall 3 and block the attacks when the analysis module 2 finds SQL injection attacks.
[0045] The analysis module 2 includes a mirror port 21 arranged on the switch 1, and a packet capture analysis unit 22 connected to the mirror port 21 and matched with the uplink port of the sw...
Embodiment 3
[0053] like image 3 and Figure 4 As shown, the difference between it and Example 2 is:
[0054] A first authentication unit 9 is provided between the firewall 3 and the switch 1. The first authentication unit 9 includes a MAC address verification module 91 and an IP address verification module 92, and the MAC address verification module 91 is used to verify the access. Whether the computer has a trusted MAC address, the IP address verification module 92 is used to verify whether the connected computer has a trusted IP address.
[0055] In this embodiment, in order to avoid security threats caused by accessing data without a trusted MAC address and IP address, a first authentication unit is set between the firewall and the switch, and the first authentication unit includes a MAC address verification module and an IP address. Authentication module.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


