Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety detection method, device, electronic device and computer-readable storage medium

A security detection and computer technology, applied in the field of network security, can solve the problems of business system error alarm, polluting request log data, occupying business system processing resources, etc.

Active Publication Date: 2021-02-19
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such requests will have many adverse effects on the web system and subsequent data analysis, such as: 1. Vulnerabilities may be discovered by attackers and exploited; 2. A large number of invalid requests occupy the normal processing resources of the business system; 3. Contaminate business data , bringing unpredictable consequences; 4. The business system generates a large number of error alarms, resulting in the flooding of error alarms that originally needed attention; 5. Pollution of request log data, affecting modeling and analysis of business based on log data
The existing WAF configuration rules based on payload matching can intercept some malicious requests, but because the attack requests carry too many malicious payload PAYLOAD variants, it is impossible to intercept them all. Therefore, there is an urgent need for an attack that does not require an exact match to be effective against malicious requests. interception scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety detection method, device, electronic device and computer-readable storage medium
  • Safety detection method, device, electronic device and computer-readable storage medium
  • Safety detection method, device, electronic device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Hereinafter, exemplary embodiments of embodiments of the present invention will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily realize them. Also, for clarity, parts not related to describing the exemplary embodiments are omitted in the drawings.

[0088] In the embodiments of the present invention, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts or combinations thereof disclosed in this specification, and are not intended to The possibility that one or more other features, numbers, steps, acts, parts, parts or combinations thereof exist or be added is excluded.

[0089] In addition, it should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other. The embodiments of the present invention will be descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a security detection method, device, electronic equipment, and computer-readable storage medium. The method includes: obtaining request data, evaluating the request data according to preset evaluation rules, and obtaining the request data evaluation Score; calculate the cumulative evaluation score of the requested data on the preset feature dimension within the first preset time period of a certain computing node; when the cumulative evaluation score is higher than the preset threshold corresponding to a certain feature dimension, execute the The preset security operation corresponding to the feature dimension. This technical solution can effectively detect and automatically intercept malicious requests even when they do not completely match attack requests, which enhances WAF's ability to identify and intercept malicious requests, improves the automation of WAF, and reduces labor costs. put in.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, and in particular to a security detection method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] With the development of Internet technology, web applications are becoming more and more abundant, but at the same time, web servers have gradually become the main attack targets due to their powerful computing power, processing performance and high value, such as SQL injection, web page tampering, web page Troubleshooting, etc. Security incidents occur frequently. A website application-level intrusion prevention system (Web Application Firewall, WAF) that works at the application layer and can solve web application security problems that traditional firewalls are unable to do anything about comes into being. [0003] Before attacking a certain system, most attackers need to conduct vulnerability testing to supplement e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1466H04L67/02
Inventor 刘宇江张园超
Owner ADVANCED NEW TECH CO LTD