A network application layer security protection system

A security protection and network application technology, applied in the field of network security, can solve problems such as unoptimistic security situation, high security risk, and inability to effectively prevent web application layer attacks.

Active Publication Date: 2019-01-08
BEIJING INST OF COMP TECH & APPL
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid development of web applications, the security situation is not optimistic, and the security risks from the web level are getting higher and higher
According to statistics, 75% of network attacks occur at the Web application layer. What is more serious is that traditional security protection measures (network firewall, IDS / IPS and anti-virus software) cannot effectively prevent attacks at the Web application layer, and the Web application layer Defense means become the best weapon to protect against web application layer attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network application layer security protection system
  • A network application layer security protection system
  • A network application layer security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0016] figure 1 Shown is a schematic diagram of the network application layer security protection system, such as figure 1 As shown, the network application layer security protection system includes: a log audit module 2 , a detection module 4 , a behavior analysis module 3 and a message analysis module 1 .

[0017] Such as figure 1 As shown, the application layer security protection system is composed of message analysis module 1, detection module 4, behavior analysis module 3 and log audit module 2.

[0018] figure 2 Shown is a schematic diagram of the workflow of the message parsing module, such as figure 1 as well as figure 2 As shown, the message parsing module 1 includes an SSL decryption / encryption module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network application layer security protection system, which comprises a message parsing module for judging and parsing the message, comprising SSL decryption, encoding and decoding standard normalization processing and message field information extraction, and then sending the extracted message characteristics to a detection module for attack detection; and a message parsing module for judging and parsing the message. The detection module comprises a filter, a black-and-white list detection module and a feature matching module. The behavior analysis module is used forverifying the DDoS attack to the message characteristic data passing through the detection module and outputting the verified message to the Web server. The log audit module is used for auditing behaviors and exceptions in the process of Web protection. In the process of feature analysis and matching, the behaviors of Web mail uploading, SMTP and FTP data transmission are transmitted to the log audit module for recording and analysis. In the process of security protection, the access records violating policies and rules are recorded.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a network application layer security protection system. Background technique [0002] With the rapid development of the network, Web services, with its unique efficiency, ease of use and timeliness, have led a large number of organizations to transfer their business to the Web application layer. E-commerce, e-government, online banking and social networking sites all use Web applications. Web applications become an indispensable part of people's lives. However, with the rapid development of Web applications, the security situation is not optimistic, and the security risks from the Web layer are getting higher and higher. According to statistics, 75% of network attacks occur at the Web application layer. What is more serious is that traditional security protection measures (network firewall, IDS / IPS and anti-virus software) cannot effectively prevent attacks at the Web a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/0876H04L63/1416H04L63/1425H04L63/1458H04L63/168H04L67/02H04L67/06H04L67/14
Inventor 施雪成姚金利陈志浩吴明杰常承伟贾琼曾淑娟
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products