Method and device for determing WEB attack result, electronic device and readable storage medium

A judgment method and attack model technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to attack results and impact judgment.

Active Publication Date: 2019-03-19
EASTCOMPEACE TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method, device, equipment and readable storage medium for judging the result of WEB attack, which solves the problem that the existing detection system can only detect whether a WEB attack has occurred, and cannot judge the attack result and Technical Issues Affecting Judgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determing WEB attack result, electronic device and readable storage medium
  • Method and device for determing WEB attack result, electronic device and readable storage medium
  • Method and device for determing WEB attack result, electronic device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The embodiment of the present invention provides a method, device, equipment and readable storage medium for judging the result of WEB attack, which solves the problem that the existing detection system can only detect whether a WEB attack has occurred, and cannot detect the existence of an attack. Results and implications of the technical aspects of the judgment.

[0053]In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for determining a WEB attack result, and an electronic device and a readable storage medium. The attack result of the WEB request data corresponding to the WEB response data is determined by calculating the similarity between a response page corresponding to the WEB response data and a normal response page, and an attacked response page, respectively. Therefore, the technical problem that the existing detection systems usually only detect whether a WEB attack has occurred and cannot determine the result and the impact of the attacksis solved.

Description

technical field [0001] The invention relates to the technical field of network attack detection, in particular to a method, device, equipment and readable storage medium for judging the result of a WEB attack. Background technique [0002] During the process of accessing the WEB, the user inputs the query information through the WEB browser, and the browser sends the WEB request data with the query information to the WEB server through the HTTP protocol. Correspondingly, the WEB server responds to the received WEB request data and generates The HTML document sent to the WEB browser. [0003] Currently, 80% of common applications are web applications, including financial applications that require high security. The Web has become the standard application interaction interface. While Web applications bring convenience to people, they have also become the most concerned object of hackers. [0004] Existing detection systems usually can only detect whether a WEB attack has oc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L67/02
Inventor 黄小鹏赵子渊刘欣春陈丽红
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products