Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, intermediate device, server and system for transmission protection of URL request

An intermediate device and server technology, applied in the field of network security, to achieve the effect of increasing attack difficulty and complexity

Active Publication Date: 2019-03-26
PURPLE MOUNTAIN LAB +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the web server becomes the main attack target of network hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, intermediate device, server and system for transmission protection of URL request
  • Method, intermediate device, server and system for transmission protection of URL request
  • Method, intermediate device, server and system for transmission protection of URL request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] figure 1 It is a schematic flowchart of a URL request transmission protection method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0048] S101. The intermediate device receives the original URL request sent by the client, and obfuscates the original URL request according to a preset obfuscation strategy to obtain an obfuscated new URL request, and the new URL request is a single heterogeneous URL request or multiple A set of URL requests composed of heterogeneous URL requests;

[0049] S102. The intermediate device transmits the original URL request to the first server to form a fake access channel; and transmits the new URL request to the second server for the second server to process the new URL request.

[0050] Specifically, the first server and the second server are isomorphic, and the difference between the two is that the first server does not have the functions of identification, reco...

Embodiment 2

[0053] On the basis of the first embodiment above, the preset obfuscation strategy includes: determining the obfuscation control component to be used; selecting at least one obfuscation algorithm to be used through the obfuscation control component; using the at least one obfuscation algorithm to The new URL request is obfuscated.

[0054] Specifically, the user edits the URL request on the client, and the client sends the user's original URL request to the intermediate device. After receiving the original URL request, the intermediate device dynamically selects one or more obfuscation control components, and each obfuscation control Each component contains a variety of different obfuscation algorithms, and the obfuscation functions implemented by different obfuscation control components are also different. The intermediate device selects at least one internal obfuscation algorithm to obfuscate the user URL request through the obfuscation control component, so as to obtain het...

Embodiment 3

[0058] On the basis of Embodiment 1 or Embodiment 2 above, the method further includes: the intermediate device receives the response of resending the new URL request fed back by the second server, and resends the new URL request to the second server according to the response.

[0059] It can be seen from the first to third embodiments above that the URL request transmission protection method provided by the embodiment of the present invention has the following advantages: (1) Combined with dynamic thinking, one or more obfuscation control components are dynamically selected to realize corresponding URL heterogeneity Effect. The dynamics of control component selection increases the uncertainty of URL request transmission factors and increases the attack difficulty for attackers. (2) Using heterogeneous ideas to confuse user URLs, increasing the difficulty for attackers to identify user URL requests. (3) The intermediate device increases the complexity of the user URL request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, an intermediate device, a server and a system for transmission protection of a URL request. The method comprises the following steps: the intermediate device receivingan original URL request sent by a client, confusing the original URL request according to a preset confusion strategy to obtain a confused new URL request; the intermediate device transmitting the original URL request to a first server to form a pseudo access channel; and transmitting the new URL request to a second server for processing the new URL request. The method further comprises the following steps: receiving the original URL request sent by the intermediate device to form the pseudo access channel; receiving the new URL request sent by the intermediate device; if the new URL requestis a single heterogeneous URL request, identifying the confusion algorithm thereof, de-obfuscating to obtain the original URL request and preform responding; if the new URL request is a URL request set, recovering the URL request set; and performing multi-mode sanctioning on the recovery result and performing a response. According to the method, the intermediate device, the server and the system for transmission protection of the URL request, the attacker can be confused, thereby ensuring a normal implementation of the URL request.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a URL request transmission protection method, an intermediate device, a server and a system. Background technique [0002] In today's network environment, the Web service system, as an important service bearing and providing platform, is a virtual representative of the government, enterprises and individuals on the Internet, which brings together massive data resources, such as user information, enterprise data, financial finance, business secrets, The importance of intellectual property rights, customer order information, etc. is self-evident. Therefore, the Web server becomes the main attack target of network hackers. Network hackers use various channels, various attack tools, and various deceptive means to obtain the information they want. [0003] Generally, a user requests a service from a web server in the form of a URL. Therefore, the security of the URL is ext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/02H04L67/565H04L67/56
Inventor 张铮邬江兴刘浩刘镇武王立群李卫超
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products