Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A transmission protection method, intermediate device, server and system for url request

An intermediate device and server technology, applied in the field of network security, to achieve the effect of increasing complexity and increasing attack difficulty

Active Publication Date: 2021-06-11
PURPLE MOUNTAIN LAB +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the web server becomes the main attack target of network hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A transmission protection method, intermediate device, server and system for url request
  • A transmission protection method, intermediate device, server and system for url request
  • A transmission protection method, intermediate device, server and system for url request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] figure 1 It is a schematic flowchart of a URL request transmission protection method provided by an embodiment of the present invention. like figure 1 As shown, the method includes the following steps:

[0048] S101. The intermediate device receives the original URL request sent by the client, and obfuscates the original URL request according to a preset obfuscation strategy to obtain an obfuscated new URL request, and the new URL request is a single heterogeneous URL request or multiple A set of URL requests composed of heterogeneous URL requests;

[0049] S102. The intermediate device transmits the original URL request to the first server to form a fake access channel; and transmits the new URL request to the second server for the second server to process the new URL request.

[0050] Specifically, the first server and the second server are isomorphic, and the difference between the two is that the first server does not have the functions of identification, recover...

Embodiment 2

[0053] On the basis of the first embodiment above, the preset obfuscation strategy includes: determining the obfuscation control component to be used; selecting at least one obfuscation algorithm to be used through the obfuscation control component; using the at least one obfuscation algorithm to The new URL request is obfuscated.

[0054] Specifically, the user edits the URL request on the client, and the client sends the user's original URL request to the intermediate device. After receiving the original URL request, the intermediate device dynamically selects one or more obfuscation control components, and each obfuscation control Each component contains a variety of different obfuscation algorithms, and the obfuscation functions implemented by different obfuscation control components are also different. The intermediate device selects at least one internal obfuscation algorithm to obfuscate the user URL request through the obfuscation control component, so as to obtain het...

Embodiment 3

[0058] On the basis of Embodiment 1 or Embodiment 2 above, the method further includes: the intermediate device receives the response of resending the new URL request fed back by the second server, and resends the new URL request to the second server according to the response.

[0059] It can be seen from the first to third embodiments above that the URL request transmission protection method provided by the embodiment of the present invention has the following advantages: (1) Combined with dynamic thinking, one or more obfuscation control components are dynamically selected to realize corresponding URL heterogeneity Effect. The dynamics of control component selection increases the uncertainty of URL request transmission factors and increases the attack difficulty for attackers. (2) Using heterogeneous ideas to confuse user URLs, increasing the difficulty for attackers to identify user URL requests. (3) The intermediate device increases the complexity of the user URL request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a URL request transmission protection method, an intermediate device, a server and a system. The method includes: the intermediate device receives the original URL request sent by the client, and confuses the original URL request according to a preset obfuscation strategy to obtain an obfuscated new URL request; the intermediate device transmits the original URL request to the first server, to form a fake access channel; and transmit the new URL request to the second server for processing the new URL request. The method also includes: receiving the original URL request sent by the intermediate device to form a fake access channel; receiving a new URL request sent by the intermediate device; if the new URL request is a single heterogeneous URL request, identifying its confusion algorithm, and removing Obfuscation, obtaining the original URL request and responding; if the new URL request is a set of URL requests, restoring it; performing multi-mode judgment on the restoration result and responding. The invention can confuse attackers and ensure the normal realization of URL requests.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a URL request transmission protection method, an intermediate device, a server and a system. Background technique [0002] In today's network environment, the Web service system, as an important service bearing and providing platform, is a virtual representative of the government, enterprises and individuals on the Internet, which brings together massive data resources, such as user information, enterprise data, financial finance, business secrets, The importance of intellectual property rights, customer order information, etc. is self-evident. Therefore, the Web server becomes the main attack target of network hackers. Network hackers use various channels, various attack tools, and various deceptive means to obtain the information they want. [0003] Generally, a user requests a service from a web server in the form of a URL. Therefore, the security of the URL is ext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/02H04L67/565H04L67/56
Inventor 张铮邬江兴刘浩刘镇武王立群李卫超
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products