Web intelligent defense method, device and equipment, and readable storage medium

A storage medium and intelligent technology, applied in the field of network security, can solve problems such as redundant work, increasing the load and workload of security engines, reducing defense efficiency, quality of service, network performance, etc.

Active Publication Date: 2019-04-02
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It should be noted that the existing defense system needs to compare each received request with the attack signature database, which undoubtedly increases the load and workload o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web intelligent defense method, device and equipment, and readable storage medium
  • Web intelligent defense method, device and equipment, and readable storage medium
  • Web intelligent defense method, device and equipment, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The embodiment of the invention discloses a web intelligent defense method, device, equipment and readable storage medium, so as to improve defense efficiency, normal service quality in the network and performance of the entire network.

[0044] see figure 1 , a web intelligent defense method provided by an embodiment of the present invention, comprising:

[0045] S101. Receive a request sent by the client;

[0046] S102. Determine whether the feature...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a web intelligent defense method, which comprises the steps of: determining whether features of a request are recorded in a data sheet in which attack information is recorded when receiving the request sent by a client; if so, determining whether a number of attacks of the request within preset first duration exceeds a preset threshold; and executing a preset defense rule when the number of attacks of the request within the preset first duration exceeds the preset threshold. The web intelligent defense method avoids the process of comparing each request with an attack feature library repeatedly, thereby reducing workload, improving the defense efficiency, and correspondingly improving the normal service quality in the network and the performance of the entire network. Correspondingly, a web intelligent defense device, web intelligent defense equipment and a readable storage medium disclosed by the invention further have the above technical effects.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically, relates to a web intelligent defense method, device, equipment and readable storage medium. Background technique [0002] Today network security has become an important issue affecting network performance. Attackers generally target the enterprise network, invade the enterprise's host through the network, steal or destroy important data, paralyze the enterprise network, and cause huge losses to the enterprise. [0003] In order to improve the security of the network, people usually filter the access requests with attack behavior through the defense system. Among them, the attack detection of the defense system is mainly realized through the attack signature database. The defense process of the existing defense system is: at the security engine, each request received is compared with the preset attack signature library to determine whether the request has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1441H04L67/02
Inventor 陈加群范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products