URL virtualization dynamic defense method for automatic attacks

A dynamic defense and server technology, applied in the field of network security, can solve the problems of fixed defense direction and inability to effectively deal with hacker attack methods and methods, so as to increase the difficulty and cost of attacks, solve unknown attacks, and increase attack costs Effect

Inactive Publication Date: 2019-04-02
国网思极网安科技(北京)有限公司 +5
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are four defects in the above-mentioned network defense technology: First, the defense direction is fixed, and only the pre-configured defense points can be protected.
Therefore, the traditional network defense system cannot effectively deal with the increasing means and methods of hacker attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • URL virtualization dynamic defense method for automatic attacks
  • URL virtualization dynamic defense method for automatic attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Such as figure 1 , 2 As shown, the present invention provides a URL virtualization dynamic defense method against automated attacks. Network defense is an important content in the field of computer security. The specific content includes two steps: the client request processing step and the server response processing step.

[0017] Now suppose a client requests a certain website, and the server sends a normal access response message:

[0018] HTTP / 1.1 200 OK

[0019] Date: Sat, 31Dec 2005 23:59:59GMT

[0020] Content-Type: text / html; charset=ISO-8859-1

[0021] Content-Length: 122

[0022]

[0023]

[0024] Wrox Homepage

[0025]

[0026]

[0027]

[0028]

[0029]

[0030] 1. Client request processing steps Process the http request sent by the client to the server. This step is achieved through the following sub-steps:

[0031] 1. The server obtains URL information;

[0032] When there is a URL in the HTTP request, the URL appears in the HTTP re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a URL virtualization dynamic defense method for automatic attacks, which realizes the dynamic change of URL virtualization and thus solves the problems of unknown attacks and unknown threats in the network. The method comprises a client request processing step and a server response processing step which respectively process an HTTP message received from a client and an HTTPmessage transmitted from a server to the client. Under the premise of functional equivalence, URLs are enabled to dynamically change in a defender controllable manner and manifested to be dynamicallychanging targets which are difficult to be observed and predicted for attackers, thereby increasing the difficulty and cost of attacks against unknown vulnerabilities and backdoors.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to the field of mimic gateways, and relates to a URL virtualization dynamic defense method against automatic attacks. Background technique [0002] Traditional network defense technologies mainly include firewalls, authentication technologies, access control, virus prevention, intrusion detection, vulnerability scanning, and information encryption technologies. Most of these security defense technologies are passive defenses. Although they provide powerful protection for network information security, their inherent defects also restrict their role in today's network security construction. [0003] There are four defects in the above-mentioned network defense technology: First, the defense direction is fixed, and only the pre-configured defense points can be protected. Traditional defense mostly adopts the method of manual configuration, which is designed for the existing p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 许勇刚林亮成吴春明陈双喜黄一达孙歆李沁园
Owner 国网思极网安科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products