Unlock instant, AI-driven research and patent intelligence for your innovation.

A website intrusion detection method based on big data log analysis

An intrusion detection and big data technology, applied in the field of network security, can solve problems such as attacks, inability to intercept attacks, and impact on user usage, to reduce missed or false detections, accurate and comprehensive website intrusions, and reduce performance overhead.

Active Publication Date: 2020-07-10
重庆天蓬网络有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The biggest problem with this method is that all identifications are judged based on rules. However, with the development of computer networks and communication technologies, computer network security threats and security risks continue to increase, and attack methods are diversified, and many rules can be bypassed. As a result, WAF cannot intercept attacks accurately and timely
At the same time, a large number of normal users' normal requests may also contain these characteristic strings, resulting in the blocking of normal users' access and affecting the user's use to a certain extent.
[0004] Mainstream WAF products cannot identify unauthorized vulnerabilities, sensitive information leakage, crawler attacks, CC (Challenge Collapsar) attacks
[0005] WAF (website application-level intrusion prevention system) needs to be deployed to the upper layer of the application, and there is a certain performance overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A website intrusion detection method based on big data log analysis
  • A website intrusion detection method based on big data log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and therefore are only examples, rather than limiting the protection scope of the present invention.

[0032] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0033] Such as figure 1 Shown, shown is an embodiment according to the technical solution of the present invention, comprising the following steps:

[0034] S100, collecting web logs within a preset time period, and aggregating the collected web logs according to the visitor IP;

[0035] S200, matching the visitor's IP with the IP whitelist, and filtering out the IPs to be detected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a website intrusion detection method based on big data log analysis, and the method comprises the following steps: collecting web logs in a preset time period, and carrying out the aggregation of the web logs according to the IPs of visitors; matching the visitor IP with an IP white list, and screening out to-be-detected IPs which are not in the IP white list; analyzing aweb log corresponding to the to-be-detected IP, respectively calculating risk values of various request parameters by using a user-defined risk model, and comprehensively judging the danger level of the to-be-detected IP according to the calculated risk values; and when it is judged that the danger level of the to-be-detected IP reaches a specified level, judging the to-be-detected IP as a suspicious IP. According to the method, the IP of the visitor and the access request information of the visitor are integrated through the risk model, the intrusion risk values of the visitor are calculatedin multiple aspects, website intrusion is more accurate and comprehensive compared with a traditional WAF technology, and missing detection or false detection can be reduced; due to the fact that analysis is conducted through the web log, deployment to the upper layer of the application is not needed, the performance expenditure of the server is reduced, and various intrusion attack means can be recognized.

Description

technical field [0001] The invention relates to a website intrusion detection method based on big data log analysis, which belongs to the technical field of network security. Background technique [0002] At present, most websites use WAF (web application-level intrusion prevention system) technology to intercept. This technology mainly judges whether the information requested by the user contains some specific strings, or a specific URL address is accessed. Rule requests are directly blocked to ensure system security. [0003] The biggest problem with this method is that all identifications are judged based on rules. However, with the development of computer networks and communication technologies, computer network security threats and security risks continue to increase, and attack methods are diversified, and many rules can be bypassed. As a result, WAF cannot intercept attacks accurately and timely. At the same time, a large number of normal users' normal requests may ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈继安文立乾李英
Owner 重庆天蓬网络有限公司