Mimicry Web gateway system and mimicry Web gateway method for carrying out dynamic scheduling by adopting random selection

A technology of random selection and dynamic scheduling, applied in the computer field to reduce risks and losses, and increase the difficulty of attacks

Active Publication Date: 2019-08-23
HANGZHOU DIANZI UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different system designs or implementations often make systems with similar functions have completely different characteristics. For example, different Web application service software has its own strengths and weaknesses in terms of stability, security, and static file processing; different operating systems have different advantages and disadvantages. Defects, such as the system privilege escalation vulnerability CVE-2014-6324 only exists on Windows systems, while Linux systems do not exist at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry Web gateway system and mimicry Web gateway method for carrying out dynamic scheduling by adopting random selection
  • Mimicry Web gateway system and mimicry Web gateway method for carrying out dynamic scheduling by adopting random selection
  • Mimicry Web gateway system and mimicry Web gateway method for carrying out dynamic scheduling by adopting random selection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Embodiment 1: User HTTP request generates HTTP sub-request (user HTTP request contains security Cookie)

[0066] The client sends a user HTTP request to the web gateway, and the content of the request is as follows:

[0067] GET / test HTTP / 1.1

[0068] Host:acm.hdu.edu.cn

[0069] Upgrade-Insecure-Requests: 1

[0070]  …

[0071] Cookie: UID=69mti5j53m9qh1

[0072] The multi-mode distribution module in the web gateway receives the user's HTTP request, analyzes and judges the type of the user's HTTP request, and extracts the URL address and the security cookie carried in the user's HTTP request. Since there is a secure cookie, the secure cookie flag contained in the user HTTP request is set to true, and the secure cookie database is retrieved to determine whether the secure cookie is safe and legal. If it is legal, it is judged whether the request type is POST. Since the user HTTP request type is GET, multiple HTTP subrequests are generated according to the informat...

Embodiment 2

[0096] Embodiment 2, user HTTP request generates HTTP sub-request (user HTTP request does not include security Cookie):

[0097] The client sends a user HTTP request to the web gateway, and the content of the request is as follows:

[0098] GET / test HTTP / 1.1

[0099] Host:acm.hdu.edu.cn

[0100] Upgrade-Insecure-Requests: 1

[0101]  …

[0102] The multi-mode distribution module in the web gateway receives the user's HTTP request, analyzes and judges the type of the user's HTTP request, and extracts the URL address and the security cookie carried in the user's HTTP request. Since there is no secure cookie, the flag that the user's HTTP request contains a secure cookie is set to false. Determine whether the request type is POST. Since the user’s HTTP request type is GET, multiple HTTP sub-requests are generated according to the information contained in the HTTP request header and the security configuration policy (HTTP request header generation related parameters), and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mimicry Web gateway system and a mimicry Web gateway method for carrying out dynamic scheduling by adopting random selection. The system comprises a system module distribution module, a multimode judgment module, a security Cookie generation module, a security Cookie decoding module, a heterogeneous server pool group, a background server dynamic switching module group, adatabase synchronization module, a security Cookie database group and a security configuration strategy. According to the invention, heterogeneous integration is carried out on the server, dynamic switching of the executor group is realized by utilizing a random selection technology, and a mimic Web gateway system is realized through Cookie mapping. According to the Web gateway based on dynamic heterogeneous redundancy, the background executor is dynamically switched by utilizing the dynamic scheduling and heterogeneous redundancy technology, the risk and loss of attacking a website system arereduced, the attack behavior can be more accurately judged, and countermeasures are taken in time.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a mimetic Web gateway system and method for dynamic scheduling by random selection. Background technique [0002] As an important platform for carrying and providing services, the Web application server system faces increasingly serious security problems. Existing defense technologies are mainly based on known attack methods or vulnerability information, which makes it difficult to deal with the threat of unknown attacks well, making it difficult to comprehensively protect the security of the web application server system and block the current increasingly diverse types of network attacks. [0003] Although there are many types and means of cyber attacks, they usually depend on the specific properties of specific systems. Different system designs or implementations often make systems with similar functions have completely different characteristics. For example, dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/66H04L29/08
CPCH04L12/66H04L63/1441H04L67/02
Inventor 葛至达郑秋华潘莉莉吴铤吴天宏仇建胡伟通赵璐孙鹏飞胡若辰崔婷婷曾英佩
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products