Network traffic safety monitoring method and device, electronic equipment and storage medium

A technology for security monitoring and network traffic, applied in electrical components, transmission systems, etc., can solve the problem of WAF being unable to achieve bypass, unable to meet user needs, etc., to achieve security protection functions, meet user needs, and increase sales. Effect

Active Publication Date: 2020-03-06
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] During the research, the inventor found that because the WAF in the reverse proxy mode can achieve load balancing, some WAF manufacturers produce this type of WAF. When this type of WAF is sold to users, due to various reasons, the user's current or For a period of time, I do not want to change its existing network topology and want to realize the security protection function of WAF. Therefore, a bypass solution is required. However, WAF in reverse proxy mode is added on the reverse proxy server. Installing rules and execution modules, combined with the above working principles, it can be seen that WAF in reverse proxy mode cannot achieve bypassing, so it cannot meet the needs of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network traffic safety monitoring method and device, electronic equipment and storage medium
  • Network traffic safety monitoring method and device, electronic equipment and storage medium
  • Network traffic safety monitoring method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0041] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] In the existing technology, in some cases, users do not want to change their existing network topology, but also want to realize the security protection function of WAF. Therefore, it is necessary to adopt a bypass solution. However, WAF in reverse proxy mode is in The rules and execution modules are installed on the reverse proxy server. Due to the limitation of the reverse proxy technology itself and the three-way handshake mechanism during communication, the WAF in the reverse proxy mode cannot achieve bypas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a network traffic security monitoring method and device, electronic equipment and a storage medium, relates to the technical field of computer information security, and is used for realizing bypass security monitoring by using a WAF (Wireless Application Function) in a reverse proxy mode under the condition of not changing the existing network topology structure of a user. The network flow safety monitoring method is used in a network in which a client is connected with a to-be-protected first server. The network comprises a WAF in a reverse proxy mode. The output end of the WAF is connected with an http server which returns fixed content to any request, the WAF is set to protect the http server, and the method comprises the following steps: acquiring an http request in the traffic of accessing the first server by the client; sending the http request to the WAF; and detecting whether the WAF gives an alarm to the http request or not so as to realize network flow security monitoring.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a network traffic security monitoring method, device, electronic equipment and storage medium. Background technique [0002] WAF (Web Application Firewall, Web Application Protection System) is a product that provides protection for Web (network) applications by implementing a series of security policies for HTTP / HTTPS (Hypertext Transfer Protocol). As the content and applications of the Web become more and more abundant, and the amount of information and value increases, the incidents and frequency of Web intrusion and tampering are gradually increasing. This requires a dedicated web firewall or protection system to maintain the security of the website. [0003] According to the different working methods and principles of WAF, its working modes usually include transparent proxy mode, reverse proxy mode and routing proxy mode. Compared with the other two mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/0281H04L63/02H04L67/02
Inventor 关墨辰李林哲王小丰肖新光
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products