Intelligent autonomous linkage type WEB application protection host

An intelligent, autonomous and application-protective technology, applied in electrical components, transmission systems, etc., can solve the problems of lag in prevention and manual disposal, intrusion, etc., and achieve the effect of reducing losses and workload.

Inactive Publication Date: 2020-03-27
湖南海得利网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the traditional WEB application protection hosts release the latest high-risk vulnerability, it is very likely that the vulnerability has been exploited by the attacker and caused harm before the staff noticed it. Similarly, when attacked by dDOS, due to If it cannot be discovered in time, it is likely to have been invaded. The process of SQL injection attack is that once the scanning program finds the possibility of injection, the attack program will start, and passive prevention and manual disposal are relatively lagging behind. Therefore, an improved method is urgently needed. technology to solve this problem existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent autonomous linkage type WEB application protection host
  • Intelligent autonomous linkage type WEB application protection host
  • Intelligent autonomous linkage type WEB application protection host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] An operating system official or a third-party security platform released the latest high-risk vulnerabilities. The key processes and services of this vulnerability are related to WEB applications. The general countermeasure is to download and install the corresponding patch after the corresponding patch is released. It is very likely that the vulnerability has been exploited by the attacker and the staff did not notice it. , has caused harm. After obtaining the latest vulnerability, the host analyzes the degree of correlation with the WEB application, that is, links with the disaster recovery equipment to back up key databases, webpage files, configuration files, log files, etc.

Embodiment 2

[0037] When a WEB application server is attacked by dDOS, the host will link the operating system to actively shut down unnecessary applications and service processes; related firewalls or routers will disable the ports of non-critical applications, etc., to reduce the attack surface and ensure the normal operation of the core main application with the maximum load capacity run.

Embodiment 3

[0039] The process of SQL injection attack is that once the scanning program finds the possibility of injection, the attack program will start, while passive defense and manual handling are relatively lagging behind. The host will regularly conduct tentative attacks on stock webpage files. Once found, it can be injected , that is, the linkage operating system restricts the page file from being accessed, alarms, and records logs, especially after the operating system global file system write operation is completed, the "black box test" is performed on the newly added page file. If the test fails, the page is restricted file access permissions.

[0040]Principle of use: The host hardware platform is based on the X86 structure. On the basis of the ordinary PC computer motherboard, the original CMOS chip is replaced with a burnable CMOS chip, and the necessary network card interface and auxiliary chip are added. The main idea of ​​​​the software platform is anthropomorphic Persona...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent autonomous linkage type WEB application protection host. The intelligent autonomous linkage type WEB application protection host comprises a shell, a power supply indicating lamp, an operation state indicating lamp, a power supply, a mainboard, a CMOS chip, a CPU, a PCI bus, a memory and a flash memory. A plurality of interfaces, a power supply indicating lamp and an operation state indicating lamp are arranged on the surface of the shell, a power supply is arranged at the rear end in the shell, a main board is further arranged in the shell, and a CMOS chip, a plurality of auxiliary chips, a CPU, a PCI bus, a memory and a flash memory are arranged on the main board; the auxiliary chip comprises an automatic backup chip, a port closing chip and a blackbox test chip; the interfaces comprise a power supply interface, an Ethernet interface, an MGT interface and a USB interface; the power supply interface is connected with a power supply, and the Ethernet interface, the MGT interface and the USB interface are all connected with the mainboard, so that the workload of maintenance personnel is reduced, necessary protection measures can be taken autonomously before harm occurs, core data is protected, and loss is reduced to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of linkage type WEB application protection host, in particular to an intelligent autonomous linkage type WEB application protection host. Background technique [0002] Most of the traditional WEB application protection hosts release the latest high-risk vulnerability, it is very likely that the vulnerability has been exploited by the attacker and caused harm before the staff noticed it. Similarly, when attacked by dDOS, due to If it cannot be discovered in time, it is likely to have been invaded. The process of SQL injection attack is that once the scanning program finds the possibility of injection, the attack program will start, and passive prevention and manual disposal are relatively lagging behind. Therefore, an improved method is urgently needed. technology to solve this problem existing in the prior art. Contents of the invention [0003] The purpose of the present invention is to provide an intell...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/1416H04L63/1433H04L63/1458H04L67/02
Inventor 屈海文谭曙光
Owner 湖南海得利网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products