A refined security protection system and method and its application
A security protection and fine-grained technology, applied in the field of network security, can solve problems such as affecting efficiency, inaccurate data packet analysis, and difficulty in preventing vulnerability attacks, and achieve the effects of improving efficiency, preventing website intrusion, and preventing web channel leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] Example 1: open worm, hang horse block.
[0072] as Figure 4 As shown, the use of the present invention to open the worm, hanging horse blocking, open two-way protection, the system on the worm, web page hanging horse, SQL injection and other protection capabilities greatly enhanced, on the one hand greatly reduced the false alarm rate, on the other hand also put an end to the risk of data leakage; It alleviates the risk of web page tampering / web page hanging, reduces the risk of user data leakage, and reduces the false positive rate.
Embodiment 2
[0073] Example 2: Database protection.
[0074] Website data security protection, there are three main aspects to consider: on the one hand, to prevent tug-of-library attacks, tug-of-the-library attacks refer to attackers using the vulnerabilities of the website to attack the website, so as to obtain the database of the website. On the one hand, the credential stuffing attack, which refers to the hacker using the account password in the database leaked by other websites, using many users to have the same account password on multiple websites, making batch attempts, and finally getting the permission of the registered user of the website. On the one hand, sensitive information leakage protection, there may be some vulnerabilities in the website to obtain sensitive information. The refined security protection system of the present invention based on web application identification can play a better protection effect against the above attacks.
Embodiment 3
[0075] Example 3: relying on the platform's emergency response plan.
[0076] First, emergency event detection: detect firewall logs, system logs, Web server logs, Web fine protection logs, suspicious users, and administrator reports;
[0077] Second, the initial response: preliminary determination of the type of event, definition of event level; Preparation of relevant resources; Obtaining management support for the handling of emergencies; Formation of incident handling teams; Develop a security incident response strategy.
[0078] Third, event grading: deciding what is most important; Prioritizing emergencies and using resources more efficiently; Not every emergency needs to be treated equally.
[0079] The specific embodiments of the present invention in the emergency response scheme are as follows:
[0080] Investigation: First of all, the cause analysis of the incident, the investigation of the evidence of the incident, the system backdoor check, the vulnerability analysis, t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com