Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A refined security protection system and method and its application

A security protection and fine-grained technology, applied in the field of network security, can solve problems such as affecting efficiency, inaccurate data packet analysis, and difficulty in preventing vulnerability attacks, and achieve the effects of improving efficiency, preventing website intrusion, and preventing web channel leakage

Active Publication Date: 2022-06-07
STATE GRID CORP OF CHINA +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] To sum up, the problems existing in the existing technology are: (1) The complexity of the network makes network management and control difficult, the network management and control based on traditional IP and ports has failed, the processing performance of the existing security protection mode is low, and application vulnerability attacks make prevention difficult
(2) Packet analysis is inaccurate and inefficient
(3) Too long strings of complex filters or application signatures will affect the efficiency of actual analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A refined security protection system and method and its application
  • A refined security protection system and method and its application
  • A refined security protection system and method and its application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Example 1: open worm, hang horse block.

[0072] as Figure 4 As shown, the use of the present invention to open the worm, hanging horse blocking, open two-way protection, the system on the worm, web page hanging horse, SQL injection and other protection capabilities greatly enhanced, on the one hand greatly reduced the false alarm rate, on the other hand also put an end to the risk of data leakage; It alleviates the risk of web page tampering / web page hanging, reduces the risk of user data leakage, and reduces the false positive rate.

Embodiment 2

[0073] Example 2: Database protection.

[0074] Website data security protection, there are three main aspects to consider: on the one hand, to prevent tug-of-library attacks, tug-of-the-library attacks refer to attackers using the vulnerabilities of the website to attack the website, so as to obtain the database of the website. On the one hand, the credential stuffing attack, which refers to the hacker using the account password in the database leaked by other websites, using many users to have the same account password on multiple websites, making batch attempts, and finally getting the permission of the registered user of the website. On the one hand, sensitive information leakage protection, there may be some vulnerabilities in the website to obtain sensitive information. The refined security protection system of the present invention based on web application identification can play a better protection effect against the above attacks.

Embodiment 3

[0075] Example 3: relying on the platform's emergency response plan.

[0076] First, emergency event detection: detect firewall logs, system logs, Web server logs, Web fine protection logs, suspicious users, and administrator reports;

[0077] Second, the initial response: preliminary determination of the type of event, definition of event level; Preparation of relevant resources; Obtaining management support for the handling of emergencies; Formation of incident handling teams; Develop a security incident response strategy.

[0078] Third, event grading: deciding what is most important; Prioritizing emergencies and using resources more efficiently; Not every emergency needs to be treated equally.

[0079] The specific embodiments of the present invention in the emergency response scheme are as follows:

[0080] Investigation: First of all, the cause analysis of the incident, the investigation of the evidence of the incident, the system backdoor check, the vulnerability analysis, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a refined security protection system and method and its application. The system includes: a protocol engine and an application filtering module, a WEB authentication and domain control authentication module, a statistical report and a policy management module. Through the intelligent application identification technology, the present invention can quickly and accurately identify the real application used through the dynamic port or the intelligent tunnel; can realize identity identification without disturbing, and enhance the flexibility, security and accuracy of user access verification; Using the intranet application asset risk identification method, through formulating strategies, discover vulnerable assets on the intranet and perform risk assessment and early warning to achieve two-way security and two-way guarantee.

Description

Technical field [0001] The present invention relates to the field of network security technology, more particularly, to a refined security protection system and method based on web application identification and application thereof. Background [0002] At present, the commonly used existing technology in the industry is like this: the existing grid firewall can only filter network traffic statically, based on ports or protocols, and the current situation of a large number of application ports (such as 80 ports are no longer exclusive HTTP, but can be used by P2P) is helpless, and it is impossible to achieve precise control, for example, the policy of allowing access to port 80 is likely to allow P2P to pass, and even let hackers use this vulnerability to launch network attacks. If you directly disable port 80, it will affect the web application, resulting in normal web page access can not be carried out. Similarly, traffic control and management have also reached the management g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/0227H04L63/0823H04L63/08H04L63/1416H04L63/1408H04L63/20H04L67/02
Inventor 孟浩华金波贺欣肖冬玲袁慧董亮邓国如马俊平何涛丁剑锋曾晓洪
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products