Web protection method based on URL self-learning

A self-learning and security protection technology, applied in the field of network security, can solve the problems of no security protection, doubtful effectiveness, low reading rate, etc., and achieve the effect of ensuring protection efficiency, ensuring effectiveness, and high reading rate

Pending Publication Date: 2020-06-05
西安交大捷普网络科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current URL self-learning is mostly reviewing the daytime traffic data at night when the user access traffic is less, and it is not synchronized with the security protection, and the self-learning results are delayed.
On the other hand, the current database storage of self-learning results has a low reading rate; and the result data has been accumulated for a long time, and the validity is doubtful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web protection method based on URL self-learning
  • Web protection method based on URL self-learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] URL self-learning is to summarize the normal model of the site protection object by learning the data information of the user's normal traffic to the protected site, and generate the corresponding whitelist policy, which is loaded into the whitelist rule engine to detect and protect abnormal traffic .

[0025] Such as figure 1 As shown, based on the URL self-learning Web protection method, URL self-learning and Web security protection are carried out simultaneously in real time, that is, to determine whether the requested URL exists in the memory database; if it exists, transfer the request to the Web server for response; It exists, loads and executes the self-learning strategy, and updates it to the memory database; at the same time, when the requested URL triggers the white list of the web protection, the corresponding preset action is executed.

[0026] Specifically, first configure the information of the site that needs security protection through the interface, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Web protection method based on URL self-learning, and the method comprises the steps: executing a corresponding preset action when a requested URL triggers a white list, carrying out the URL self-learning and Web safety protection synchronously in real time, and judging whether the requested URL exists in a memory database or not; if yes, transferring the request to a Webserver for response; and if not, loading and executing the self-learning strategy, and updating the self-learning strategy to the memory database. According to the method, URL self-learning and Web protection are synchronously carried out in real time, so that the real-time performance of a learning result is ensured. Learning results are stored in a memory database, the reading speed is high, and the protection efficiency is ensured. An effective period is set for a learning result, and data is cleared for re-learning after expiration, so that the effectiveness of the learning result is ensured, and the Web security protection efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a URL self-study-based Web protection method. Background technique [0002] According to survey statistics, most of the network attacks come from the application level rather than the network level, and more than half of the domestic sites have various security problems at the web level. Although most enterprises have deployed network security protection systems such as intrusion detection systems, network firewalls, and network antiviruses, many enterprises are still unable to cope with security threats from the Web application layer. [0003] Web Application Firewall is a security product that solves the security problems of Web applications. By means of security domain division and border isolation, a security barrier is strengthened between the client area and the server application system area. Through a series of security policy combinations, the maximum Protect t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0236H04L63/101H04L67/02
Inventor 南星倪宝珠刘亚轩何建锋陈宏伟
Owner 西安交大捷普网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products