Attack detection method based on Internet cross search defects
A cross-search and attack detection technology, applied in the field of Internet search, can solve problems such as poor security performance, poor reliability, and single detection means, and achieve the effect of efficiently restricting operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] Embodiment 1: An attack detection method based on Internet cross-search flaws, S1: Receive and execute widgets including metadata from a web server, analyze the widgets during the execution process, and determine to execute on the widgets based on the analysis results The first feature to be maintained at the time, and compare the data of the first feature with the feature contained in the second feature; S2: configured to detect when the data of the first feature and the data of the second feature are equal to Or a change greater than a predetermined value; the data of the first characteristic and the data of the second characteristic include at least one of the following: hypertext markup language HTML page, Java script, JS function call graph, so The external JS library item used; the widget or the cascading style sheet used by the widget; the HTML page includes the document object model tree of the HTML page; parsing the uniform resource locator URL of the widget and ...
Example Embodiment
[0037] Embodiment 2: This embodiment should be understood to include at least all the features of any one of the foregoing embodiments, and further improve on the basis of it. Specifically, an attack detection method based on Internet cross-search flaws includes the following steps: S1: Receive and execute the widget including metadata from the web server, analyze the widget during execution, determine the first feature to be maintained when the widget is executed based on the analysis result, and compare the data of the first feature with The second feature compares the features contained in the metadata; S2: configured to issue an alarm when a change equal to or greater than a predetermined value is detected between the data of the first feature and the data of the second feature; specifically, the cross is performed In the search process, there are often orphan pages implanted in the webpage. In this case, there are small windows floating on the surface of the webpage, so tha...
Example Embodiment
[0049] Embodiment 3: This embodiment should be understood as including at least all the features of any one of the foregoing embodiments, and further improvements are made on the basis of it. Specifically, this embodiment provides a product for executing Web programs, including: hardware storage devices , The computer executable program code is stored therein. The computer executable program code, when executed by the computer hardware system including the security system configured to test Web services, causes the computer hardware system to perform the following operations: The service performs static analysis; the security system performs static analysis on the Web service; during the static analysis, the seed instruction is located in the program code of the Web service, where the identity of the requester is determined by the Web service; during the static analysis, the seed is determined Whether the value in the instruction is selected among multiple paths branched in the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap