Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack detection method based on Internet cross search defects

A cross-search and attack detection technology, applied in the field of Internet search, can solve problems such as poor security performance, poor reliability, and single detection means, and achieve the effect of efficiently restricting operation

Pending Publication Date: 2020-07-28
HUAIHUA UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the common problems in the field such as difficult to find, single detection means, poor safety performance or poor reliability, etc., the present invention is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method based on Internet cross search defects
  • Attack detection method based on Internet cross search defects
  • Attack detection method based on Internet cross search defects

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1: An attack detection method based on Internet cross search flaws, S1: Receive and execute a widget including metadata from a web server, analyze the widget during execution, and determine based on the analysis result that the widget is executed The first feature to be maintained, and compare the data of the first feature with the features contained in the second feature metadata; S2: configured to be equal to when detected between the data of the first feature and the data of the second feature or a change greater than a predetermined value; the data of the first characteristic and the data of the second characteristic include at least one of the following items: hypertext markup language HTML pages, Java scripts, JS function call graphs, so An external JS library item used; a widget or a cascading style sheet used by the widget; the HTML page includes a document object model tree of the HTML page; parsing the uniform resource locator URL of the widget, and ...

Embodiment 2

[0037]Embodiment 2: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improvements are made on the basis of it. Specifically, an attack detection method based on Internet cross search defects includes the following steps: S1: Receive and execute a widget including metadata from a web server, analyze the widget during execution, determine a first feature to be maintained when the widget is executed based on the analysis result, and compare the data of the first feature with the The second feature compares the features contained in the metadata; S2: configured to issue an alarm when a change equal to or greater than a predetermined value is detected between the data of the first feature and the data of the second feature; specifically, when performing crossover During the search process, web pages often have orphan pages implanted. In this case, there are various small windows floating on the surface o...

Embodiment 3

[0049] Embodiment 3: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improvements are made on the basis thereof. Specifically, this embodiment provides a product for executing a Web program, including: a hardware storage device , having stored therein computer executable program code which, when executed by a computer hardware system comprising a security system configured to test a Web service, causes the computer hardware system to perform the following operations: The service performs static analysis; the security system performs static analysis on the web service; during the static analysis, locates seed instructions in the program code of the web service, where the identity of the requester is determined by the web service; during the static analysis, determines the seed Whether the value in the instruction selects between multiple paths branched in the program code is determinative; and the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack detection method based on Internet cross search defects. The method comprises the following steps: S1, receiving and executing a widget comprising metadata from a network server, analyzing the widget in an execution process, determining a first feature to be maintained when the widget is executed based on an analysis result, and comparing features contained in themetadata of the first feature data with a second feature; and S2, when a change equal to or greater than a predetermined value is detected between the first feature data and the second feature data, giving an alarm. A metadata file is associated with the widget, and the widget is provided in a state that the associated metadata file is included in the widget, so that the activity of the widget ismonitored, and illegal behaviors are prevented from stealing or tampering information.

Description

technical field [0001] The invention relates to the technical field of Internet search, in particular to an attack detection method based on Internet cross search defects. Background technique [0002] Because the test code is implanted in the target application program of the mobile device, the application program is greatly intruded. Since the implanted code may conflict with some logic in the target application program, the stability and compatibility of the test will also be reduced. . [0003] Such as CN101442412B prior art discloses a kind of attack early warning method based on software defect and network attack relationship mining, and the intrusion detection method based on attack mode can only detect the type of intrusion attack, but can not provide constructive software for software developers It is difficult to substantially improve software security quality due to defect patching opinions. Another typical prior art such as WO2012166440A2 discloses an orphan pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55
CPCG06F21/55G06F2221/2119
Inventor 李伟
Owner HUAIHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products