Attack detection method based on Internet cross search defects

A cross-search and attack detection technology, applied in the field of Internet search, can solve problems such as poor security performance, poor reliability, and single detection means, and achieve the effect of efficiently restricting operation

Pending Publication Date: 2020-07-28
HUAIHUA UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the common problems in the field such as difficult to find, single de

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method based on Internet cross search defects
  • Attack detection method based on Internet cross search defects
  • Attack detection method based on Internet cross search defects

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Embodiment 1: An attack detection method based on Internet cross-search flaws, S1: Receive and execute widgets including metadata from a web server, analyze the widgets during the execution process, and determine to execute on the widgets based on the analysis results The first feature to be maintained at the time, and compare the data of the first feature with the feature contained in the second feature; S2: configured to detect when the data of the first feature and the data of the second feature are equal to Or a change greater than a predetermined value; the data of the first characteristic and the data of the second characteristic include at least one of the following: hypertext markup language HTML page, Java script, JS function call graph, so The external JS library item used; the widget or the cascading style sheet used by the widget; the HTML page includes the document object model tree of the HTML page; parsing the uniform resource locator URL of the widget and ...

Example Embodiment

[0037] Embodiment 2: This embodiment should be understood to include at least all the features of any one of the foregoing embodiments, and further improve on the basis of it. Specifically, an attack detection method based on Internet cross-search flaws includes the following steps: S1: Receive and execute the widget including metadata from the web server, analyze the widget during execution, determine the first feature to be maintained when the widget is executed based on the analysis result, and compare the data of the first feature with The second feature compares the features contained in the metadata; S2: configured to issue an alarm when a change equal to or greater than a predetermined value is detected between the data of the first feature and the data of the second feature; specifically, the cross is performed In the search process, there are often orphan pages implanted in the webpage. In this case, there are small windows floating on the surface of the webpage, so tha...

Example Embodiment

[0049] Embodiment 3: This embodiment should be understood as including at least all the features of any one of the foregoing embodiments, and further improvements are made on the basis of it. Specifically, this embodiment provides a product for executing Web programs, including: hardware storage devices , The computer executable program code is stored therein. The computer executable program code, when executed by the computer hardware system including the security system configured to test Web services, causes the computer hardware system to perform the following operations: The service performs static analysis; the security system performs static analysis on the Web service; during the static analysis, the seed instruction is located in the program code of the Web service, where the identity of the requester is determined by the Web service; during the static analysis, the seed is determined Whether the value in the instruction is selected among multiple paths branched in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack detection method based on Internet cross search defects. The method comprises the following steps: S1, receiving and executing a widget comprising metadata from a network server, analyzing the widget in an execution process, determining a first feature to be maintained when the widget is executed based on an analysis result, and comparing features contained in themetadata of the first feature data with a second feature; and S2, when a change equal to or greater than a predetermined value is detected between the first feature data and the second feature data, giving an alarm. A metadata file is associated with the widget, and the widget is provided in a state that the associated metadata file is included in the widget, so that the activity of the widget ismonitored, and illegal behaviors are prevented from stealing or tampering information.

Description

technical field [0001] The invention relates to the technical field of Internet search, in particular to an attack detection method based on Internet cross search defects. Background technique [0002] Because the test code is implanted in the target application program of the mobile device, the application program is greatly intruded. Since the implanted code may conflict with some logic in the target application program, the stability and compatibility of the test will also be reduced. . [0003] Such as CN101442412B prior art discloses a kind of attack early warning method based on software defect and network attack relationship mining, and the intrusion detection method based on attack mode can only detect the type of intrusion attack, but can not provide constructive software for software developers It is difficult to substantially improve software security quality due to defect patching opinions. Another typical prior art such as WO2012166440A2 discloses an orphan pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/55G06F2221/2119
Inventor 李伟
Owner HUAIHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products