Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for automatically detecting running state of web threat recognition defense system

A defense system and operating state technology, applied in transmission systems, electrical components, etc.

Active Publication Date: 2020-08-11
BEIJING SHU AN XINYUN TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The present invention aims to solve the problems described above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically detecting running state of web threat recognition defense system
  • Method and device for automatically detecting running state of web threat recognition defense system
  • Method and device for automatically detecting running state of web threat recognition defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0037] figure 1 It exemplarily shows a schematic flow chart of the method for automatically detecting the running status of the web threat identification and defense ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for automatically detecting the running state of a web threat recognition defense system. The method comprises the steps of: simulating original web attacks and / or normal access log data generated when a user attacks and / or normally accesses a web server; obtaining processing results of data statistics, data analysis and threat identification of the original web attack and / or normal access log data by the web threat identification defense system; determining whether the web threat identification defense system is in a normal operation state based onthe processing result; by simulating user access behavior logs (normal and abnormal), monitoring the running condition of the web threat recognition defense system, so that the performance is not affected by the number of logs, online running is achieved, and universality is achieved.

Description

technical field [0001] The invention relates to the field of computer network protection and state detection, in particular to a method and device for automatically detecting the running state of a web threat identification and defense system. Background technique [0002] The web threat identification and defense system is different from the traditional web firewall system. Its main function is to analyze different access behaviors of users, and then conduct in-depth identification of possible access threats. [0003] Since the online business of the customer website using the web threat identification and defense system is different, when the web threat identification and defense system goes online, the types of threats identified will also be different, and it is difficult to detect web threat identification in a universal way Whether the defense system is normal online analysis and identification of web attacks, and it is also difficult to detect whether each component o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416H04L63/1441H04L63/1408
Inventor 刘兴霞李圣佳丛磊
Owner BEIJING SHU AN XINYUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products