Internet analysis system

An analysis system and Internet technology, applied in the field of Internet analysis systems, can solve problems such as poor security performance, difficulty in detection, single detection means, etc., and achieve the effect of efficiently restricting operation

Pending Publication Date: 2020-08-14
李伟
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the common problems in the field such as difficult to find, single detection means, poor safety performance or poor reliability, etc., the present invention is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet analysis system
  • Internet analysis system
  • Internet analysis system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1: An Internet analysis system, comprising: a receiving module configured to receive a widget including metadata from a web server; an analysis module configured to execute the widget including metadata, in analyzing the widget during execution, determining a first characteristic to be maintained when the widget executes based on the analysis results, and comparing the first characteristic data with the second characteristic contained in the metadata; an alert module, which is constructed is configured to issue an alarm when a change equal to or greater than a predetermined value is detected between the first characteristic data and the second characteristic data. The data of the first characteristic and the data of the second characteristic include at least one of the following items: hypertext markup language HTML pages, Java scripts, JS function call graphs, external JS library items used; widgets or A cascading style sheet used by the widget; the HTML pag...

Embodiment 2

[0034]Embodiment 2: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improvement on the basis thereof, specifically, an Internet analysis system, including: a receiving module, which is configured to The web server receives the widget including the metadata; an analysis module configured to execute the widget including the metadata, analyze the widget during execution, and determine based on the analysis results to maintain the widget when the widget executes The first feature of the first feature, and compare the first feature data with the second feature feature included in the metadata; an alarm module, which is configured to detect between the first feature data and the second feature data equal to or greater than a predetermined Alert when the value changes. Specifically, in the process of cross-searching, web pages often have orphan page implants. In this case, there are various small windows...

Embodiment 3

[0046] Embodiment 3: This embodiment should be understood as at least including all the features of any one of the foregoing embodiments, and further improvements are made on the basis thereof. Specifically, the system of this embodiment includes a product that executes a Web program, including: hardware A storage device having stored therein computer executable program code that, when executed by a computer hardware system including a security system configured to test a web service, causes the computer hardware system to perform the following operations: performing static analysis on the web service; performing the static analysis on the web service by the security system; during the static analysis, locating seed instructions in the program code of the web service, wherein the identity of the requester is determined by the web service; during the static analysis, determining whether the value in the seed instruction selects between a plurality of paths for branching in the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an Internet analysis system. The system comprises a reception module configured to receive widgets including metadata from a network server; an analysis module configured to execute the widget including the metadata, analyze the widget during execution, determine a first feature to be maintained when the widget is executed based on an analysis result, and compare thefirst feature data with a second feature to compare features included in the metadata; and an alarm module configured to emit an alarm when a change equal to or greater than a predetermined value isdetected between the first feature data and the second feature data. According to the system, the metadata file is associated with the widget, and the widget is provided in the state that the associated metadata file is included in the widget, so that the activity of the widget is monitored, and illegal behaviors are prevented from embezzling or tampering information.

Description

technical field [0001] The invention relates to the technical field of Internet search, in particular to an Internet analysis system. Background technique [0002] Because the test code is implanted in the target application program of the mobile device, the application program is greatly intruded. Since the implanted code may conflict with some logic in the target application program, the stability and compatibility of the test will also be reduced. . [0003] Such as CN101442412B prior art discloses a kind of attack early warning method based on software defect and network attack relationship mining, and the intrusion detection method based on attack mode can only detect the type of intrusion attack, but can not provide constructive software for software developers It is difficult to substantially improve software security quality due to defect patching opinions. Another typical prior art such as WO2012166440A2 discloses an orphan page implantation attack detection metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 李伟
Owner 李伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products