Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Obfuscated script processing method and device

A processing method and script technology, applied in the computer field, can solve the problems of inability to accurately detect obfuscated scripts, low attack detection rate, etc., and achieve the effect of improving the attack detection rate

Active Publication Date: 2020-11-03
HILLSTONE NETWORKS CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for processing obfuscated scripts, to at least solve the problem of detecting obfuscated scripts in the prior art by extracting rules from obfuscated JAVA scripts, and the inability to accurately detect obfuscated scripts leads to a relatively low attack detection rate. low technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Obfuscated script processing method and device
  • Obfuscated script processing method and device
  • Obfuscated script processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to an embodiment of the present invention, an embodiment of a method for processing obfuscated scripts is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0027] figure 1 It is a flow chart of a method for processing obfuscated scripts according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0028] Step S102, extracting the traffic to be detected from the network traffic;

[0029] Step S104, identifying whether there is an obfuscation script in the traffic to be detected;

[0030] Step S106, if the recognition result is yes, then obtain the restored script by performing restoration ...

Embodiment 2

[0101]根据本发明实施例,还提供了一种用于实施上述混淆脚本的处理方法的装置实施例,图5是根据本发明实施例的一种混淆脚本的处理装置的结构示意图,如图5所示,上述混淆脚本的处理装置,包括:提取模块50、识别模块52、还原模块54和替换模块56,其中:

[0102]提取模块50,用于从网络流量中提取待检测流量;识别模块52,用于识别上述待检测流量中是否存在混淆脚本;还原模块54,用于若识别结果为是,则通过对上述混淆脚本进行还原处理得到还原脚本;替换模块56,用于将上述待检测流量中的上述混淆脚本替换为上述还原脚本。

[0103]在本发明实施例中,通过从网络流量中提取待检测流量;识别上述待检测流量中是否存在混淆脚本;若识别结果为是,则通过对上述混淆脚本进行还原处理得到还原脚本;将上述待检测流量中的上述混淆脚本替换为上述还原脚本,达到了准确检测出混淆脚本的目的,从而实现了提高攻击检出率的技术效果,进而解决了现有技术中通过对混淆后的JAVA脚本提取规则的方式检测混淆脚本,无法准确检测出混淆脚本导致攻击检出率较低的技术问题。

[0104]需要说明的是,上述各个模块是可以通过软件或硬件来实现的,例如,对于后者,可以通过以下方式实现:上述各个模块可以位于同一处理器中;或者,上述各个模块以任意组合的方式位于不同的处理器中。

[0105]此处需要说明的是,上述提取模块50、识别模块52、还原模块54和替换模块56对应于实施例1中的步骤S102至步骤S108,上述模块与对应的步骤所实现的实例和应用场景相同,但不限于上述实施例1所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在计算机终端中。

[0106]需要说明的是,本实施例的可选或优选实施方式可以参见实施例1中的相关描述,此处不再赘述。

[0107]上述的混淆脚本的处理装置还可以包括处理器和存储器,上述提取模块50、识别模块52、还原模块54和替换模块56等均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。

[0108]处理器中包含内核,由内核去存储器中调取相应的程序单元,上述内核可以设置一个或以上。存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和 / 或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。

[0109]根据本申...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an obfuscated script processing method and device. The method comprises the following steps: extracting to-be-detected traffic from network traffic; identifying whether an obfuscated script exists in the to-be-detected flow or not; if the identification result is yes, restoring the obfuscated script to obtain a restored script; and replacing the obfuscated script in the to-be-detected flow with the restored script. The technical problem that in the prior art, the confused scripts are detected in the mode of extracting rules from the confused JAVA scripts, the confused scripts cannot be accurately detected, and consequently the attack detection rate is low is solved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for processing obfuscated scripts. Background technique [0002] Taking HTTP traffic, which is a relatively large proportion of the current network traffic, as an example, there are relatively many attacks against this traffic. The Content-Type contained in HTTP traffic may contain JAVA scripts, and some Vulnerabilities can be attacked by these JAVA scripts. Currently, such attacks are generally detected by the intrusion detection module of the security device. The entire detection process includes traffic capture, traffic content extraction, content matching based on attack characteristics, and found after the attack. response. [0003] In order to evade intrusion detection, the attacker will obfuscate the JAVA script, mainly by adding redundant code, dynamically generating code, adding logic judgment, etc. The extracted attack features cannot be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36H04L29/06
CPCG06F11/3604H04L63/1416
Inventor 关营林蔡宗王镜清
Owner HILLSTONE NETWORKS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products