Unlock instant, AI-driven research and patent intelligence for your innovation.

Webpage tampering identification method and system based on neural network clustering

A webpage tampering and neural network technology, which is applied in the field of webpage tampering recognition method and system based on neural network clustering, can solve the problems of webpage response speed reduction, reduced webpage user experience, and multiple memory resources, so as to prevent illegal tampering, Improve the effect of user experience

Pending Publication Date: 2020-11-17
CHINA MOBILE GRP GUANGDONG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has been found in practice that the above-mentioned method of preventing webpages from being tampered with cannot prevent malicious attacks on webpages, and takes up more memory resources, resulting in a decrease in the response speed of webpages, thereby reducing the user experience of webpages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage tampering identification method and system based on neural network clustering
  • Webpage tampering identification method and system based on neural network clustering
  • Webpage tampering identification method and system based on neural network clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] See figure 1 , figure 1 Is a flow diagram tampering recognition neural network clustering of web page based on one embodiment of the disclosed embodiment of the present invention. like figure 1 As shown in the page-based neural network clustering tampering recognition method may include the following steps:

[0063] 101, page operation request received feature analysis to determine whether the operation request for the web page security threats instruction, if yes, step 102 is performed; if not, step 103 to step 104.

[0064] Embodiments of the present invention, an embodiment may perform any one or more of the steps performed by the service device (cloud server or the like), which, not limited in embodiments of the present invention. Page operation request any page can be running an application process is input, and the input operation of the page request may also correspond to a user in any page, the user may be a normal user of the website, it may be a web page of malici...

Embodiment 2

[0079] See figure 2 , figure 2 It is a flow diagram of another method for identifying tampering pages based on neural network clustering embodiments disclosed embodiment of the present invention. like figure 2 As shown in the page-based neural network clustering tampering recognition method may include the following steps:

[0080] 201, page operation request received feature analysis to determine whether the operation request for the web page security threats instruction, if yes, step 202 is performed; if not, step 203 to step 204.

[0081] 202, pages security threats determine the page corresponding to the command type of security threat, and blocking of the web page according to a security threat to security threats instruction block corresponding to the type of embodiment.

[0082] 203, the operation of the page request validity detection.

[0083] 204, the user determines whether the operation request input page for legitimate users, and if so, step 206 is performed; if not, ...

Embodiment 3

[0114] See image 3 , image 3 Is a block diagram of an embodiment of the disclosed embodiment of the present invention is tampered page identification system based on neural network clustering. like image 3 As shown in, tampering with the page identification system based on neural network clustering can include:

[0115] Determination unit 301, a web page for the received operation request feature analysis, determines whether the operation request for the web page security threat instruction.

[0116] Determination unit 302, a determination unit 301 the determination result is YES, it is determined security threats web page corresponding to the command type of security threats, security threats and instructions on the page according to the page block corresponding to the type of security threat blocking manner.

[0117] Embodiment of the invention, the web security threat types include at least: the type of database injection, cross-site scripting type, the type of web scripts and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a webpage tampering recognition method and system based on neural network clustering, and the method comprises the following steps: carrying out the feature analysis of a received webpage operation request, and judging whether the webpage operation request is a webpage security threat instruction or not; if so, determining a webpage security threat type corresponding to thewebpage security threat instruction, and blocking the webpage security threat instruction according to a blocking mode corresponding to the webpage security threat type; if not, conducting olegalitydetection on the webpage operation request; and when the legality detection is not passed, blocking the webpage operation request. Visibly, by implementing the embodiment of the invention, the security of the received webpage operation instruction for the webpage can be detected, and if any one detection result for the webpage operation instruction does not pass, the webpage operation instructioncan be blocked, so that the webpage operation instruction is prevented from being damaged. Therefore, malicious attacks of the webpage are protected in advance, the webpage is prevented from being illegally tampered, and the user experience of the webpage is improved.

Description

Technical field [0001] The present invention belongs to the technical field of network security, particularly to a web-based neural network clustering tampering recognition method and system. Background technique [0002] With the development of network and information technology, and widespread use of the Internet is having a profound impact on the way people live and work. At the same time, the Internet based on the importance of information security is also rising. Currently, the Web page falsification security issues become a problem of great concern to various sites, some of the attacks may have tampered with the page content, affecting the normal operation of the web page and the user's data security. [0003] The prior art is usually to prevent the page being tampered, i.e., after the page has been tampered with, the page read the backup files stored in advance, and the backup files to recover the page, the page is to avoid tampering with the mechanism-based compensation a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/64G06K9/62G06F21/56
CPCH04L63/123H04L63/08G06F21/64H04L63/1441G06F21/566G06F18/23
Inventor 李翔宇刘福生潘叶
Owner CHINA MOBILE GRP GUANGDONG CO LTD