Unlock instant, AI-driven research and patent intelligence for your innovation.

A website access attack interception method and related components

A website access and access request technology, applied in the field of readable storage media and website access attack interception, can solve the problems of website secondary attack, normal website access and operation obstruction, high-frequency access error interception and blocking of normal business users, etc. Achieve the effect of optimizing user experience

Active Publication Date: 2022-04-26
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, the protection methods for website scanning and CC attacks are broad. After suffering scanning and CC attacks, the defense threshold can be adjusted (increased) in real time or the human-machine detection page can be pushed through the cloud protection to improve the protection, and the resulting misjudgment and interception Behaviors emerge in endlessly. For example, increasing the defense threshold midway may cause high-frequency access by normal business users to be blocked by mistake. At the same time, there are also phenomena that bypass these protection methods and directly conduct secondary attacks on the website, such as in the man-machine detection interface. After passing the whitelist, the bypass continues the second attack, which hinders the normal access and operation of the website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A website access attack interception method and related components
  • A website access attack interception method and related components
  • A website access attack interception method and related components

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The core of this application is to provide a website access attack interception method, which can improve the accuracy and efficiency of website protection while minimizing false interception; another core of this application is to provide a website access attack interception device, equipment and a Read storage media.

[0055]In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0056] In the existing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method for intercepting website access attacks. In this method, artificial verification is performed on the intercepted access requests in the man-machine detection of website access, to distinguish between tool attacks and human access, and to reduce false interception of human access; After being classified into the whitelist state, further anti-escape detection can prevent secondary attacks after the IP whitelist, and effectively improve the risks caused by simultaneous bypass of human attacks and tool attacks. It not only realizes the protection of website security access, but also can effectively improve While the accuracy and efficiency of website protection are maximized, false interception is minimized and user experience is optimized. The present application also provides a website access attack intercepting device, equipment and a readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the technical field of computer software, in particular to a website access attack interception method, device, equipment and a readable storage medium. Background technique [0002] Our country has entered the information age. While informatization brings us convenience, it also brings us troubles. [0003] A few days ago, after monitoring, it was discovered that CC (Challenge Collapsar) attacks against important websites in my country (CC attacks refer to attackers using proxy servers to generate legitimate requests to victim hosts to achieve DDOS (denial of service attacks) and camouflage) incidents are high. The attacker uses the public proxy server to initiate a large number of visits to the target website. The content of the visit includes non-existent pages, large website files, dynamic pages, etc., thereby bypassing the CDN nodes (also called edge nodes, cache nodes, etc.) configured by the website. Refers to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/0876H04L63/102H04L63/306H04L63/1425
Inventor 郭文玉范渊杨勃
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD