Executor construction method of mimicry WAF

A construction method and executive technology, applied in the field of network security, can solve problems such as inability to perceive uncertainty in advance, achieve diversity and redundancy, reduce manslaughter rate and missed kill rate, and balance isomorphic and heterogeneous structures Effect

Active Publication Date: 2021-02-19
ZHEJIANG UNIV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing WAF technology is mainly a passive defense mechanism, unable to perceive and recognize the danger of uncertainty in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Executor construction method of mimicry WAF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention focuses on the execution body construction in the mimic WAF, realizes the execution body construction of the mimic WAF through micro-container heterogeneity, database heterogeneity, and WAF interception rule heterogeneity, etc., by setting multiple candidate execution body sets and later dynamic The selection module satisfies the dynamics, majority and redundancy of mimic defense, making WAF have active defense capabilities. In the past, the ruling results of the single executive body structure will directly affect the action execution behavior of WAF, and there will be a large probability of false positives and manslaughter.

[0028] Such as figure 1 As shown, a method for constructing a mimetic WAF executive in the present invention includes operating system heterogeneity, database heterogeneity, WAF platform heterogeneity, and rule set heterogeneity, specifically including the following steps:

[0029] (1) Deploy M cloud servers E={e i |i=1,2,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an executor construction method of mimicry WAF. According to the method, construction of a WAF executor is completed by constructing executors in micro-containers of a heterogeneous operating system, a heterogeneous database, a heterogeneous WAF platform and a heterogeneous rule set which are distributed on different servers. According to the method, factors such as data redundancy and working efficiency are comprehensively considered, the internal gene attributes of the mimicry defense system are determined through isomerism of different layers, namely dynamics, randomness and diversity, the uncertainty of a WAF internal architecture on an executor layer is ensured, and the system vulnerability mining and attack difficulty of an attacker is greatly increased. Compared with an existing single WAF executor construction form, the passive defense situation that the current WAF defense is easy to attack and difficult to guard can be greatly improved, the risk of service paralysis caused by attack of Web applications is reduced, and the method can be widely applied to a mimicry WAF system.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method for constructing a mimetic WAF executive body. Background technique [0002] With the continuous development and popularization of the network, network applications are getting deeper and deeper into people's lives, but at the same time, the development of the network has also brought hidden dangers to network security. With the development and open source of vulnerability detection and scanning tools, the cost of network attacks has been reduced, and the entire Internet network security field has shown a trend of "easy to attack but difficult to defend". The cyber security space is in a dangerous situation due to the "unknown unknown" security threats based on unknown vulnerabilities or unknown attacks using unknown backdoors. [0003] Traditional firewalls are used to protect the information flow between servers. They mainly work on the third and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/1425H04L63/1466H04L67/02
Inventor 陈双喜吴春明曲振青王文海
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products