Website tamper-proofing method and device, storage medium and electronic device
An anti-tampering and website technology, applied in the field of network security, can solve the problem of inaccurate anti-tampering of files, etc., achieve the effect of solving inaccurate anti-tampering of files, improving efficiency and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] The method embodiment provided in Embodiment 1 of the present application may be executed in a server, a computer, a terminal or a similar computing device. Take running on a computer as an example, figure 1 It is a block diagram of the hardware structure of a website tamper-proof method applied to the server in the embodiment of the present invention. Such as figure 1 As shown, the computer may include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA) and memory 104 for storing data. Optionally, the above-mentioned server can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned computer. For example, the s...
Embodiment 2
[0055] In this embodiment, a website attack defense device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0056] Figure 4 is a structural block diagram of a website attack defense device according to an embodiment of the present invention, such as Figure 4 As shown, the device includes: a first monitoring module 402, configured to monitor operation events for website directory files; a first identification module 404, connected to the above-mentioned first monitoring module 402, configured to identify the operation process of the operation event...
Embodiment 3
[0064] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0065] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0066] S1, monitoring the operation event for the website directory file;
[0067] S2. Identify an operation process of the operation event;
[0068] S3, judging whether the operation process has the operation authority of the website directory file;
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


