Safety protection method and device and storage medium

A security protection and memory technology, applied in the security field, can solve the problems of unsatisfactory interception of dangerous traffic, missed interception or wrong interception, etc.

Active Publication Date: 2021-03-05
ALIBABA GRP HLDG LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this method is not ideal for intercepting danger...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and device and storage medium
  • Safety protection method and device and storage medium
  • Safety protection method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0034] In the prior art, a whitelist or a blacklist is usually used for security protection, but the problem of wrong blocking or missing blocking often occurs. In order to at least partially solve the aforementioned problems existing in the prior art, in some embodiments of the present application: the first connection request initiated to the target...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety protection method and device and a storage medium. The method comprises the steps that if a first connection request initiated to a target server sideis monitored, the first connection request is released, and the first connection request is from a target request side; determining whether the target request end performs login authentication with the target server end or not in the first connection process; and if the target request end does not perform login authentication with the target server end, intercepting a subsequent connection request initiated by the target request end to the target server end. Therefore, the first connection request initiated to the target server is regarded as the suspicious traffic, the first release strategyis adopted for the suspicious traffic, and whether the suspicious traffic can be trusted is judged based on whether the suspicious traffic and the target server are subjected to login authenticationor not, so that subsequent access control can be performed on the suspicious traffic according to the judgment result; therefore, the missed blocking rate and the wrong blocking rate are reduced, theattack surface is reduced, and the security of the communication process is improved.

Description

technical field [0001] The present application relates to the field of security technologies, in particular to a security protection method, device and storage medium. Background technique [0002] With the continuous development of cloud computing technology, more and more enterprise users or individual users choose cloud computing resources to reduce service costs, which can also effectively improve service quality. [0003] Users can realize various services based on cloud computing resources. At present, in order to ensure the security of these services, a whitelist or blacklist is usually used to intercept dangerous traffic directed at these services. For example, the traffic in the whitelist is allowed, while the traffic not in the whitelist is blocked; or, the traffic in the blacklist is blocked, and the traffic not in the blacklist is allowed. [0004] However, this method is not ideal for intercepting dangerous traffic, and problems such as missing or wrong blocki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/101H04L63/1416H04L63/1441
Inventor 万朝新
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products