Firewall system based on RASP
A firewall and intrusion prevention technology, which is applied in the field of RASP-based firewall systems, can solve the problems of attacking target sites, being unable to capture characteristic keywords, being attacked, etc., and achieve strong protection, high vulnerability processing efficiency, and improved security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] RASP-based firewall system, including:
[0025] The rule setting module, the rule setting module includes the required interception rule unit and the underlying interception rule unit; the required interception unit is used to establish the rules to be intercepted, and the rules include the name of the rule to be intercepted, the content of the intercepted data packet and the parameters of the execution data, and the Component interception hook rules;
[0026] The bottom-level interception rule unit, the ultimate purpose of attacking through vulnerabilities is mainly to obtain server permissions, and ultimately need to execute a certain system command, and then intercept the characteristics of the executed system command as the bottom-level interception rule;
[0027] After the rules that require the interception rule unit and the underlying interception rule unit are established, run through the javaagent operation mode to intercept the vulnerability of the system that...
Embodiment 2
[0041] RASP-based firewall system, including:
[0042] The rule setting module, the rule setting module includes the required interception rule unit and the underlying interception rule unit; the required interception unit is used to establish the rules to be intercepted, and the rules include the name of the rule to be intercepted, the content of the intercepted data packet and the parameters of the execution data, and the Component interception hook rules;
[0043] The bottom-level interception rule unit, the ultimate purpose of attacking through vulnerabilities is mainly to obtain server permissions, and ultimately need to execute a certain system command, and then intercept the characteristics of the executed system command as the bottom-level interception rule;
[0044] After the rules that require the interception rule unit and the underlying interception rule unit are established, run through the javaagent operation mode to intercept the vulnerability of the system that...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
