Unlock instant, AI-driven research and patent intelligence for your innovation.

Firewall system based on RASP

A firewall and intrusion prevention technology, which is applied in the field of RASP-based firewall systems, can solve the problems of attacking target sites, being unable to capture characteristic keywords, being attacked, etc., and achieve strong protection, high vulnerability processing efficiency, and improved security. Effect

Inactive Publication Date: 2021-04-16
北京华顺信安信息技术有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of rapid development of big data, we are faced with various vulnerabilities to attack every day. These vulnerabilities may be public vulnerabilities or undisclosed vulnerabilities. For the public vulnerabilities, we can intercept the public vulnerabilities Keywords, for undisclosed vulnerabilities, it is impossible to capture characteristic keywords, which may lead to the risk of being attacked
Because what we need to do now is to prevent attacks from these unknown and undisclosed vulnerabilities; due to the rapid development of the Internet, the corresponding vulnerability attack technology is also constantly improving. attack, but it may break through in special tasks or in a special time period. It will not use known vulnerabilities to attack, and use internal undisclosed vulnerabilities or 0day vulnerabilities to attack, which may cause a great blow to the target site. In order to avoid this situation, we need a new type of technology to technically prevent the damage caused by these vulnerability attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall system based on RASP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] RASP-based firewall system, including:

[0025] The rule setting module, the rule setting module includes the required interception rule unit and the underlying interception rule unit; the required interception unit is used to establish the rules to be intercepted, and the rules include the name of the rule to be intercepted, the content of the intercepted data packet and the parameters of the execution data, and the Component interception hook rules;

[0026] The bottom-level interception rule unit, the ultimate purpose of attacking through vulnerabilities is mainly to obtain server permissions, and ultimately need to execute a certain system command, and then intercept the characteristics of the executed system command as the bottom-level interception rule;

[0027] After the rules that require the interception rule unit and the underlying interception rule unit are established, run through the javaagent operation mode to intercept the vulnerability of the system that...

Embodiment 2

[0041] RASP-based firewall system, including:

[0042] The rule setting module, the rule setting module includes the required interception rule unit and the underlying interception rule unit; the required interception unit is used to establish the rules to be intercepted, and the rules include the name of the rule to be intercepted, the content of the intercepted data packet and the parameters of the execution data, and the Component interception hook rules;

[0043] The bottom-level interception rule unit, the ultimate purpose of attacking through vulnerabilities is mainly to obtain server permissions, and ultimately need to execute a certain system command, and then intercept the characteristics of the executed system command as the bottom-level interception rule;

[0044] After the rules that require the interception rule unit and the underlying interception rule unit are established, run through the javaagent operation mode to intercept the vulnerability of the system that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firewall system based on RASP, and the system comprises a rule setting module which comprises a to-be-intercepted rule unit and a bottom-layer interception rule unit; wherein the to-be-intercepted unit is used for establishing a to-be-intercepted rule, the rule comprises an intercepted rule name, intercepted data packet content and parameters for executing data, and a hook rule is intercepted by a component; a bottom layer interception rule unit, used for attacking through vulnerabilities to finally obtain server permission mainly, a certain system command needs to be executed finally, and then the characteristics of the executed system command serve as bottom layer interception rules to be intercepted; and the effects of relatively high vulnerability processing efficiency, strong protection, wide application range and easiness in popularization and application are achieved.

Description

technical field [0001] The invention belongs to the field of firewalls, and in particular relates to a firewall system based on RASP. Background technique [0002] In the era of rapid development of big data, we are faced with all kinds of vulnerabilities to attack every day. These vulnerabilities may be disclosed vulnerabilities or undisclosed vulnerabilities. For the disclosed vulnerabilities, we can intercept the disclosed vulnerabilities by intercepting them. Keywords, for undisclosed vulnerabilities, it is impossible to capture characteristic keywords, which may lead to the risk of being attacked. Because, what we need to do now is to prevent the attacks of these unknown and undisclosed vulnerabilities; due to the rapid development of the Internet, the corresponding vulnerability attack technologies are also constantly improving. However, in special tasks or special time periods, it may break through and will not use known vulnerabilities to attack. Using internal undi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 赵武王宇邓焕
Owner 北京华顺信安信息技术有限公司