Web terminal protection method and system based on port proxy and storage medium

A protection system and terminal technology, applied in transmission systems, electrical components, etc., can solve the problems of code auditing and code repairing for a long time, and the firewall system cannot quickly respond to and counteract 0DAY vulnerabilities, and achieve the effect of ensuring security and legitimacy

Pending Publication Date: 2021-06-08
北京中数智汇科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in reality, they have various problems. For example, the traditional firewall system cannot quickly respond and fight against the current rapid outbreak and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web terminal protection method and system based on port proxy and storage medium
  • Web terminal protection method and system based on port proxy and storage medium
  • Web terminal protection method and system based on port proxy and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] Example

[0034] figure 1 A flowchart of a port agent-based web terminal protection method provided by the embodiment of the present invention, which can be performed by a port agent-based web terminal protection system provided by the embodiment of the present invention. reference figure 1 This method can include the following steps:

[0035] S101, the proxy server obtains the client's request message;

[0036] Specifically, the address of the web terminal is mapped to the proxy server, and the proxy server disguised as a real web server, and exposes the IP address and port number to the client's request message to access the Web terminal. It should be noted that the request message generally includes a variety of online services.

[0037] S102, the proxy server determines the legality of the traffic of the request message;

[0038] Specifically, the relevant personnel can perform judgments for traffic legality based on setting some specific rules. Of course, you can also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field related to computer science and technology, in particular to a web terminal protection method and system based on port proxy and a storage medium. The web terminal protection method based on the port proxy, provided by the invention, comprises the following steps that a proxy server obtains a request message of a client; the proxy server determines the legality of the traffic of the request message; if the request message is legal, the proxy server sends the request message to a web terminal; if the request message is illegal, the proxy server forwards the log of the request message to a log server, and obtains and analyzes the traffic of the request through a third-party log tool. Therefore, the request from the web client is verified through the proxy server, illegal traffic is blocked based on an established strategy, the security and legality of the illegal traffic are ensured, and illegal requests are blocked in real time, so that various websites are effectively protected.

Description

technical field [0001] The present invention relates to the technical field related to computer science and technology, and in particular to a port agent-based web terminal protection method, system and storage medium. Background technique [0002] While WEB applications are becoming more and more abundant, WEB servers have gradually become the main attack target due to their powerful computing power, processing performance and higher value. Security incidents such as SQL injection, webpage tampering, and webpage hanging horses occur frequently. Users such as enterprises generally use firewalls as the first line of defense of the security system. However, in reality, they have various problems. For example, the traditional firewall system cannot quickly respond and fight against the current rapid outbreak and spread of 0DAY vulnerabilities, and code auditing and code patching to completely solve such vulnerabilities often require a relatively long period of time. long time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0263H04L63/0236H04L63/1425
Inventor 高铭贾建杰
Owner 北京中数智汇科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products