Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack success detection method and system of injection attack and related device

A technology of injection attack and detection method, which is applied in the field of network security, can solve the problems of expensive investigation and maintenance costs, alarm fatigue, unfavorable injection attack alarms and processing, etc., and achieve the effect of reducing investigation and maintenance costs and avoiding invalid alarms

Pending Publication Date: 2021-06-29
SANGFOR TECH INC
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the accuracy of the feature extraction of the detection engine in the current technology has more or less false positives, and not all injection attacks will succeed, that is, some injection attacks are not successful, there is no threat to the user but a large number of alarm messages will also be generated , resulting in expensive troubleshooting and maintenance costs, and even alarm fatigue, which is not conducive to the alarm and processing of subsequent injection attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack success detection method and system of injection attack and related device
  • Attack success detection method and system of injection attack and related device
  • Attack success detection method and system of injection attack and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0052] Injection attack means that the web application does not judge the legality of user input data or filter it laxly. The attacker can add additional SQL (StructuredQuery Language, Structured Query Statement) at the end of the pre-defined query statement in the web application. ) statement to realize illegal operations without the knowledge of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack success detection method for an injection attack. The method comprises the following steps: collecting a data packet suspected to be successfully attacked; and calling an attack success detection engine to carry out content detection and / or time detection on the data packet, and judging whether the injection attack is successful or not according to a detection result. According to the application, content detection and / or time detection are / is carried out on the injection attack by calling the attack success detection engine so as to confirm the communication data corresponding to the injection attack, so that the injection behavior when the attack is successful is detected, the injection attack which is not actually successfully attacked can be checked, and the checking and maintenance cost is reduced. Meanwhile, an injection attack detection engine can be optimized according to a result of whether the injection attack is successful or not, so that invalid alarms caused by injection attack detection false alarms are avoided. The invention further provides an attack success detection system for the injection attack, a computer readable storage medium and electronic equipment, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of network security, and in particular to a successful attack detection method for an injection attack, a successful attack detection system, a computer-readable storage medium and electronic equipment. Background technique [0002] At present, the detection engine for injection attacks mainly uses syntax analysis and injection attack SQL feature extraction to detect injection attacks to determine whether injection attacks are included. However, the accuracy of the feature extraction of the detection engine in the current technology has more or less false positives, and not all injection attacks will succeed, that is, some injection attacks are not successful, there is no threat to the user but a large number of alarm messages will also be generated , resulting in expensive troubleshooting and maintenance costs, and even alarm fatigue, which is not conducive to the alarm and processing of subsequent injectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433
Inventor 罗瑞
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products