Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious request interception method and device and computer equipment

A computer program and malicious technology, applied in the field of information, can solve the problems of wasting storage space, polluting business logs, unfavorable user behavior analysis, etc., so as to avoid the waste of storage space and reduce performance loss.

Inactive Publication Date: 2021-08-13
易纳购科技(北京)有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because this method puts malicious requests in the PHP layer to intercept, it increases the performance consumption of the PHP layer. In addition, because the PHP layer will record corresponding logs for each request, it will be used for subsequent daily activity statistics and user behavior analysis. , so such a large number of malicious requests will cause a lot of invalid logs to be added to the php layer, thereby polluting the normal business logs, which is not conducive to the analysis of user behavior, and will also waste storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious request interception method and device and computer equipment
  • Malicious request interception method and device and computer equipment
  • Malicious request interception method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0033] At present, after receiving a service request, if the service request is a malicious request, the service request is usually intercepted at the php layer. However, because this method puts malicious requests in the PHP layer to intercept, it increases the performance consumption of the PHP layer. In addition, because the PHP layer will record corresponding logs for each request, it will be used for subsequent daily activity statistics and user behavior analysis. , so such a large number of malicious requests will cause a lot of invalid logs to be added to the php layer, thereby polluting normal business logs, which is not conducive to analyzing user behavior, and will also waste storage space....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious request interception method and device and computer equipment, relates to the technical field of information, and mainly aims to directly intercept malicious requests in a Kong gateway layer, so that the performance consumption of a back-end php layer is reduced, and the pollution to service logs is avoided. The method comprises the following steps: receiving a service request triggered by a user; analyzing the service request to obtain equipment identification information and / or an IP address corresponding to the service request; querying a preset blacklist according to the equipment identification information and / or the IP address, and determining whether the service request is a malicious request or not according to a query result; and if the service request is a malicious request, intercepting the service request. The method is suitable for intercepting malicious requests.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a malicious request interception method, device and computer equipment. Background technique [0002] With the rapid development of the Internet, network malicious behavior has become a problem that cannot be ignored in the industry. Network malicious behavior can be an abnormal means to achieve a certain purpose, such as network attacks, malicious requests, etc. Malicious requests can be through applications, Over a period of time, the hypertext transfer protocol network requests that are continuously sent to the server and affect the normal operation of the server, for example, interfere with normal user network behavior or attack a web site in this way, because these requests are very intensive , causing enormous pressure on the server, so it needs to be intercepted. [0003] At present, after receiving a service request, if the service request is a malicious req...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1425
Inventor 田坡敏
Owner 易纳购科技(北京)有限公司