Malicious request interception method and device and computer equipment
A computer program and malicious technology, applied in the field of information, can solve the problems of wasting storage space, polluting business logs, unfavorable user behavior analysis, etc., so as to avoid the waste of storage space and reduce performance loss.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0033] At present, after receiving a service request, if the service request is a malicious request, the service request is usually intercepted at the php layer. However, because this method puts malicious requests in the PHP layer to intercept, it increases the performance consumption of the PHP layer. In addition, because the PHP layer will record corresponding logs for each request, it will be used for subsequent daily activity statistics and user behavior analysis. , so such a large number of malicious requests will cause a lot of invalid logs to be added to the php layer, thereby polluting normal business logs, which is not conducive to analyzing user behavior, and will also waste storage space....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


