Unlock instant, AI-driven research and patent intelligence for your innovation.

JNI hostile attack detection method and device based on RASP zero rule

A malicious attack and detection method technology, applied in computer security devices, digital data information retrieval, instruments, etc., can solve problems such as network threats, unrecognizable user input, bypassing, etc., and achieve the effect of improving detection efficiency

Active Publication Date: 2021-10-08
GUIZHOU POWER GRID CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the traditional WAF, on the one hand, it cannot get the query statement of the database, and can only look for SQL injection features in the request; on the other hand, it cannot recognize user input, so there is a possibility of bypassing
In addition, there is no effective JNI consistency check scheme in the prior art
When performing vulnerability detection, the vulnerability detection cannot be performed according to the consistency of JIN, thus causing network threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JNI hostile attack detection method and device based on RASP zero rule
  • JNI hostile attack detection method and device based on RASP zero rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0028] Such as figure 1 As shown, the present invention proposes a kind of JNI malicious attack detection method based on RASP zero rule, specifically comprises the following steps:

[0029] Step S101. The real-time application self-protection system RASP monitors the operation events generated in the webpage in real time.

[0030] RASP (Runtime application self-protection, real-time application self-protection) is a new type of application security protection technology, which integrates the protection program with the application program by injecting the protection program into the application program, so that when the user accesses the application through the inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a JNI hostile attack detection method based on an RASP zero rule. The method comprises the steps of enabling a real-time application program self-protection system RASP to monitor an operation event generated in a webpage in real time; analyzing the operation event, and scanning the operation event by calling a corresponding JIN scanning thread; and according to a scanning result of the operation event, calling a corresponding zero rule vulnerability detection algorithm in the RASP to carry out attack behavior detection on the operation event, and uploading a detection result to a JAVA layer. According to the detection method disclosed by the invention, the detection efficiency of the hostile attack is effectively improved based on the accuracy of the JIN thread and the flexibility of the preset rule in the RASP in the hostile attack detection process. In addition, the invention further provides a JNI hostile attack detection device based on the RASP zero rule.

Description

technical field [0001] The invention belongs to the technical field of information security detection, in particular to a JNI malicious attack detection method and device based on RASP zero rules. Background technique [0002] With the continuous development of network technology, the increasing demand of mobile terminals for the network is also formed based on the continuous increase of application software. The application software market integrates software marketing, installation and update, so developers can easily integrate application programs. In the application market, people can also easily obtain and use corresponding application programs from the application market. [0003] By analyzing the typical vulnerability attack process, the summary of the vulnerability attack utilization rule set has a certain degree of versatility. However, for traditional WAFs, on the one hand, they cannot get the query statement of the database, and can only look for SQL injection fe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57G06F16/242
CPCG06F21/554G06F21/577G06F16/2448
Inventor 吕嵘晶魏力鹏陈卿袁捷龙玉江王皓然刘俊荣陶佳冶方继宇李荣宇吴方权易也李然欧阳静
Owner GUIZHOU POWER GRID CO LTD