Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Isolation defense system for website security access

A security access and defense system technology, applied in the field of website security access, can solve problems such as data loss, attack bypass, and hanging horses

Pending Publication Date: 2021-11-12
吕波
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Over the past 30 years, the Internet has undoubtedly brought revolutionary changes to the world. The ease of use of browsers has brought unprecedented productivity improvements to individuals, especially businesses. However, new Web sites are emerging every day. With today's With the explosive growth of malware, web services are increasingly becoming the key targets of network attacks. DNS attacks, brute force cracking, zero-day exploits, and advanced persistent attacks still make websites vulnerable. Data leaks, web page tampering, web page Trojans, phishing attacks, Security incidents such as denial of service and sensitive information leakage occur frequently, and enterprise employees accessing websites through browsers may cause malware, ransomware to run, and even trigger zero-day attacks. Faced with the dynamic changes of potential network threats in a large number of webpages
[0003] According to statistics, as many as 40% of web-based malware are zero-day attack threats. The China Internet Security Report for the first half of 2020 shows that relevant agencies monitored and intercepted 4.224 billion web application attacks, nine times that of the same period in 2019. The number is growing explosively. Nearly 50% of web application attacks are concentrated in government agencies and the retail industry, accounting for 26.29%. The retail industry ranks second, accounting for 23.23%. The survey also found that 60% of enterprises have Employees use terminal browsers to browse the web and are directly infected with ransomware, other malware or other threats, and 30% of enterprises suffer data loss due to their attacks
[0004] The transmission of these attacks comes from the browsers on the employees’ office computers. Since there are more than 300 native browser vulnerabilities, new vulnerabilities will be generated at any time. Each browser manufacturer has dozens of products. The current defense of enterprise Web sites Mainly relying on the signature-based traditional application attack protection system, it implements self-analysis of the HTTP protocol, which may be inconsistent with the understanding of the HTTP request by the web server, which leads to attack bypassing, and cannot balance well between manslaughter and false negatives. It is too detailed and can be easily spoofed and bypassed. In addition, the most dangerous attack vectors of today's network attacks are often hidden in HTTPS encrypted traffic. As a result, enterprise security managers cannot prevent threats such as smuggling through traditional application attack protection systems. downloads, embedded malware and malicious ads on legitimate sites, browser plug-ins, especially in response to the increasing number of zero-day attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Isolation defense system for website security access
  • Isolation defense system for website security access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] Basic as attached figure 1 And attached figure 2 As shown, an isolation defense system for secure access to websites includes a management control module, a Web proxy module, an isolation orchestration module, and a micro-container module. The management control module includes account management components and policy management components, and the micro-container module includes Web rendering component and remote browser component.

[0025] The account management component pre-allocates the corresponding account and password for each client, and establishes the association between the account and the remote browser type, and the remote browser type is associated with the micro container; the policy management component is used for the client to control the access to the Web site Policies, such as whitelist, blacklist, clipboard permissions, and file download; provide system administrator access and configuration interfaces based on B / S architecture, and are protected...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of website security access, and discloses an isolation defense system for website security access. The isolation defense system comprises a management control module, a Web agent module, an isolation arrangement module and a micro-container module; the management control module is used for pre-distributing an account and a password corresponding to the user client and establishing association between the account and a remote browser type, and the remote browser type is associated with the micro-container module; the Web agent module is used for receiving the flow of accessing the Web website from the browser of the user client, verifying the authenticity of the pre-distributed account of the user client, and releasing the flow of accessing the Web website by the user client after the verification is passed; the isolation arrangement module is used for distributing an independent micro-container environment which is completely isolated from the user client to the user client and providing an independent remote browser; and the user client browser accesses the Web website through the remote browser published by the micro-container module. The purposes of purifying the flow of accessing the Web site by the user and effectively defending Web threats are achieved through an isolation technology.

Description

technical field [0001] The invention relates to the technical field of website security access, and specifically discloses an isolation defense system for website security access. Background technique [0002] Over the past 30 years, the Internet has undoubtedly brought revolutionary changes to the world. The ease of use of browsers has brought unprecedented productivity improvements to individuals, especially businesses. However, new Web sites are emerging every day. With today's With the explosive growth of malware, web services are increasingly becoming the key targets of network attacks. DNS attacks, brute force cracking, zero-day exploits, and advanced persistent attacks still make websites vulnerable. Data leaks, web page tampering, web page Trojans, phishing attacks, Security incidents such as denial of service and sensitive information leakage occur frequently, and enterprise employees accessing websites through browsers may cause malware, ransomware to run, and even...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/958G06F21/56
CPCG06F16/958G06F21/566
Inventor 吕波徐枫
Owner 吕波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products