Unlock instant, AI-driven research and patent intelligence for your innovation.

Request interception method and device, electronic equipment and computer readable storage medium

A firewall and network application technology, which is applied in the field of network security, can solve the problems of websites that cannot provide services to users normally, fraud, malicious access, etc., and achieve the effect of improving the identification and interception effect and improving the distribution efficiency

Active Publication Date: 2021-11-16
BEIJING KNOWNSEC INFORMATION TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the network environment, malicious network behavior can cause the website to fail to provide services to users in a very short period of time, which seriously affects the normal operation of the Internet.
[0003] Nowadays, some access requests will use the IP proxy pool to implement web crawlers, zombie account registration, online voting, swiping orders, etc., but these are often accompanied by fraudulent and malicious access behaviors, which are directly banned in general risk control strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request interception method and device, electronic equipment and computer readable storage medium
  • Request interception method and device, electronic equipment and computer readable storage medium
  • Request interception method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0050] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of the present application.

[0051] I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a request interception method and a device thereof, electronic equipment and a computer readable storage medium, and relates to the field of network security. A data analysis server obtains all website access logs received from a network application firewall in a past preset time period, and for each website access log, if a malicious behavior collection point matched with the website access log exists in a plurality of malicious behavior collection points, the malicious behavior collection points are matched with the website access log; if yes, one time is added to the count of the data tuple corresponding to the website access log, a target data tuple meeting a preset condition is selected according to count values corresponding to all the data tuples, an IP address in the target data tuple is added into an IP interception list, and the IP interception list is sent to a network application firewall, therefore, when the network application firewall receives the proxy IP request matched with the IP address in the IP interception list, the proxy IP request is intercepted, and the recognition and interception effects of the proxy IP request are improved.

Description

technical field [0001] The present application relates to the field of network security, in particular, to a request interception method, device, electronic equipment and computer-readable storage medium. Background technique [0002] With the rapid development of the Internet, malicious network attacks have become a problem that cannot be ignored in the industry. Malicious network attacks can be abnormal means adopted to achieve a certain purpose, such as network attacks, malicious requests, and so on. In the network environment, malicious behaviors on the network can cause the website to fail to provide services to users normally in a very short period of time, which seriously affects the normal operation of the Internet. [0003] Nowadays, some access requests will use the IP proxy pool to implement web crawlers, zombie account registration, online voting, swiping orders, etc., but these are often accompanied by fraudulent and malicious access behaviors, which are direct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1466H04L63/02H04L63/1425H04L63/0236Y02D30/50
Inventor 张博洋
Owner BEIJING KNOWNSEC INFORMATION TECH