Supercharge Your Innovation With Domain-Expert AI Agents!

Web application program vulnerability attack detection method, server, electronic equipment and storage medium

A technology for attack detection and application programs, applied in the field of network security, can solve problems such as difficult identification and detection

Pending Publication Date: 2022-04-12
HARBIN ANTIY TECH
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the invention, the inventor found that: the above-mentioned WAF protection scheme is usually deployed on the external border of the Web application, intercepting the access request and denying it to the outside of the application; however, once the attacker attacks After the request is disguised and enters the application program, it is difficult to identify and detect it effectively and block the attack action in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web application program vulnerability attack detection method, server, electronic equipment and storage medium
  • Web application program vulnerability attack detection method, server, electronic equipment and storage medium
  • Web application program vulnerability attack detection method, server, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0084] Figure 5 It is a schematic block diagram of the architecture of an embodiment of the Web application server of the present invention, see Figure 5 As shown, the server includes a host, and the web application described in any one of Embodiment 1 is installed on the host, and the first detection model is embedded in the web application, when a user sends a web message to the server When requested, the web application program is used to execute the vulnerability attack detection method described in any one of the first embodiment.

[0085] The server of this embodiment can be used to execute figure 1 The implementation principle and technical effect of the technical solution of the shown method embodiment and the server of this embodiment are similar to those of Embodiment 1, and will not be repeated here, and can be referred to each other.

Embodiment 3

[0087] Image 6 It is a schematic block diagram of the structure of an embodiment of the honeypot server of the present invention. The present invention also provides a server for capturing network attackers, including a host, deploying the application program provided in this embodiment as a honeypot application and deploying it on the host The predetermined location, the application program can be triggered to collect user (including attacker) information to understand the attacker's attack method. After the attacker triggers the successful attack event, the attacker's personal fingerprint (here refers to the identification information used to identify the attacker's identity and / or behavior, not the biological fingerprint) is collected through the honeypot collection program to achieve the purpose of countermeasures and Do not accidentally injure normal users.

[0088] Specifically, a honeypot application program is deployed on the host, and a honeypot collection program i...

Embodiment 4

[0091] An embodiment of the present invention also provides an electronic device, including one or more processors; a memory; one or more executable programs are stored in the memory, and the one or more processors read the stored program in the memory The executable program code is used to run the program corresponding to the executable program code, so as to execute the method described in any one of the first embodiment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a Web application program vulnerability attack detection method, a server, electronic equipment and a storage medium, and relates to the technical field of network security. The method comprises the following steps: after identity verification is passed on a Web request according to user equipment identification information, triggering and calling a corresponding first detection model, and obtaining context information of a response operation executed on the Web request; a vulnerability attack detection rule is preset in the first detection model; performing matching verification on the context information and the vulnerability attack detection rule; and judging whether the Web request is an attack request or not according to a verification result. According to the invention, the accuracy of attack request detection and identification can be improved to a certain extent, the attack action can be effectively blocked, and the method is suitable for a network security monitoring scene.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for detecting web application program vulnerability attacks, a server, electronic equipment and a storage medium. Background technique [0002] Due to various subjective and / or objective factors in the development process of web programs, there will inevitably be security vulnerabilities, which will become exploitable vulnerability resources for attackers to carry out attacks. [0003] For the protection of vulnerability attacks carried during the development of Web applications, the WAF (WebApplicationFirewall, Web Application Firewall) protection scheme is mostly used at present. [0004] In the process of implementing the invention, the inventor found that: the above-mentioned WAF protection scheme is usually deployed on the external border of the Web application, intercepting the access request and denying it to the outside of the application; however, once ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 许鹏飞程宇辉陈灵锋
Owner HARBIN ANTIY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More