JAVA WEB dynamic configuration security defense method

A technology of security defense and dynamic configuration, which is applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve problems such as long solution period, impact of existing functions, need to restart services, etc., to improve security level and improve judgment efficiency Effect

Pending Publication Date: 2022-04-29
BEIJING SEEYON INTERNET SOFTWARE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current common solution is to implement security protection through patching. This soluti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JAVA WEB dynamic configuration security defense method
  • JAVA WEB dynamic configuration security defense method
  • JAVA WEB dynamic configuration security defense method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0028] see Figure 1-2 , the present invention provides the following technical solutions: a JAVA WEB dynamic configuration security defense method, comprising the following steps:

[0029] A. Set "Security Configuration Rules", and synchronize configuration changes regularly;

[0030] B. Obtain the "request data object" according to the protocol request sent by the client;

[0031] C. Match and replace the "request data object" wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a JAVA WEB dynamic configuration security defense method, which comprises the following steps of: A, setting a'security configuration rule ', and performing timing synchronous configuration modification; b, acquiring a'request data object 'according to a protocol request sent by a client; c, matching and replacing the'request data object 'and the'security rule template', and generating a'desensitized request data object '; d, triggering a security event response chain; and E, transmitting the'securely desensitized request data object 'to a JAVA WEB application, and performing information security desensitization on the attack request of the request parameters with XSS and SQL injection by setting a message interception rule and a data replacement rule, thereby preventing the attack from occurring. When a new HTTP security attack vulnerability occurs, only the security rule template needs to be created or modified, and the application server can automatically and synchronously configure and modify, so that security protection is realized.

Description

technical field [0001] The invention relates to the field of JAVA WEB application technology, in particular to a JAVA WEB dynamic configuration security defense method. Background technique [0002] Security defense system, for the purpose of maintaining social public security, is a system composed of security protection technology and other related products, or a system composed of these systems as subsystems or integrated. [0003] The configuration-based dynamic security defense system is designed to help us intercept and process more efficiently. It usually does not only intercept one filtering rule, but supports multiple filtering rules and has flexible functions. [0004] As the Internet is more and more widely used in various fields, various network attacks are also constantly changing. For various enterprises and institutions, once they are attacked by the network, it will cause relatively large economic losses. Network attacks are mainly due to weak security defen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/20H04L67/02
Inventor 王勋胡守云
Owner BEIJING SEEYON INTERNET SOFTWARE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products