XSS attack detection method and device

An attack detection and consistent technology, applied in the field of information security, can solve problems such as prone to false alarms, false alarms, and huge costs for maintenance personnel, and achieve the effect of reducing maintenance costs

Pending Publication Date: 2022-05-13
BEIJING QIANXIN TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is prone to false positives. Because the payload is not encoded, it does not mean that the browser will execute the payload. It is possible that the payload is displayed as text, thus causing false positives.
[0004] Also, due to the fact that there are a large number of scanning attacks in the network, most of which are scanners, a large number of attacks are ineffective
Traditional intrusion detection systems (IDS for short) will alert all attacks, and the protection personnel only need to care about successful attacks, so alerting all attacks will cause huge costs to maintenance personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • XSS attack detection method and device
  • XSS attack detection method and device
  • XSS attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] figure 1 It is a flowchart of an embodiment of an XSS attack detection method of the present invention. like figure 1 As shown, the method of the embodiment of the present invention includes:

[0027] S101. Detect the received user request, and determine whether it is an XSS attack.

[0028] XSS attacks usually refer to injecting malici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an XSS attack detection method and device. The method comprises the following steps: detecting a received user request, and judging whether the received user request is an XSS attack or not; if the attack is the XSS attack, extracting an XSS attack vector from the user request; and acquiring a response message corresponding to the user request, putting the response message into the JS sandbox to run, executing a monitoring event, comparing the monitored event corresponding to the response message with the XSS attack vector, and if the comparison result is consistent, determining that the XSS attack is successful. For the characteristics of XSS attacks, the XSS attack vector and the operation result of the response message in the JS sandbox are extracted, the extracted attack vector is compared with the operation result of the JS sandbox, the attack result is researched and judged, and the maintenance cost is reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to an XSS attack detection method and device. Background technique [0002] In order to achieve the purpose of maliciously attacking the user, the attacker will insert some malicious script codes into the web page. When the user browses the page, the script code maliciously inserted by the attacker may be executed to complete the XSS attack. [0003] At present, the detection of XSS attacks can use methods such as rule-based detection, machine learning-based algorithm prediction and judgment detection, or semantic analysis-based detection. However, none of these methods has entered the link where the browser actually executes JS scripts, and is all based on text analysis and detection. Therefore, there are certain false positives and false negatives. In the prior art, XSS attacks can also be detected by matching rules on the response page: by injecting a specific attack payload ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1416H04L63/1466H04L63/1433
Inventor 刘大光
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products