Reverse proxy identification method and device, equipment and medium
A technology of reverse proxy and identification method, which is applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as lag, virus transmission, and intranet data security threats, so as to enhance identification capabilities, avoid data leakage, The effect of protecting data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0043] The application identification function of the existing firewall mainly uses DFI and DPI technology to detect from the application layer of the packet, and takes the action of releasing or rejecting the detected reverse proxy traffic. However, due to the endless emergence of reverse proxy tools and ever-changing traffic characteristics, manufacturers have a certain lag in adapting to new reverse proxy applications. Moreover, wh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


