Security detection method, security detection device, electronic equipment and medium

A security detection and to-be-detected technology, applied in the field of network communications, can solve problems such as security risks, and achieve the effects of improving efficiency, saving costs, and eliminating security vulnerabilities.

Active Publication Date: 2022-07-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the security detection of the application firewall is mainly for HTTP1, which can only detect a single packet, such as a request packet, a response packet, etc., because the HTTP2 protocol divides an HTTP request into multiple streams for distribution, resulting in the use of HTTP2 features to bypass In the case of over-detection, there is a greater security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method, security detection device, electronic equipment and medium
  • Security detection method, security detection device, electronic equipment and medium
  • Security detection method, security detection device, electronic equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.

[0047] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details, or other methods, components, devices, steps, etc. may be employed. In other instances, well-known m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security detection method, a security detection device, electronic equipment and a computer readable medium. Relates to the technical field of network communication. The method comprises the following steps: carrying out light splitting processing on flow between a client and a server, obtaining a transmission request sent by the client, and determining a protocol type of the transmission request; extracting a target transmission request of which the protocol type is HTTP2, determining whether the target transmission request contains an end mark, and when the target transmission request contains the end mark, obtaining request data from the transmission request; recombining the target transmission request and the request data to convert the target transmission request into a to-be-detected request of which the protocol type is HTTP1; and jointly performing security detection on the to-be-detected request through the security detection rule of the HTTP1 to determine a security detection result of the client. According to the embodiment of the invention, under the condition that the protocol type is HTTP2, security detection can still be carried out on the transmission request, security vulnerabilities are repaired, and the security is improved.

Description

technical field [0001] The present disclosure relates to the field of network communication, and in particular, to a security detection method, a security detection device, an electronic device, and a computer-readable medium. Background technique [0002] Due to the characteristics of HTTP1's high latency, stateless connection, and plaintext transmission, communication based on the HTTP1 protocol suffers from slow page loading, excessively large headers, wasteful cost, and insecurity. In order to overcome the problems existing in HTTP1, HTTP2 divides the request and response data into smaller frames and transmits them in binary format, and compresses the header, which greatly improves the data transmission performance. [0003] At present, the security detection of application firewalls is mainly aimed at HTTP1, which can only detect single packets, such as request packets, response packets, etc., because the HTTP2 protocol divides an HTTP request into multiple streams for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/1416H04L63/0428H04L67/02H04L63/1433
Inventor 郭晶甘祥郑兴彭婧刘羽范宇河唐文韬申军利
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products