Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for actively defending web attack and web security gateway based on active defense

A security gateway and active defense technology, applied in security communication devices, digital transmission systems, electrical components, etc., to achieve the effect of improving web security

Pending Publication Date: 2022-07-12
SHANDONG LUNENG SOFTWARE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method for actively defending against web attacks and a web security gateway based on active defense, at least solving the problem of improving web security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for actively defending web attack and web security gateway based on active defense
  • Method for actively defending web attack and web security gateway based on active defense
  • Method for actively defending web attack and web security gateway based on active defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 is a schematic flowchart of a method for actively defending against web attacks provided by an embodiment of the present invention, such as figure 1 As shown, the method may include:

[0025] Step S101: After receiving the request sent by the client of the business system to the server of the business system, the web security gateway (hereinafter referred to as the security gateway) performs a security check based on the security chain mechanism on the request;

[0026] Step S102: If the security check on the request is passed by the security gateway, the request is forwarded to the server of the service system.

[0027] The security check based on the security chain mechanism on the request includes processing against the following web attacks: SQL injection attack, XSS attack, CSRF attack, plaintext transmission vulnerability attack, replay attack, integrity vulnerability attack and critical attack cracking attack. In practical applications, the processing ...

Embodiment 2

[0037] In order to effectively prevent current popular web attacks, such as SQL injection attacks, Xss attacks, CSRF attacks, plaintext transmission vulnerabilities, replay attacks, integrity vulnerability attacks, and brute force attacks, this embodiment provides an active defense The web security gateway, hereinafter referred to as the security gateway, is based on the security chain mechanism. When a request arrives at the gateway, the steps of the aforementioned method are implemented one by one according to the security chain, which can realize active defense against web attacks. Through the use of the security gateway, it can effectively , Massively identify and block web attacks.

[0038] figure 2 is a schematic diagram of the deployment of a defense against web attacks provided by an embodiment of the present invention, such as figure 2 As shown, the security gateway is deployed before the server of the business system, so that all requests from the client of the bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for actively defending web attacks and a web security gateway based on active defense, and relates to the technical field of software security protection, and the method comprises the following steps: after receiving a request sent by a client of a service system to a server of the service system, the web security gateway carries out security check based on a security chain mechanism on the request; and if the web security gateway passes the security check of the request, forwarding the request to a server of the service system. According to the invention, the web security can be improved.

Description

technical field [0001] The invention relates to the technical field of software security protection, in particular to a method for actively defending against web attacks and a web security gateway. Background technique [0002] With the rapid development of the ubiquitous Internet of Things, the information technology of "Big Cloud IoT Chain" has been continuously deepened and applied, and the basic links of the network have also changed. A serious challenge has come. As the pertinence, persistence, and concealment of attacks are significantly enhanced, the harm caused is greater, and the difficulty of network security protection is increased. [0003] The current web attack solutions have the following problems: [0004] 1. The developers' understanding and implementation of the reinforcement plan are not synchronized, and the vulnerability repair is not complete, causing system function and performance problems. For example, the output encoding method is incorrect, resul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1441H04L63/1466
Inventor 魏光玉薛念明谢吉伦刘涛张坤焦杰李勋段佳希
Owner SHANDONG LUNENG SOFTWARE TECH