Method for actively defending web attack and web security gateway based on active defense
A security gateway and active defense technology, applied in security communication devices, digital transmission systems, electrical components, etc., to achieve the effect of improving web security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] figure 1 is a schematic flowchart of a method for actively defending against web attacks provided by an embodiment of the present invention, such as figure 1 As shown, the method may include:
[0025] Step S101: After receiving the request sent by the client of the business system to the server of the business system, the web security gateway (hereinafter referred to as the security gateway) performs a security check based on the security chain mechanism on the request;
[0026] Step S102: If the security check on the request is passed by the security gateway, the request is forwarded to the server of the service system.
[0027] The security check based on the security chain mechanism on the request includes processing against the following web attacks: SQL injection attack, XSS attack, CSRF attack, plaintext transmission vulnerability attack, replay attack, integrity vulnerability attack and critical attack cracking attack. In practical applications, the processing ...
Embodiment 2
[0037] In order to effectively prevent current popular web attacks, such as SQL injection attacks, Xss attacks, CSRF attacks, plaintext transmission vulnerabilities, replay attacks, integrity vulnerability attacks, and brute force attacks, this embodiment provides an active defense The web security gateway, hereinafter referred to as the security gateway, is based on the security chain mechanism. When a request arrives at the gateway, the steps of the aforementioned method are implemented one by one according to the security chain, which can realize active defense against web attacks. Through the use of the security gateway, it can effectively , Massively identify and block web attacks.
[0038] figure 2 is a schematic diagram of the deployment of a defense against web attacks provided by an embodiment of the present invention, such as figure 2 As shown, the security gateway is deployed before the server of the business system, so that all requests from the client of the bu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


