Request detection method, device and equipment and readable storage medium
A detection method and equipment technology, applied in the computer field, can solve problems such as difficult detection, reduced intranet security, and difficult request detection methods for security gateways
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.
[0049] At present, the request sent by the intranet terminal may be tampered with. Because the destinations accessed by the intranet terminal are various, and each destination detects requests in different ways, it is difficult for the security gateway to integrate the request detection methods of each destination. It is difficult to detect the requests sent by each intranet terminal, which reduces the security of the intranet. To this end, the presen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


