Method and system for detecting request safety

A technology for detecting requests and security, applied in the field of network security, can solve problems such as illegal intrusion, server security cannot be well guaranteed, etc.

Active Publication Date: 2010-09-08
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In summary, the security of the server cannot be well guaranteed, and it is likely to be illegally invaded by the outside world

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting request safety
  • Method and system for detecting request safety
  • Method and system for detecting request safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to be able to effectively detect the security of the response request to the application server, an embodiment of the present invention provides a method for detecting the security of the request. The security of the current response request.

[0026] see figure 1 , the detection request security provided by the embodiment of the present invention includes:

[0027] Step 10: When the main server receives the current response request, determine the number of historical response requests received within the set time period that are the same as the current response request;

[0028] Step 11: The master server judges whether the quantity exceeds a preset threshold;

[0029] Step 12: When the master server judges that the number exceeds the preset threshold value, it determines that the current response request is an illegal request, and executes a preset processing operation.

[0030] In step 10, the historical response request identical to the current response ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and a system for detecting request safety, relating to the network safety field and being used for providing a proposal for detecting response request safety. In the method, the number of the past response requests which are the same as the present response requests and are received in a given time slot is determined when a main server receives the present response requests; the main server judges whether the number exceeds a preset threshold value; and when judging that the number exceeds the preset threshold value, the main server determines that the present response requests are illegal requests and exerts a preset treatment operation. When in use, the invention can effectively detect the safety of the response requests of an application server.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for detecting request security. Background technique [0002] With the continuous development, improvement and wide application of network technology, many data, resources and information in life and work are stored and processed through computer systems. With the development of network applications, these information are transmitted, received and processed through the network, so Computer networks play an increasingly important role in social life. In order to maintain the security of the computer network, people have proposed many means and methods, among which the use of firewalls, tracking and auditing technologies is one of the most important, core and most effective means. It is an integral part of network security policy, and it implements effective management of network security by controlling and monitoring information exchange and access behavior bet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 柯宗贵柯宗庆
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products