Detection method and device of website security

A technology for security detection and security detection data, applied in the field of website security detection methods and devices, can solve problems such as inability to detect and evaluate website security status, and achieve the effect of ensuring website security

Active Publication Date: 2012-10-17
BEIJING QIANXIN TECH
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a website security detection method and device to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and device of website security
  • Detection method and device of website security
  • Detection method and device of website security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] refer to figure 1 , shows a flow chart of steps of a website security detection method according to Embodiment 1 of the present application.

[0018] The website security detection method of the present embodiment comprises the following steps:

[0019] Step S102: Obtain the website security detection data of the website through the data access interface.

[0020] Wherein, the website security detection data includes at least one of the following: Trojan data, false fraud data, search shielding data, margin data, tampering data, and vulnerability data.

[0021] These website security testing data can explain the security status of the website from different aspects, and the collection of multiple website security testing data can reflect the overall security status of the website more comprehensively. The collected data may be stored in one or more databases, or may be stored in a suitable form in a suitable device.

[0022] The data access interface is an applicatio...

Embodiment 2

[0033] refer to figure 2 , shows a flow chart of steps of a website security detection method according to Embodiment 2 of the present application.

[0034] The website security detection method of the present embodiment comprises the following steps:

[0035] Step S202: The website security detection server acquires website security detection data of the website from a third-party application through the data access interface.

[0036] The website security detection server is provided with functional modules for implementing website security detection. In this embodiment, the functions implemented by the website security detection server can be regarded as the functions realized by the website security detection function module.

[0037] The third-party application can be an application that collects different types of security detection data of the website. The third-party application usually provides external data access interfaces, for example, vulnerability detection ac...

Embodiment 3

[0058] refer to image 3 , shows a flow chart of steps of a website security detection method according to Embodiment 3 of the present application.

[0059] In this embodiment, the website security detection method of this embodiment is described by taking the 360 ​​website security detection server as an example. Among them, the initial security score of the website is set to 100 points.

[0060] The website security detection method of the present embodiment comprises the following steps:

[0061] Step S302: The 360 ​​website security detection server obtains the website security detection data of the website to be detected.

[0062] In this embodiment, the acquired security detection data of the website to be detected includes: Trojan data, false fraud data, search shielding data, marginalia data, tampering data, and vulnerability data.

[0063] Specifically, when performing overall security detection on a website to be detected, this step includes:

[0064] Step A: Obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a detection method and device of website security. The detection method of website security comprises the following steps of: obtaining website security detection data of a website through a data access interface, wherein the website security detection data comprises at least one of Trojan Horse data, false data, search mask data, margent data, tampering data and vulnerability data; detecting the security of a website according to a website security detection rule corresponding to the website security detection data as well as the website security detection data, wherein the website security detection rule comprises at least one of a Trojan Horse rule, a false rule, a mask rule, a margent rule, a tampering rule and a vulnerability rule; and processing the security detection results. Through the application, the overall security situation of the website can be known by website managers and website users, and the security of the website can be effectively ensured.

Description

technical field [0001] The present application relates to the technical field of website security, in particular to a website security detection method and device. Background technique [0002] With the application of Internet technology more and more widely, a lot of people's daily work and entertainment are carried out on the Internet, and the Internet is closely related to our life. Therefore, the security of the website has been paid more and more attention by people. However, there are various security risks in the network, such as: COOKIE poisoning, application buffer overflow, cross-site scripting attack, known security holes, etc., which make website users worry all the time. Website users want to know the security level of the website and use a relatively safe website, while website managers hope to fix the loopholes in time to provide website users with a safe browsing platform. [0003] At present, the Internet provides a mechanism for detecting and rating the "...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 赵武常优黄冬苗苏兵社龙专
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products