A security protection method and system based on web access compliance audit

A security protection and compliance technology, applied in the transmission system, electrical components, etc., can solve the problems of attack misjudgment, inability to completely and effectively protect Web site vulnerabilities, etc., and achieve the goal of reducing attack misjudgment rate and standardizing network access behavior Effect

Active Publication Date: 2018-12-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because this technique relies on prior determination of the characteristics of each threat, and most Web sites have their inherent characteristics, this method cannot completely effectively protect Web sites and prevent undisclosed vulnerabilities, and at the same time it will cause serious damage to attacks. misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protection method and system based on web access compliance audit
  • A security protection method and system based on web access compliance audit
  • A security protection method and system based on web access compliance audit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] First of all, it should be explained that the present invention is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software function modules include but are not limited to: main equipment, compliance engine, etc. All mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0024] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in fur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security protection, and aims to provide a security protection method and a security protection system based on WEB access compliance auditing. The security protection method based on WEB access compliance auditing comprises the following steps: a main device self-learns the full path of a protected Web site; the main device generates a complete Web path compliance model according to the learned Web site path features; when receiving an access request of a client to the Web site, the main device records the information of the access request in a record table; and a compliance engine uses the Web path compliance model to analyze and evaluate the access request. The security protection system comprises a main device and a compliance engine. According to the invention, the full path of a site can be audited and a compliance model can be dynamically generated, so that unsafe behaviors on the network can be intelligently evaluated and defended, network access behaviors of users can be regularized, and the attack misjudgment rate can be effectively reduced.

Description

technical field [0001] The invention relates to the technical field of network security protection, in particular to a security protection method and system based on WEB access compliance audit. Background technique [0002] With the rapid development of the Internet, the security of Web applications has become a hot topic in Internet research. [0003] As an active security protection technology, web application security protection can be used not only as an auditing and access control device, but also for architecture and network design and web application reinforcement, and can provide real-time protection against unsafe behaviors from the Internet. These unsafe behaviors include injection attacks, webpage tampering incidents, information leakage incidents, website hotlinking incidents, information theft incidents, etc. Traditional WEB application firewalls usually exist as independent hardware gateways, and protect WEB servers in various deployment forms such as transpa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/10H04L63/306H04L67/02
Inventor 范渊朱曙萍
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products