Method and system for identifying WEB invasion
A suspicious and score-based technology, applied in transmission systems, electrical components, etc., can solve problems such as the dependence of security monitoring mechanisms, and achieve the effect of reducing the vulnerability rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to better understand the present invention, the content of the present invention will be further described below in conjunction with the accompanying drawings and examples.
[0055] The present invention provides a method for identifying WEB intrusion, such as figure 1 As shown, the method is specifically:
[0056] Obtain visitor behavior;
[0057] Judging whether the access behavior is a suspicious request, if it is a suspicious request, accumulating the suspicious scores involved in the access behavior to obtain a security score according to a preset suspicious score evaluation standard;
[0058] When the security score is greater than the preset threshold, the user behavior is abnormal, and there is WEB intrusion.
[0059] The method is further refined as follows:
[0060] Step 1: Establish a trusted architecture for the WEB website. The principle of the trusted architecture is that all current content of the WEB website is credible.
[0061] Step 2: Ext...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com