Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WEB application security protection method based on automatic learning

An application security and automatic learning technology, applied in the computer field, can solve problems such as false positives and inability to defend against unknown vulnerabilities, and achieve the effect of low false positives and false positives.

Inactive Publication Date: 2018-01-30
成都知道创宇信息技术有限公司
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The WEB application system is a transaction processing system based on the B / S (browser / server) model developed by using various dynamic WEB technologies; at present, WEB security threats are becoming more and more serious, and for users, WEB security is a disaster; currently the most A commonly used method is a firewall, which can filter out data on non-service ports to prevent loopholes in non-Web services; however, traditional WEB application firewalls use attack signature databases to detect requests to determine whether the requests are normal requests; If it is a normal request, it will return the content of the request. If it is an attack request, it will intercept the request and return a prompt message; however, traditional WEB application firewalls face various types of websites in use, and there will be false positives and false negatives; they can only defend against Vulnerabilities that have been disclosed, unknown vulnerabilities cannot be protected before the rules are not upgraded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB application security protection method based on automatic learning
  • WEB application security protection method based on automatic learning
  • WEB application security protection method based on automatic learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0023] Such as figure 1 As shown, a WEB application security protection method based on automatic learning includes the following steps:

[0024] Step 1: Extract the access log of the WEB application from the WEB server or the traditional WAF device, and filter the log of non-attack requests;

[0025] The screening method is to use scripts to match keywords, filter attack requests, and filter out attack logs in WAF logs, or manually identify them one by one to determine whether they are attacks.

[0026] For example: URL collection:

[0027]

[0028] The set of attack request URLs can be filtered out through the above screening methods:

[0029]

[0030]

[0031] Step 2: According to the fields of URL, Cookie, Referer and other custom records in the logs filtered out in Step 1, a set of regular expressions with specific rules is gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a WEB application security protection method based on automatic learning. The method comprises the steps that 1, logs of non-attack requests are screened; 2, a regular expression set with specific rules is generated through machine learning according to fields in the logs, and white list rules are formed; 3, the regular expression set is adopted to perform matching on received requests, and the requests not in the white list rules are intercepted or marked; and 4, the marked requests are recognized, if the requests are normal, the requests are added into the white listrules, and the requests are intercepted in case of attacks. Through the method, the white list rules can be generated through automatic learning, the missing report rate and the mistaken report rate are low in use, and an unknown vulnerability can be prevented.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a defense method for a WEB application fire protection system based on automatic learning. Background technique [0002] The WEB application system is a transaction processing system based on the B / S (browser / server) model developed by using various dynamic WEB technologies; at present, WEB security threats are becoming more and more serious, and for users, WEB security is a disaster; currently the most A commonly used method is a firewall, which can filter out data on non-service ports to prevent loopholes in non-Web services; however, traditional WEB application firewalls use attack signature databases to detect requests to determine whether the requests are normal requests; If it is a normal request, it will return the content of the request. If it is an attack request, it will intercept the request and return a prompt message; however, traditional WEB application firewalls ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/55
Inventor 罗智高
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products