Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web application intrusion detection method, system, computer equipment and storage medium

An intrusion detection and web application technology, applied in the computer field, can solve the problems of poor detection timeliness, difficulty in real-time detection of intrusion events, and low detection efficiency

Active Publication Date: 2020-05-19
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Manual triggering to detect intrusion events has poor timeliness, it is difficult to realize real-time detection of intrusion events, and the detection efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web application intrusion detection method, system, computer equipment and storage medium
  • Web application intrusion detection method, system, computer equipment and storage medium
  • Web application intrusion detection method, system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0025] The web application intrusion detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the client terminal 102 communicates with the proxy server 104 through the network, and the proxy server 104 communicates with the Web server 106 through the network. Wherein, the client terminal 102 may be various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, but is not limited thereto. The proxy server 104 and the Web server 106 can be independent serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to a Web application intrusion detection method and system, computer equipment and a storage medium. The method includes the following steps: when a Web application is started,loading an intrusion detection component and a toolkit including multiple byte code files according to a pre-configured startup parameter, wherein each byte code file includes a business function andan interface function; adding a detection code in the interface function by using the intrusion detection component; when an HTTP request sent by a client terminal through a proxy server is received,executing the corresponding business function according to the HTTP request, and performing business processing on a request body that carries an intrusion simulation character string added by the proxy server; when the business function calls the corresponding interface function, adopting the detection code in the interface function to detect whether the processed request body still includes theintrusion simulation character string, if yes, determining that a detection result is that the Web application has an intrusion risk; and generating an HTTP response according to the detection result, and returning the HTTP response to the proxy server. By adopting the method, the detection efficiency can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a web application intrusion detection method, system, computer equipment and storage medium. Background technique [0002] In recent years, with the wide application of network technology, more and more enterprises regard web application program (hereinafter referred to as "web application") as an important business approach, thus putting forward higher requirements for the security of web application. In order to improve the security of web applications, it is necessary to perform intrusion detection on web applications to find possible security holes in web applications. Intrusion detection is to detect the attack events (also known as "intrusion events") in the corresponding data stream of the Web application. At present, attacks against web applications cover all levels from operating systems, web applications to web application databases. The forms of attack ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/55G06F21/57
CPCG06F21/554G06F21/577H04L63/1416H04L63/1425H04L67/02
Inventor 芦永胜曹书涛
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products