Parameter configuration method and device for waf brute force cracking protection, waf system

A parameter configuration and parameter technology, applied in the field of computer security, can solve problems such as lack of intelligence, complicated operation, cumbersome process, etc., and achieve the effect of improving configuration efficiency, simple operation, and friendly process

Active Publication Date: 2022-06-28
HANGZHOU DPTECH TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of using WAF, protection parameters need to be configured first. The configuration process of the traditional method requires the user to capture packets and analyze the message to find the login identification parameters and then configure it. The operation is complicated and the process is cumbersome. Promoted the use of WAF

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parameter configuration method and device for waf brute force cracking protection, waf system
  • Parameter configuration method and device for waf brute force cracking protection, waf system
  • Parameter configuration method and device for waf brute force cracking protection, waf system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of this specification as recited in the appended claims.

[0033] The terms used in this specification are for the purpose of describing particular embodiments only and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This manual provides a parameter configuration method and device for WAF brute-force cracking protection, and a WAF system. The method includes: configuring the URL information of the protection page, enabling the protection function of WAF; accessing the server according to the URL information, and Performing a simulated login test on the corresponding login interface to obtain identification parameters; performing parameter configuration on the protection page according to the identification parameters. This solution avoids the need for users to perform packet capture and packet analysis processing to find login identification parameters and parameter configuration processes. The entire configuration process is easy to operate and friendly, and can realize intelligent configuration and improve configuration efficiency.

Description

technical field [0001] This specification relates to the technical field of computer security, and in particular, to a parameter configuration method and device for WAF brute force cracking protection, and a WAF system. Background technique [0002] The brute force method, also called the enumeration method, is a method for deciphering passwords. If the dictionary is large enough, it can be successfully cracked; by cracking the password of the system administrator, and then mastering the control of the server, this is an important means for hackers. For example, brute-force cracking for web servers is usually used with known partial information to try to blast the backend of the website to prepare for the next penetration test. [0003] In order to prevent brute force cracking, WAF (Web Application Firewall, Web Application Firewall) is currently widely used. Layer, the security version of HTTP) is a security product that provides protection for Web applications. WAF can e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0803H04L67/02H04L9/40
CPCH04L41/0803H04L63/0236H04L63/0263H04L63/083H04L63/20H04L67/02
Inventor 汪丽芳
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products