Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A detection method for illegal file upload

A file upload and detection method technology, applied in the field of anomaly detection, can solve problems such as inaccurate detection results, and achieve the effects of low accuracy, poor flexibility, and accurate detection of the legitimacy of uploading behaviors.

Active Publication Date: 2021-05-07
XI AN JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to overcome the above-mentioned shortcomings of the prior art, the purpose of the present invention is to provide a method for detecting illegal file uploads, so as to solve the technical problem that the prior art uses feature matching to detect the legitimacy of uploaded files, resulting in inaccurate detection results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method for illegal file upload
  • A detection method for illegal file upload
  • A detection method for illegal file upload

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] First, the terms involved in the embodiments of the present application are explained as follows:

[0034] Fuzzification and fuzzy set: Fuzzification is the process of converting the determined value of the input quantity of the fuzzy controller into the corresponding fuzzy language variable value, and the fuzzy language variable value is a fuzzy set, so the fuzzification method should give Transformation method for fuzzy sets.

[0035] Fuzzy rules: the essence is the binary fuzzy relationship R defined in X and Y, and the form of fuzzy rules is: if x is Athens y is B. where A and B are linguistic values ​​defined by fuzzy sets on domains X and Y.

[0036] Defuzzification: Defuzzification is the transformation of fuzzy values ​​into unambiguous values ​​of the domain of discourse at an appropriate scale as the output of the system.

[0037] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method for uploading illegal files. The method acquires historical data of the device to be detected, and trains the user's uploading behavior pattern according to the historical data, and converts it into a numerical membership degree. Match the behavior to be detected with the behavior pattern uploaded by the user and input it into the rule base, and judge whether the current behavior is abnormal through the fusion of multiple rules in the rule base. In the method, abnormal behavior detection can be performed by fusing multi-dimensional features without considering correlations between features, thereby improving the effect of illegal file upload behavior detection.

Description

technical field [0001] The invention belongs to the technical field of anomaly detection, and in particular relates to a detection method for uploading illegal files. Background technique [0002] With the rapid development of Internet technology, network security has become the most important issue today. Hackers can upload php, jsp and other program backdoor files to the attacked site, and then access these files through normal network access methods, thereby performing malicious attacks and threatening the system. Therefore, finding potential dangers in the system and detecting whether uploaded files are legal is of great significance for network security protection. [0003] In order to detect the legitimacy of the uploaded files, the traditional technology adopts to compare the content characteristics of each uploaded file in turn, so as to find malicious uploading behaviors. However, using the protection method of feature matching to detect files uploaded to the netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06N5/04
CPCG06N5/048H04L63/1416H04L63/30H04L67/06
Inventor 陶敬林辉詹旭娜陈奕光郑宁常跃郝传洲王莞尔
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products