Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic application protection system and method based on attack load and attack behavior

A technology of dynamic application and protection system, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as user A's inability to access successfully, web application system damage, etc., to improve work efficiency and user experience, and alleviate attack pressure. Effect

Pending Publication Date: 2022-01-11
SICHUAN XW BANK CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional WAF will only identify a single request for a single request from the outside, and the attack behavior can only be intercepted or released. For example: when an attacker tries to scan the web application system, the attack process includes probing and analysis. , Precise attack, during the trial process, the conventional attack load will be placed on the request traffic multiple times and sent to the web application system. Traditional WAF can only block and intercept a single request traffic once, and the attacker may frequently adjust the attack After the payload is tried, the correct attack payload is analyzed, and the attack request traffic is reconstructed to achieve precise attacks, causing pressure or even damage to the web application system. IP is blackened and permanently banned. When a normal user A uses a mobile phone to access the system, the IP used may inherit the proxy IP used by an attacker B. At this time, the IP has been intercepted and blocked by WAF due to previous attacks. , so user A will not be able to access successfully and needs to manually unblock

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic application protection system and method based on attack load and attack behavior
  • Dynamic application protection system and method based on attack load and attack behavior
  • Dynamic application protection system and method based on attack load and attack behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] The protection system as a whole consists of two parts: basic attack identification function and behavior model function. External request traffic passes through the traffic receiver, and the attack load matching and request characteristics of the request are identified through the basic attack identification function to form attack load logs, request Feature logs, through model analysis, research and development, establish models and issue them, calculate and match user behaviors and risk levels in real time, match defense strategies, and obtain results and issue them to the controller.

[0051] Such asfigure 1 As shown, a dynamic application protection system based on attack load and attack behavior, including a flow receiver, a flow controller, a basic configuration module, a behavior model development module, a first analysis module, and parameter setting through the behavior model development module The second parsing module, where,

[0052] The traffic receiver is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer information security, and discloses a dynamic application protection system based on attack load and attack behavior, which comprises a flow receiver, a flow controller, a basic configuration module, a behavior model research and development module, a first analysis module and a second analysis module for setting parameters through the behavior model research and development module. The invention further discloses a protection method of the dynamic application protection system based on the attack load and the attack behavior. According to the method, the attacker behavior judgment model is established, so that the problem that attacker requests are insufficient and easy to leak due to the fact that a traditional WAF completely depends on load attack recognition is solved.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a dynamic application protection system and method based on attack load and attack behavior. Background technique [0002] WAF is a common technical facility for application layer security protection. It analyzes each HTTP / HTTPS request and identifies the attack field contained in a single request. If an attack is detected, the request will be blocked once. It will let the request go to the business machine and provide blocking protection for the web application. [0003] Traditional WAF only requests a single identification of a request traffic packet from the outside, and the attack behavior can only be blocked or released. For example, when an attacker tries to scan the web application system, the attack process includes probing and analysis. , Precise attack, during the trial process, the regular attack load will be placed on the request traffic multiple times an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425H04L63/205H04L63/1441
Inventor 李昱希王进杰雷涛魏婉昀
Owner SICHUAN XW BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products