Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application cluster security protection system and method, electronic equipment and storage medium

A security protection and cluster technology, applied in the field of network security, can solve problems such as low protection efficiency, limited WAF throughput, and failure to work normally, and achieve the effect of improving protection efficiency and security and reducing protection pressure

Active Publication Date: 2022-01-14
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the WAF throughput in the above method is limited. If the traffic increases sharply, the WAF cannot work normally after the traffic received by the WAF exceeds the performance limit. Moreover, the WAF protection method is passive, which is easy to be bypassed by repeated trials and errors, and the protection efficiency is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application cluster security protection system and method, electronic equipment and storage medium
  • Application cluster security protection system and method, electronic equipment and storage medium
  • Application cluster security protection system and method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0068] In order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same or similar items with basically the same function and effect. For example, the first device and the second device are only used to distinguish different devices, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application cluster security protection system and method, electronic equipment and a storage medium. The system comprises a domain name server, a front access controller, a WAF gateway and a flow monitoring system, wherein the domain name server is used for receiving a domain name access request sent by a client, analyzing the domain name access request to obtain an IP address corresponding to the domain name access request, and guiding the IP address to the front access controller; the front access controller is used for carrying out first-layer filtering on the IP address based on the IP blacklist to obtain a first request, and the WAF gateway is used for receiving the first request, carrying out second-layer filtering on the first request based on an abnormal request identification rule to obtain a second request, and sending the second request to an application system in an application cluster for processing; and the flow monitoring system is used for collecting and analyzing log data of the WAF gateway and updating the IP blacklist according to the log data. A large amount of flow can be received, normal work is carried out, and protection efficiency and safety are improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an application cluster security protection system, method, electronic equipment and storage medium. Background technique [0002] With the development of network technology, web-based applications are used by more and more companies and institutions around the world. When customers face business peaks or are attacked by DDOS (Distributed denial of service attack), A web application firewall (Web Application Firewall, WAF for short) plays a vital role as a gateway device connected in series in the user network. [0003] In the existing technology, WAF is deployed in front of the web application to detect and block abnormal traffic, and aggregate the traffic from the outside through proxy technology into request packets, and analyze the request packets, and further pass the attack rules of the security rule base Match the parsed request packet. If the rule in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/02H04L67/10H04L61/4511
CPCH04L63/1425H04L63/1458H04L63/0236H04L63/101H04L67/02H04L67/10Y02D30/50
Inventor 钟辉鑫周远阳徐吉园蔡方义王佳成曾旻陈捷毅张琼徐俊峰刘贵荣
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products