A SQL injection alarm processing method and device

A processing method and a one-to-one corresponding technology, applied in the field of network security, can solve the problem of lack of contextual relationship between SQL injection alarm data, etc., and achieve the effect of improving efficiency

Active Publication Date: 2022-03-15
北京未来智安科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most network security products mainly focus on the alarm logs of security devices in the detection, analysis and source tracing of SQL injection alarms, and most of the SQL injection alarm data lacks contextual correlation, and data association is basically based on a single product perspective, such as Security products on the host side conduct analysis and traceability around their own data, and security products on the network side also conduct analysis and traceability around their own traffic. There are blind spots in analysis, detection and traceability among different security products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A SQL injection alarm processing method and device
  • A SQL injection alarm processing method and device
  • A SQL injection alarm processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0023] The specific implementation process of the SQL injection alarm processing method provided by the embodiment of the present invention is described below by taking the server as an execution subject as an example. It can be understood that the execution subject of the SQL injection alarm processing method provided in the embodiment of the present invention is not limited to the server.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a SQL injection alarm processing method and device, the method comprising: according to the SQL injection alarm and attack behavior verification rules, obtaining the attack behavior verification result of the SQL injection alarm; wherein, the attack behavior verification rule is a predetermined If it is known that the attack behavior verification result is that there is an attack behavior, then according to the attack result verification rule corresponding to the attack behavior type included in the attack behavior verification result and the SQL injection alarm, the verification of the SQL injection alarm is obtained As a result, the verification result includes a verification basis; wherein, the attack result verification rule is preset. The device is used to perform the above method. The SQL injection alarm processing method and device provided by the embodiments of the present invention improve the efficiency of tracing the source of the SQL injection alarm.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a SQL injection alarm processing method and device. Background technique [0002] SQL injection is one of the more common network attack methods. It can be passed into web applications by constructing special inputs as parameters, and most of these inputs are some combinations in SQL syntax. By executing SQL statements, the attackers can execute the desired operations. The main reason is that the program does not carefully filter the data entered by the user, resulting in illegal data intrusion into the system. [0003] At present, most network security products mainly focus on the alarm logs of security devices in the detection, analysis and source tracing of SQL injection alarms, and most of the SQL injection alarm data lacks contextual correlation, and data association is basically based on a single product perspective, such as Security products on the host side cond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/55
CPCH04L63/1416H04L63/1466G06F21/554
Inventor 吴迪冯文华陈毓端唐伽佳
Owner 北京未来智安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products