Request processing method and device, server and computer readable storage medium

A request processing and server technology, applied in the field of network security, can solve problems such as inaccurate request detection and incomplete reception of response information

Pending Publication Date: 2022-04-12
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the detection process of this method, there is a situation that the response information is not fully received, resulting in inaccurate detection of the request.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request processing method and device, server and computer readable storage medium
  • Request processing method and device, server and computer readable storage medium
  • Request processing method and device, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It should be noted that terms such as "first" and "second" are only used for distinguishing descriptions, and should not be understood as indicating or implying relative importance. In the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0042] Please refer to figure 1 , the present application provides a server, and the server may include a processing module and a storage module. A computer program is stored in the storage module, and when the computer program is executed by the processing module, the server can execute the steps in the following request processing method.

[0043] It should be noted that the server may also include other modules, for example, the server may also include a communication module, configured to establish...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a request processing method and device, a server and a computer readable storage medium. The method comprises: mirroring an operation request received from a user terminal to obtain N mirroring requests, N being an integer greater than or equal to 2; sending the operation request to an original server, and respectively sending the N mirror image requests to N mirror image servers; within a first preset duration of sending the operation request, receiving all response information sent by the original server and the N mirror image servers according to the operation request and the N mirror image requests; and judging all the response information through a preset judgment strategy to obtain a detection result representing whether the operation request has a security threat or not. Therefore, all response information for all the requests can be collected, the comprehensive response information can improve the accuracy and reliability of security threat judgment on the operation request, and the judgment reliability can be prevented from being influenced by incomplete collection of the response information.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a request processing method, device, server and computer-readable storage medium. Background technique [0002] With the development of computer network, more and more people pay attention to Web security. As a visual management method, web management is widely used in the management of various devices. While the functions of web applications are becoming more and more extensive, there are more and more malicious attacks against the web, and the methods are becoming more and more diverse, such as forging HTTP (Hyper Text Transfer Protocol, hypertext transfer protocol) requests, using malicious request entrainment attacks To steal sensitive information inside the system, etc. [0003] Currently, mimic defense mechanisms exist to perform security checks on requests. That is, before sending the request to the responding server, the request needs to be sent to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
Inventor 马奔姚磊
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products