CN112187787A - Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph - Google Patents

Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph Download PDF

Info

Publication number
CN112187787A
CN112187787A CN202011031222.1A CN202011031222A CN112187787A CN 112187787 A CN112187787 A CN 112187787A CN 202011031222 A CN202011031222 A CN 202011031222A CN 112187787 A CN112187787 A CN 112187787A
Authority
CN
China
Prior art keywords
tampering
tamper
file
agent
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011031222.1A
Other languages
Chinese (zh)
Other versions
CN112187787B (en
Inventor
苏如春
孙少峰
练镜锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hantele Communication Co ltd
Original Assignee
Guangzhou Hantele Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hantele Communication Co ltd filed Critical Guangzhou Hantele Communication Co ltd
Priority to CN202011031222.1A priority Critical patent/CN112187787B/en
Publication of CN112187787A publication Critical patent/CN112187787A/en
Application granted granted Critical
Publication of CN112187787B publication Critical patent/CN112187787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Animal Behavior & Ethology (AREA)
  • Game Theory and Decision Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a digital marketing advertisement page tamper-proofing method based on a knowledge graph, firstly, identity verification is carried out, after the identity verification is passed, whether a tamper-proofing strategy configuration authority is possessed or not is judged, if yes, the tamper-proofing strategy configuration is carried out to generate a tamper-proofing strategy, and the tamper-proofing strategy is applied to a corresponding Web server provided with a tamper-proofing Agent; the management control terminal sends relevant access operation information of site files to the issuing Agent, after the site files are subjected to file filtering by the anti-tampering Agent and an anti-tampering strategy, the relevant access operation information passing the anti-tampering strategy passes through, webpage information after relevant access operation is uploaded and backed up, and relevant access information which does not pass the anti-tampering strategy is rejected. The invention can ensure that the protection function is not attacked maliciously or terminated illegally. The application also provides knowledge graph-based digital marketing advertisement page tamper-proof equipment which is used for ensuring the application and realization of the method in practice.

Description

Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
Technical Field
The application relates to the technical field of network security, in particular to a digital marketing advertisement page tamper-proofing method, device and equipment based on a knowledge graph.
Background
The technical standard of webpage tamper resistance in China is mainly 'page recovery', which is not really webpage tamper resistance and can be called as a webpage recovery system strictly, that is, the original backup page content is uncovered by the tampered page content when the tampering problem is found. The finding process adopts a file comparison mode, and in order to improve the detection efficiency, the 'webpage fingerprint', namely the watermark value of the webpage, is acquired. And (4) finding whether the webpage is tampered by comparing the watermark values, and providing an automatic recovery function. Such techniques are feasible with early web site visits at a modest level. However, this technique has a very important drawback, and this tamper-finding operation triggers the compare operation when the page is accessed externally, so to speak, with a severe lag. The working mechanism works at an application layer, the efficiency is low, the consumption of system resources is huge, the consumption usually exceeds more than 20% of the system resources, and especially when pages are intensively accessed at the same time, the situation that the pages cannot be normally accessed often occurs.
Disclosure of Invention
The application aims to provide a digital marketing advertisement page tamper-proofing method based on a knowledge graph, and aims to solve at least one of the problems in the prior art. The application also provides a digital marketing advertisement page tamper-proofing device, equipment and a computer readable storage medium based on the knowledge graph.
In order to achieve the above purpose, the present application provides the following technical solutions:
the method for preventing the digital marketing advertisement page from being tampered based on the knowledge graph is applied to a management control end, the management control end is arranged on a first server, and the method comprises the following steps:
acquiring identity authentication information and judging whether the identity authentication is passed or not;
after the authentication is passed, the user can use the authentication,
acquiring configuration information of the anti-tampering policy, judging whether the configuration authority is possessed, and generating the anti-tampering policy according to the configuration information of the anti-tampering policy when the configuration authority is possessed;
applying the generated anti-tampering strategy to a target anti-tampering Agent;
the anti-tampering strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
and sending the relevant access operation information of the site file to the publishing Agent.
The digital marketing advertisement page anti-tampering method based on the knowledge graph is further provided and is applied to an anti-tampering Agent, the anti-tampering Agent is arranged on a Web server, and the method comprises the following steps:
receiving an anti-tampering strategy from a management control terminal;
capturing a Web connection request, and carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy;
reporting the security risk existing in the Web site and the newly added security event data to the Web server;
carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the following steps:
for all contents of the file folder of the Web server, comparing the bottom file attributes of all the contents, monitoring the attributes of all the contents in real time through a built-in hash fast algorithm,
when the attribute is changed, copying the contents of the backup path folder in the publishing Agent to the corresponding file position of the monitoring folder in a pure file security copying mode.
The digital marketing advertisement page tamper-proofing method based on the knowledge graph is further provided and is applied to an issuing Agent, the issuing Agent is arranged on an updating server, and the method comprises the following steps:
receiving relevant access operation information of site files from a management control end;
executing corresponding change operation on a legal webpage according to the related access operation information;
checking the change of the file system of the user, and automatically synchronizing the change content of the file system of the user to one or more Web servers provided with the anti-tampering Agent;
and acquiring a file copy request from a tamper-resistant Agent, and sending the content of the backup path folder to the tamper-resistant Agent according to the file copy request.
Further, the information interaction is carried out through an SSL security protocol in the synchronization process of automatically synchronizing the change content of the file system of the Web server to one or more Web servers provided with the anti-tampering agents.
Further, the file system of the self specifically includes one or more combinations in FAT file system, NTFS file system, CDFS file system, ETC file system.
A digital marketing advertisement page tamper-proofing method based on knowledge graph is also provided, which is characterized in that the method comprises,
the identity verification is carried out at the management control end, after the identity verification is passed, whether a tamper-resistant strategy configuration authority is provided or not is judged, if yes, the tamper-resistant strategy configuration is carried out to generate a tamper-resistant strategy, and the tamper-resistant strategy is applied to a corresponding Web server provided with a tamper-resistant Agent;
the management control terminal sends relevant access operation information of site files to the issuing Agent, after the site files are subjected to file filtering by the anti-tampering Agent and an anti-tampering strategy, the relevant access operation information passing the anti-tampering strategy passes through, webpage information after relevant access operation is uploaded and backed up, and relevant access information which does not pass the anti-tampering strategy is rejected.
Further, the tamper-resistant policy configuration specifically includes configuration information of a scanning server and configuration information of read-write permission of a website resource file.
The invention also provides a digital marketing advertisement page tamper-proofing device based on the knowledge graph, which comprises the following components:
the system comprises a first server and a second server, wherein the first server is provided with a management control end and is used for acquiring identity authentication information, judging whether the identity authentication is passed or not, acquiring anti-tampering policy configuration information after the identity authentication is passed, judging whether the configuration authority is possessed or not, generating an anti-tampering policy according to the anti-tampering policy configuration information when the configuration authority is possessed, applying the generated anti-tampering policy to a target anti-tampering Agent, and sending relevant access operation information of a site file to an issuing Agent, wherein the anti-tampering policy comprises configuration information of a scanning server and configuration information of read-write authority of the site resource file;
the Web server is provided with an anti-tampering Agent and is used for receiving an anti-tampering strategy from a management control end, capturing a Web connection request, carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy, reporting security risks existing in a Web site and newly added security event data to the Web server, and carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the steps of carrying out automatic monitoring on all contents of a folder of the Web server in a mode of copying the contents of a backup path folder in the Agent to corresponding file positions of a monitoring folder in a pure file security copying mode by contrasting the bottom file attributes of all the contents and monitoring the attributes of all the contents in real time through a built-in hash fast algorithm when the attributes are changed;
and the updating server is provided with a publishing Agent and used for receiving relevant access operation information of the site file from a management control end, executing corresponding change operation on legal Web pages according to the relevant access operation information, checking the change of a file system of the updating server, automatically synchronizing the change content of the file system of the updating server to one or more Web servers provided with the anti-tampering Agent, acquiring a file copying request from the anti-tampering Agent, and sending the content of the backup path folder to the anti-tampering Agent according to the file copying request.
The invention also provides a digital marketing advertisement page tamper-proof device based on the knowledge graph, which comprises:
a memory for storing a computer program;
a processor for implementing the steps of the knowledge-graph based digital marketing advertising page tamper-proofing method according to any one of claims 1 to 7 when executing the computer program.
The present invention also proposes a computer readable storage medium having stored therein a computer program which, when executed by a processor, implements the steps of the method for preventing tampering of a knowledge-graph based digital marketing advertisement page according to any one of claims 1 to 7.
Has the advantages that:
according to the digital marketing advertisement page anti-tampering method based on the knowledge graph, the alteration of the content of a website file is monitored by setting the anti-tampering Agent and the release Agent, when the website file faces to access submitted data, firstly, the anti-tampering Agent carries out legality detection on related access submitted data according to a configured anti-tampering strategy, the issued data carries out content release by the release Agent, and the released content is backed up to be used as a recovery basis. In addition, the webpage tamper-resistant system uses a brand-new trigger type synchronization engine, so that real-time incremental synchronization can be better completed, and the stability of the website system for releasing and updating is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a first flowchart of a tamper-proofing method for a digital marketing advertisement page based on a knowledge graph provided in embodiment 1 of the present application;
FIG. 2 is a second flowchart of a tamper-proofing method for a digital marketing advertisement page based on a knowledge-graph provided in embodiment 2 of the present application;
FIG. 3 is a third flowchart of a tamper-proofing method for a knowledge-graph based digital marketing advertisement page provided in embodiment 3 of the present application;
FIG. 4 is a schematic structural diagram of a knowledge-graph-based digital marketing advertisement page tamper-proofing device provided by an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a knowledge-graph-based digital marketing advertisement page tamper-proofing device provided by an embodiment of the present application;
FIG. 6 is a fourth flowchart of a tamper-proofing method for a digital marketing advertisement page based on a knowledge-graph according to embodiment 4 of the present application;
FIG. 7 is a schematic diagram of an implementation of the method for tamper-proofing a digital marketing advertisement page based on a knowledge graph according to the present application;
fig. 8 is an action relation diagram of the digital marketing advertisement page tamper-proofing method based on the knowledge graph.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a first flowchart of a method for tamper-proofing a digital marketing advertisement page based on a knowledge graph according to an embodiment of the present application.
The method for providing the digital marketing advertisement page tamper-proofing based on the knowledge graph provided by the embodiment of the application is applied to a management control end, the management control end is arranged on a first server 100, and the method comprises the following steps:
step 110, obtaining identity authentication information and judging whether the identity authentication is passed;
after the authentication is passed, the user can use the authentication,
step 120, obtaining the configuration information of the anti-tampering policy, judging whether the configuration authority is provided, and generating the anti-tampering policy according to the configuration information of the anti-tampering policy when the configuration authority is provided;
step 130, applying the generated anti-tampering strategy to a target anti-tampering Agent;
the anti-tampering strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
and step 140, sending the relevant access operation information of the site file to the publishing Agent.
The method is different from the traditional anti-tampering software, the webpage anti-tampering system not only pays attention to the protection of the website file content, but also greatly enhances the auditing function of the access submitted data, and can better cope with the existing SQL injection attack with larger threat, XSS cross-site attack and the like which are all attacks by using the submitted data. In addition, the webpage tamper-resistant system uses a brand-new trigger type synchronization engine, so that real-time incremental synchronization can be better completed, and the stability of the website system for releasing and updating is ensured.
The management control terminal is mainly used for configuring, managing and checking various information of the monitoring terminal, and issuing site safety rules to the tamper-resistant Agent; the management control end is the central brain of the whole system and manages the operation, log recording and defense measures of the whole system. The read-write permission of the website directory and the files can be set by self, the operation behaviors of adding, deleting, changing and the like of the file directory are limited, and the webpage files are prevented from being illegally tampered;
mainly provides a system module for uniformly managing the safety protection and monitoring alarm of each advertisement site. And a server is independently deployed, and the anti-tampering strategy of the anti-tampering Agent module and the issuing Agent module are uniformly managed without depending on a web site. The administrator configures the read-write permission of the resource file of the advertisement site through the management control end and only allows the advertisement resource file to be updated through the publishing Agent process. And uniformly monitoring other processes which want to be modified, and intercepting the illegal modification when the illegal modification is detected. And setting various information such as a backup catalog of the advertisement file, a monitoring strategy and the like, and issuing the security strategy to the tamper-resistant Agent of each site.
Referring to fig. 2, in embodiment 2, a method for preventing a digital marketing advertisement page from being tampered based on a knowledge graph is further provided, where the method is applied to a tamper-resistant Agent, and the tamper-resistant Agent is disposed in a Web server 200, and the method includes:
step 210, receiving an anti-tampering policy from a management control terminal;
step 220, capturing a Web connection request, and carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy;
step 230, reporting the security risk existing in the Web site and the newly added security event data to the Web server 200;
step 240, performing automatic monitoring in an event triggering manner, where the automatic monitoring specifically includes:
for all contents of the folder of the Web server 200, the attributes of all the contents are monitored in real time by a built-in hash fast algorithm in comparison with the underlying file attributes of all the contents,
and step 250, copying the contents of the backup path folder in the issuing Agent to the corresponding file position of the monitoring folder in a pure file safe copying mode when the attribute is changed.
In embodiment 2, the tamper-resistant Agent program is installed on the Web server 200, and is mainly used for protecting, backing up and monitoring the site. The system is closely combined with Web services (IIS, Tomcat, Apache and the like), can capture all Web connection requests, can carry out validity detection on data contents and access requests submitted by users, and reports security risks existing in a Web site and newly-added security event data to a server according to a security policy configured by a system administrator or operation and maintenance personnel in a management control program. And simultaneously, responding to an instruction of a system administrator at a management control end, automatically monitoring in an event triggering mode, comparing all contents of the folder with the attributes of the files at the bottom layer, and monitoring in real time through a built-in hash fast algorithm. If the attribute change is found, copying the contents of the backup path folder to the corresponding file position of the monitoring folder in a non-protocol mode and a pure file security copying mode, and realizing the removal of security threats and the interception of malicious attacks on the web site. And the legality detection on the request is supported, and the illegal request is shielded. The SQL injection attack prevention is supported, the security feature library is timely upgraded, and the strong detection and defense capabilities are guaranteed.
The tamper-resistant Agent is installed on the Web server 200, and is mainly used for protecting, backing up and monitoring the resource files of the Web site according to a tamper-resistant strategy issued by the management control end. And intercepting the operations of tampering, deleting and the like of the webpage, and generating a log and giving an alarm. And after the legal request is passed, finally returning the legal request to the user.
Referring to fig. 3, in embodiment 3, a method for preventing a digital marketing advertisement page from being tampered based on a knowledge graph is further provided, where the method is applied to an issuing Agent, and the issuing Agent is disposed in an update server 300, and the method includes:
step 310, receiving relevant access operation information of site files from a management control end;
step 320, executing corresponding change operation on the legal webpage according to the relevant access operation information;
step 330, checking the change of the file system of the user, and automatically synchronizing the change content of the file system of the user to one or more Web servers 200 provided with the anti-tampering Agent;
and 340, acquiring a file copy request from the tamper-resistant Agent, and sending the content of the backup path folder to the tamper-resistant Agent according to the file copy request.
In embodiment 3, the publishing Agent module is installed on the update server 300, and generally only a system administrator can perform operation access to the site resource file, all operations such as publishing, updating, and the like of the site file must be performed through the publishing Agent, otherwise, the anti-tampering policy may be triggered to issue an alarm or the update is rolled back. The issuing process is to carry out communication and file transmission through an SSL (secure socket layer) security protocol, so that the security of the communication process is ensured. The website is automatically released again after the release is failed, and the website can be automatically updated after monitoring and changing through the management control module;
the publishing Agent program is installed on the update server 300, and is mainly used for publishing, updating and other operations on site files in real time. The change of a file system of the system is checked by adopting an advanced algorithm, the system is automatically synchronized to one or more target Web servers 200 provided with the anti-tampering module, and meanwhile, the system can also be used as the reference content during webpage recovery, so that the manual intervention is reduced, and the data synchronization of the main and standby catalogues or the main and standby servers is supported; CMS systems of various publishing functions or publishing modes are seamlessly docked; as a preferred implementation manner of embodiment 3, the security of the communication process is ensured by performing communication and file transmission through an SSL security protocol; and automatically re-issuing after the issuing fails, wherein the addition, modification and deletion of all legal webpages are carried out through an issuing Agent program.
As a preferred implementation manner of embodiment 3, the self file system specifically includes one or more combinations of a FAT file system, an NTFS file system, a CDFS file system, and an ETC file system.
Referring to fig. 6, embodiment 4 further proposes a digital marketing advertisement page tamper-proofing method based on knowledge-graph, which is characterized in that the method comprises,
identity verification is carried out at the management control end, after the identity verification is passed, whether a tamper-resistant strategy configuration authority is provided or not is judged, if yes, the tamper-resistant strategy configuration is carried out to generate a tamper-resistant strategy, and the tamper-resistant strategy is applied to the corresponding Web server 200 provided with a tamper-resistant Agent;
the management control terminal sends relevant access operation information of site files to the issuing Agent, after the site files are subjected to file filtering by the anti-tampering Agent and an anti-tampering strategy, the relevant access operation information passing the anti-tampering strategy passes through, webpage information after relevant access operation is uploaded and backed up, and relevant access information which does not pass the anti-tampering strategy is rejected.
As a preferred implementation manner of embodiment 4, the tamper-resistant policy configuration specifically includes configuration information of a scanning server and configuration information of read-write permission of a website resource file.
Referring to fig. 4, the present invention further provides a knowledge-graph-based digital marketing advertisement page tamper-proofing device, comprising:
the first server 100 is provided with a management control end and used for acquiring identity authentication information, judging whether the identity authentication passes or not, acquiring anti-tampering policy configuration information after the identity authentication passes, judging whether the configuration authority is provided or not, generating an anti-tampering policy according to the anti-tampering policy configuration information when the configuration authority is provided, applying the generated anti-tampering policy to a target anti-tampering Agent, wherein the anti-tampering policy comprises configuration information of a scanning server and configuration information of read-write authority of a website resource file, and sending related access operation information of the website file to a publishing Agent;
the Web server 200 is provided with an anti-tampering Agent and is used for receiving an anti-tampering strategy from a management control end, capturing a Web connection request, carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy, reporting security risks existing in a Web site and newly added security event data to the Web server 200, and carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the steps of carrying out automatic monitoring on all contents of a folder of the Web server 200 in a mode of copying the contents to corresponding file positions of a monitoring folder in a pure file security copying mode by contrasting the bottom file attributes of all the contents and monitoring the attributes of all the contents in real time through a built-in hash fast algorithm;
and the update server 300 is provided with a publishing Agent and used for receiving relevant access operation information of the site file from the management control end, executing corresponding change operation on legal Web pages according to the relevant access operation information, checking the change of the file system of the update server, automatically synchronizing the change content of the file system of the update server to one or more Web servers 200 provided with the anti-tampering Agent, acquiring a file copy request from the anti-tampering Agent, and sending the content of the backup path folder to the anti-tampering Agent according to the file copy request.
The whole device adopts a system driver level file protection technology (third generation tamper-proof technology) and is based on an event trigger type monitoring mechanism, so that the problems of passive defense, resource consumption and the like are effectively solved. The tamper-resistant system is divided into two major modules: static protection module and dynamic protection module. The static protection module is responsible for protecting the content part of the file on the website server, and the dynamic protection module is responsible for protecting the access submission data. Different from the traditional tamper-resistant software, the webpage tamper-resistant system not only attaches importance to the protection of the website file content, but also greatly enhances the auditing function of accessing submitted data (the existing SQL injection attack with a larger threat, the XSS cross-site attack and the like all belong to the attack by utilizing the submitted data). In addition, the webpage tamper-resistant system uses a brand-new trigger type synchronization engine, so that real-time incremental synchronization can be better completed, and the stability of the website system for releasing and updating is ensured.
The invention also provides a digital marketing advertisement page tamper-proof device based on the knowledge graph, which comprises:
a memory 400 for storing a computer program;
a processor 500 for implementing the steps of the knowledge-graph based digital marketing advertising page tamper-proofing method according to any one of claims 1 to 7 when executing the computer program.
Referring to fig. 5, the present invention also proposes a computer readable storage medium having stored therein a computer program which, when executed by a processor, implements the steps of the method for preventing tampering of a knowledge-graph-based digital marketing advertisement page according to any one of claims 1 to 7.
The technical scheme can enable the invention to have the following advantages:
1. advanced technology
The advanced file drive tamper-proof technology is adopted, and the method is stable, reliable, efficient and high in compatibility. The new generation of kernel driver and file protection ensures that the protection function is not attacked maliciously or terminated illegally. And large-scale continuous tampering attack protection is supported.
2. Completely blocking tampering
By adopting a file driving technology and an event triggering mechanism, tampering attack can be thoroughly blocked instead of recovering after the content of the website file is tampered. The mechanism can guarantee the system security more perfectly under the condition of violent tampering (continuous and repeated tampering of a plurality of files by using scripts or programs).
3. Real-time incremental update
The synchronization also adopts a trigger mechanism, and can respond to incremental updating in real time. Compared with a polling type updating detection mode of the similar product, the triggered incremental updating system occupies smaller resources, is higher in updating speed and is higher in efficiency.
Web publishing Security
General website update and release can be directly released to a Web path, and the Web path with writable right is often a weak link causing security risk. If the synchronization mode provided by the webpage tamper-proof system is used, the unnecessary writable permission of the Web path can be effectively avoided, the safety of the original file content is ensured, and meanwhile, the malicious file script cannot be written in.
5. Comprehensive protection
Real-time dynamic attack protection is combined, and data security of various webpages and websites is comprehensively protected. And the tampering detection in the trunk/connection state is supported. And the protection of multiple servers, multiple sites and various file types is supported.
Referring to fig. 7, the hardware principle of the present invention is as follows,
the method comprises the steps that a user-mode application program sends out a webpage request, after monitoring and inspection is carried out through a digital marketing advertisement page anti-tampering device based on a knowledge map at an I/O manager, access control/operation audit/read is carried out at a kernel file access filtering drive, a path file system comprises one or more combinations of an FAT file system, an NTFS file system, a CDFS file system and an ETC file system, and then the webpage request is stored in storage equipment through a storage equipment drive program.
Referring to fig. 8, some examples of specific application scenarios below, the guangdong mobile APP channel daily user exceeds 1000 ten thousand, supporting the provision of accurate marketing information push for the user in the form of APP home popup, home page, check-in page ad spot, living channel, page Banner zone, etc. The honeycomb fine marketing is based on a honeycomb big data DMP platform as a capability basis, a multidimensional internet channel is gathered, the flow is communicated from the whole flow of precise advertisement and equity delivery of an advertiser-channel-user, the target customer is quickly positioned and touched, and the marketing success rate is improved. And acquiring information such as advertisement resource files from the advertisement platform through the interface, and dynamically displaying the information to the Guangdong mobile APP. And the webpage anti-tampering Agent is installed to ensure that the advertisement content is not tampered and is normally displayed.
The computer-readable storage media to which this application relates include Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage media known in the art.
For a description of relevant parts in the digital marketing advertisement page tamper-proofing device, the equipment and the computer readable storage medium based on the knowledge graph provided in the embodiment of the present application, reference is made to detailed descriptions of corresponding parts in the digital marketing advertisement page tamper-proofing method based on the knowledge graph provided in the embodiment of the present application, and details are not repeated here. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The digital marketing advertisement page tamper-proofing method based on the knowledge graph is characterized by being applied to a management control end, wherein the management control end is arranged on a first server, and the method comprises the following steps:
acquiring identity authentication information and judging whether the identity authentication is passed or not;
after the authentication is passed, the user can use the authentication,
acquiring configuration information of the anti-tampering policy, judging whether the configuration authority is possessed, and generating the anti-tampering policy according to the configuration information of the anti-tampering policy when the configuration authority is possessed;
applying the generated anti-tampering strategy to a target anti-tampering Agent;
the anti-tampering strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
and sending the relevant access operation information of the site file to the publishing Agent.
2. The digital marketing advertisement page tamper-proofing method based on the knowledge graph is characterized by being applied to a tamper-proofing Agent, wherein the tamper-proofing Agent is arranged on a Web server, and the method comprises the following steps:
receiving an anti-tampering strategy from a management control terminal;
capturing a Web connection request, and carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy;
reporting the security risk existing in the Web site and the newly added security event data to the Web server;
carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the following steps:
for all contents of the file folder of the Web server, comparing the bottom file attributes of all the contents, monitoring the attributes of all the contents in real time through a built-in hash fast algorithm,
when the attribute is changed, copying the contents of the backup path folder in the publishing Agent to the corresponding file position of the monitoring folder in a pure file security copying mode.
3. The digital marketing advertisement page tamper-proofing method based on the knowledge graph is characterized by being applied to an issuing Agent, wherein the issuing Agent is arranged on an updating server, and the method comprises the following steps:
receiving relevant access operation information of site files from a management control end;
executing corresponding change operation on a legal webpage according to the related access operation information;
checking the change of the file system of the user, and automatically synchronizing the change content of the file system of the user to one or more Web servers provided with the anti-tampering Agent;
and acquiring a file copy request from a tamper-resistant Agent, and sending the content of the backup path folder to the tamper-resistant Agent according to the file copy request.
4. The knowledge-graph-based digital marketing advertisement page tamper-proofing method according to claim 3, wherein the synchronization process of automatically synchronizing the changed contents of the file system of the user to one or more Web servers installed with the tamper-proofing Agent performs information interaction through SSL security protocol.
5. The knowledge-graph-based digital marketing advertisement page tamper-proofing method according to claim 3, wherein the self file system specifically comprises one or more combinations of a FAT file system, an NTFS file system, a CDFS file system and an ETC file system.
6. A digital marketing advertisement page tamper-proofing method based on knowledge graph, which is characterized in that the method comprises,
the identity verification is carried out at the management control end, after the identity verification is passed, whether a tamper-resistant strategy configuration authority is provided or not is judged, if yes, the tamper-resistant strategy configuration is carried out to generate a tamper-resistant strategy, and the tamper-resistant strategy is applied to a corresponding Web server provided with a tamper-resistant Agent;
the management control terminal sends relevant access operation information of site files to the issuing Agent, after the site files are subjected to file filtering by the anti-tampering Agent and an anti-tampering strategy, the relevant access operation information passing the anti-tampering strategy passes through, webpage information after relevant access operation is uploaded and backed up, and relevant access information which does not pass the anti-tampering strategy is rejected.
7. The knowledge-graph-based digital marketing advertisement page tamper-proofing method according to claim 6, wherein the tamper-proofing policy configuration specifically comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file.
8. Digital marketing advertisement page tamper-proofing device based on knowledge graph, its characterized in that includes:
the system comprises a first server and a second server, wherein the first server is provided with a management control end and is used for acquiring identity authentication information, judging whether the identity authentication is passed or not, acquiring anti-tampering policy configuration information after the identity authentication is passed, judging whether the configuration authority is possessed or not, generating an anti-tampering policy according to the anti-tampering policy configuration information when the configuration authority is possessed, applying the generated anti-tampering policy to a target anti-tampering Agent, and sending relevant access operation information of a site file to an issuing Agent, wherein the anti-tampering policy comprises configuration information of a scanning server and configuration information of read-write authority of the site resource file;
the Web server is provided with an anti-tampering Agent and is used for receiving an anti-tampering strategy from a management control end, capturing a Web connection request, carrying out validity detection on data content and an access request attached to the Web connection request according to the anti-tampering strategy, reporting security risks existing in a Web site and newly added security event data to the Web server, and carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the steps of carrying out automatic monitoring on all contents of a folder of the Web server in a mode of copying the contents of a backup path folder in the Agent to corresponding file positions of a monitoring folder in a pure file security copying mode by contrasting the bottom file attributes of all the contents and monitoring the attributes of all the contents in real time through a built-in hash fast algorithm when the attributes are changed;
and the updating server is provided with a publishing Agent and used for receiving relevant access operation information of the site file from a management control end, executing corresponding change operation on legal Web pages according to the relevant access operation information, checking the change of a file system of the updating server, automatically synchronizing the change content of the file system of the updating server to one or more Web servers provided with the anti-tampering Agent, acquiring a file copying request from the anti-tampering Agent, and sending the content of the backup path folder to the anti-tampering Agent according to the file copying request.
9. Digital marketing advertisement page tamper-proofing device based on a knowledge graph, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the knowledge-graph based digital marketing advertising page tamper-proofing method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, which when executed by a processor, implements the steps of the method for tamper-proofing a knowledge-graph-based digital marketing advertisement page according to any one of claims 1 to 7.
CN202011031222.1A 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph Active CN112187787B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011031222.1A CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011031222.1A CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Publications (2)

Publication Number Publication Date
CN112187787A true CN112187787A (en) 2021-01-05
CN112187787B CN112187787B (en) 2023-10-10

Family

ID=73944967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011031222.1A Active CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Country Status (1)

Country Link
CN (1) CN112187787B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837772A (en) * 2021-09-24 2021-12-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for auditing marketing information

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778137A (en) * 2010-01-15 2010-07-14 蓝盾信息安全技术股份有限公司 System and method for preventing webpage from being falsified
CN104348914A (en) * 2014-10-31 2015-02-11 福建六壬网安股份有限公司 Tamper-proofing system file synchronizing system and tamper-proofing system file synchronizing method
CN106682529A (en) * 2017-01-04 2017-05-17 北京国舜科技股份有限公司 Anti-tampering method and anti-tampering terminal
CN109145536A (en) * 2017-06-19 2019-01-04 北京金山云网络技术有限公司 A kind of webpage integrity assurance and device
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN110188574A (en) * 2019-06-06 2019-08-30 上海帆一尚行科技有限公司 A kind of the webpage tamper resistant systems and its method of Docker container
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778137A (en) * 2010-01-15 2010-07-14 蓝盾信息安全技术股份有限公司 System and method for preventing webpage from being falsified
CN104348914A (en) * 2014-10-31 2015-02-11 福建六壬网安股份有限公司 Tamper-proofing system file synchronizing system and tamper-proofing system file synchronizing method
CN106682529A (en) * 2017-01-04 2017-05-17 北京国舜科技股份有限公司 Anti-tampering method and anti-tampering terminal
CN109145536A (en) * 2017-06-19 2019-01-04 北京金山云网络技术有限公司 A kind of webpage integrity assurance and device
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN110188574A (en) * 2019-06-06 2019-08-30 上海帆一尚行科技有限公司 A kind of the webpage tamper resistant systems and its method of Docker container
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837772A (en) * 2021-09-24 2021-12-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for auditing marketing information

Also Published As

Publication number Publication date
CN112187787B (en) 2023-10-10

Similar Documents

Publication Publication Date Title
US10977370B2 (en) Method of remediating operations performed by a program and system thereof
Gómez-Hernández et al. R-Locker: Thwarting ransomware action through a honeyfile-based approach
US11507663B2 (en) Method of remediating operations performed by a program and system thereof
US9306956B2 (en) File system level data protection during potential security breach
EP3362937B1 (en) Method of remediating a program and system thereof by undoing operations
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
KR101080953B1 (en) System and method for detecting and protecting webshell in real-time
Pennington et al. Storage-based intrusion detection
CN113901450A (en) Industrial host terminal safety protection system
US9860261B2 (en) System for analyzing and maintaining data security in backup data and method thereof
TWI691860B (en) Method and computer system for preventing malicious software from attacking files of the computer system and corresponding non-transitory computer readable storage medium
CN107045605A (en) A kind of real-time metrics method and device
CN112187787B (en) Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN113114676B (en) Web safety protection and monitoring system
Viswanathan et al. Dynamic monitoring of website content and alerting defacement using trusted platform module
KR102309695B1 (en) File-based deception technology for thwarting malicious users
US20230229792A1 (en) Runtime risk assessment to protect storage systems from data loss
US20220255962A1 (en) Systems and methods for creation, management, and storage of honeyrecords
Qi et al. The research of website tamper-resistant technology
Zhuang Research on the Security Model Design of Accounting Information System Based on the B/S Model
CN117375880A (en) Webpage tamper-proof system and method
Kimathi A Platform for monitoring of security and audit events: a test case with windows systems
CN117675409A (en) Network attack defending system and control method thereof
CN117473565A (en) Node operation method and device of service cluster, storage medium and electronic equipment
HIPAA et al. The Art of Database Monitoring

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant