CN112187787B - Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph - Google Patents

Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph Download PDF

Info

Publication number
CN112187787B
CN112187787B CN202011031222.1A CN202011031222A CN112187787B CN 112187787 B CN112187787 B CN 112187787B CN 202011031222 A CN202011031222 A CN 202011031222A CN 112187787 B CN112187787 B CN 112187787B
Authority
CN
China
Prior art keywords
tamper
proof
file
server
web
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011031222.1A
Other languages
Chinese (zh)
Other versions
CN112187787A (en
Inventor
苏如春
孙少峰
练镜锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hantele Communication Co ltd
Original Assignee
Guangzhou Hantele Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hantele Communication Co ltd filed Critical Guangzhou Hantele Communication Co ltd
Priority to CN202011031222.1A priority Critical patent/CN112187787B/en
Publication of CN112187787A publication Critical patent/CN112187787A/en
Application granted granted Critical
Publication of CN112187787B publication Critical patent/CN112187787B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Animal Behavior & Ethology (AREA)
  • Quality & Reliability (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computational Linguistics (AREA)
  • Game Theory and Decision Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a digital marketing advertisement page tamper-proof method based on a knowledge graph, which comprises the steps of firstly carrying out identity verification, judging whether tamper-proof strategy configuration permission is provided after the identity verification is passed, if so, carrying out tamper-proof strategy configuration to generate tamper-proof strategies, and applying the tamper-proof strategies to corresponding Web servers provided with tamper-proof agents; the management control end sends relevant access operation information of the website file to the issuing Agent, after the file is filtered by the tamper-proof Agent through the tamper-proof strategy, the relevant access operation information passing through the tamper-proof strategy is passed, and then webpage information after the relevant access operation is uploaded and backed up, and the relevant access information which does not pass through the tamper-proof strategy is rejected. The application can ensure that the protection function is not attacked by malicious or illegally terminated. The application also provides a digital marketing advertisement page tamper-proof device based on the knowledge graph, which is used for ensuring the practical application and realization of the method.

Description

Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
Technical Field
The application relates to the technical field of network security, in particular to a digital marketing advertisement page tamper-proof method, device and equipment based on a knowledge graph.
Background
The technical standard of tamper resistance of domestic web pages is mainly page restoration, which is not true web page tamper resistance, and the method can be strictly called as a web page restoration system, namely that the problem of tamper is found to cover the original backup page content with tampered page content. The finding process adopts a file comparison mode, and in order to improve the detection efficiency, the 'webpage fingerprint', namely the watermark value of the webpage, is acquired. And comparing the watermark values to find out whether the webpage is tampered or not, and providing an automatic recovery function. Such techniques are feasible with a low amount of early web site access. However, this technique has the very important drawback that this operation of finding tampering triggers a comparison operation when the page is accessed externally, which can be said to be a serious hysteresis. The working mechanism works in an application layer, the efficiency is relatively low, the consumption of system resources is huge, and the consumption of the system resources is usually more than 20% of the consumption of the system resources, and especially, when pages are accessed in a concentrated mode at the same time, the condition that the pages cannot be accessed normally often occurs.
Disclosure of Invention
The application aims to provide a digital marketing advertisement page tamper-proof method based on a knowledge graph, which aims to at least solve one of the problems existing in the prior art. The application also provides a digital marketing advertisement page tamper-proof device, a device and a computer readable storage medium based on the knowledge graph.
In order to achieve the above object, the present application provides the following technical solutions:
the digital marketing advertisement page tamper-proof method based on the knowledge graph is applied to a management control end, wherein the management control end is arranged on a first server, and the method comprises the following steps:
acquiring identity verification information and judging whether the identity verification information passes or not;
after the authentication has been passed through the authentication,
acquiring tamper-resistant policy configuration information, judging whether the configuration rights are provided, and generating a tamper-resistant policy according to the tamper-resistant policy configuration information when the configuration rights are provided;
applying the generated tamper-resistant policy to the target tamper-resistant Agent;
the tamper-proof strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
and sending relevant access operation information of the site file to the issuing Agent.
The digital marketing advertisement page tamper-proof method based on the knowledge graph is also provided and applied to tamper-proof agents, wherein the tamper-proof agents are arranged on a Web server, and the method comprises the following steps:
receiving a tamper-proof strategy from a management control end;
capturing a Web connection request, and detecting validity of data content and an access request attached to the Web connection request according to the tamper-proof strategy;
reporting security risks existing in the Web site and newly-added security event data to the Web server;
the automatic monitoring is performed in an event triggering mode, and specifically comprises the following steps:
for all contents of the folder of the Web server, the attributes of all the contents are monitored in real time by a built-in hash fast algorithm against the attributes of the bottom files of all the contents,
and when the attribute is changed, copying the backup path folder content in the issuing Agent to the corresponding file position of the monitoring folder in a pure file secure copying mode.
The digital marketing advertisement page tamper-proof method based on the knowledge graph is also provided and applied to a release Agent, wherein the release Agent is arranged on an update server, and the method comprises the following steps:
receiving relevant access operation information of a site file from a management control end;
executing corresponding changing operation on the legal web page according to the related access operation information;
checking the change of the self file system, and automatically synchronizing the change content of the self file system to one or more Web servers provided with the tamper-resistant Agent;
and acquiring a file copy request from the tamper-resistant Agent, and sending the content of the backup path folder to the tamper-resistant Agent according to the file copy request.
Further, the synchronization process of automatically synchronizing the changing content of the own file system to one or more Web servers provided with the tamper-resistant Agent performs information interaction through SSL security protocol.
Further, the self file system specifically includes one or more combinations of a FAT file system, an NTFS file system, a CDFS file system, and an ETC file system.
Also provides a digital marketing advertisement page tamper-proof method based on the knowledge graph, which is characterized in that the method comprises the following steps,
after the identity verification is passed, judging whether the anti-tampering policy configuration authority is provided, if so, performing anti-tampering policy configuration to generate an anti-tampering policy, and applying the anti-tampering policy to a corresponding Web server provided with anti-tampering agents;
the management control end sends relevant access operation information of the site file to the issuing Agent, after the file is filtered by the tamper-proof Agent through the tamper-proof strategy, the relevant access operation information passing through the tamper-proof strategy is passed, webpage information after the relevant access operation is uploaded and backed up, and the relevant access information which does not pass through the tamper-proof strategy is rejected.
Further, the tamper-proof policy configuration specifically includes configuration information of the scan server and configuration information of read-write permission of the website resource file.
The application also provides a digital marketing advertisement page tamper-proof device based on the knowledge graph, which comprises:
the system comprises a first server, a second server and a third server, wherein the first server is provided with a management control end and is used for acquiring identity verification information, judging whether the identity verification is passed, acquiring tamper-proof strategy configuration information after the identity verification is passed, judging whether the configuration authority is provided, generating tamper-proof strategy according to the tamper-proof strategy configuration information when the configuration authority is provided, applying the generated tamper-proof strategy to a target tamper-proof Agent, wherein the tamper-proof strategy comprises the configuration information of a scanning server and the configuration information of the read-write authority of a website resource file, and sending related access operation information of the website file to a release Agent;
the Web server is provided with tamper-proof agents, and is used for receiving tamper-proof strategies from a management control end, capturing Web connection requests, carrying out validity detection on data content and access requests attached to the Web connection requests according to the tamper-proof strategies, reporting security risks existing in Web sites and newly added security event data to the Web server, and carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the steps of copying the contents of folders of the Web server to the corresponding file positions of the monitored folders in a pure file security copying mode when the change of the attributes occurs, and monitoring the attributes of all the contents in real time by a built-in hash quick algorithm against the attributes of the bottom files of the contents;
the update server is provided with a release Agent and is used for receiving relevant access operation information of the website file from the management control end, executing corresponding change operation on the legal Web page according to the relevant access operation information, checking change of a self file system, automatically synchronizing change contents of the self file system to one or more Web servers provided with the tamper-proof Agent, acquiring a file copy request from the tamper-proof Agent, and sending backup path folder contents to the tamper-proof Agent according to the file copy request.
The application also provides digital marketing advertisement page tamper-proof equipment based on the knowledge graph, which comprises:
a memory for storing a computer program;
and the processor is used for realizing the digital marketing advertisement page tamper-proof method based on the knowledge graph when executing the computer program.
The application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the steps of the digital marketing advertisement page tamper-proof method based on the knowledge graph when being executed by a processor.
Advantageous effects
According to the digital marketing advertisement page tamper-proof method based on the knowledge graph, tamper-proof agents and issuing agents are arranged to monitor changes of website file contents, when a website file faces access submitted data, the tamper-proof agents firstly conduct legitimacy detection on related access submitted data according to configured tamper-proof strategies, the issuing agents conduct content issue on passing data and take the issued contents as a basis for recovery, and unlike traditional tamper-proof software, the webpage tamper-proof system not only pays attention to protection of the website file contents, but also greatly enhances audit functions of the access submitted data, and can better cope with SQL injection attacks, XSS cross-site attacks and the like which are greatly threatened at present, and belong to attacks conducted by using the submitted data. In addition, the webpage tamper-proof system uses a brand new trigger type synchronization engine, so that real-time incremental synchronization can be completed better, and the stability of website system release update is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
Fig. 1 is a first flowchart of a digital marketing advertisement page tamper-proof method based on a knowledge graph provided in embodiment 1 of the present application;
FIG. 2 is a second flowchart of a digital marketing advertisement page tamper-proof method based on a knowledge graph provided in embodiment 2 of the present application;
FIG. 3 is a third flowchart of a digital marketing advertisement page tamper-proof method based on a knowledge graph provided in embodiment 3 of the present application;
fig. 4 is a schematic structural diagram of a digital marketing advertisement page tamper-proof device based on a knowledge graph according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a digital marketing advertisement page tamper-proof device based on a knowledge graph according to an embodiment of the present application;
fig. 6 is a fourth flowchart of a digital marketing advertisement page tamper-proof method based on a knowledge graph provided in embodiment 4 of the present application;
FIG. 7 is a schematic diagram of an implementation of the knowledge-based digital marketing advertisement page tamper-proof method of the present application;
fig. 8 is a functional diagram of the digital marketing advertisement page tamper-proof method based on the knowledge graph.
Description of the embodiments
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, fig. 1 is a first flowchart of a digital marketing advertisement page tamper-proof method based on a knowledge graph according to an embodiment of the present application.
The method for preventing the digital marketing advertisement page from being tampered based on the knowledge graph, which is provided by the embodiment of the application, is applied to a management control end, wherein the management control end is arranged on a first server 100, and the method comprises the following steps:
step 110, acquiring identity verification information, and judging whether the identity verification is passed;
after the authentication has been passed through the authentication,
step 120, obtaining tamper-proof policy configuration information, judging whether the configuration authority is provided, and generating a tamper-proof policy according to the tamper-proof policy configuration information when the configuration authority is provided;
step 130, applying the generated tamper-proof policy to the target tamper-proof Agent;
the tamper-proof strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
and 140, sending relevant access operation information of the site file to the issuing Agent.
In embodiment 1, tamper-proof agents are set and release agents are used for monitoring changes of website file contents, when the website file faces access submitted data, the tamper-proof agents firstly perform validity detection on related access submitted data according to configured tamper-proof policies, release the contents of the passed data by the release agents, and take the released contents as a recovery basis. In addition, the webpage tamper-proof system uses a brand new trigger type synchronization engine, so that real-time incremental synchronization can be completed better, and the stability of website system release update is ensured.
The management control end is mainly used for configuring, managing and checking various information of the monitoring end and issuing site security rules to the tamper-resistant Agent; the management control end is the central brain of the whole system and manages the operation, log record and defending measures of the whole system. The read-write permission of the website catalogue and the file can be set in a self-defined mode, the operation behaviors such as adding, deleting and changing the file catalogue are limited, and the web page file is ensured not to be illegally tampered;
the system mainly provides a system module for uniformly managing the safety protection and monitoring alarm of each advertising site. And independently deploying a server, and uniformly managing the tamper-proof strategy of the tamper-proof Agent module and the release Agent module without depending on a web site. An administrator configures the read-write permission of the resource file of the advertisement site through the management control end, and only allows the advertisement resource file to be updated through the issuing Agent process. For the uniform monitoring of other processes which want to be modified, the illegal modification is detected to be intercepted. Setting various information such as backup catalogues of advertisement files, monitoring strategies and the like, and issuing security strategies to tamper-proof agents of all sites.
Referring to fig. 2, embodiment 2 also proposes a knowledge graph-based digital marketing advertisement page tamper-proof method applied to a tamper-proof Agent, where the tamper-proof Agent is disposed on a Web server 200, the method includes:
step 210, receiving a tamper-proof policy from a management control end;
step 220, capturing a Web connection request, and detecting validity of data content and an access request attached to the Web connection request according to the tamper-proof strategy;
step 230, reporting the security risk existing in the Web site and the newly added security event data to the Web server 200;
step 240, performing automatic monitoring in an event triggering manner, where the automatic monitoring specifically includes:
for all contents of the folder of the Web server 200, the attributes of all the contents are monitored in real time by a built-in hash algorithm against the attributes of the underlying files of all the contents,
and 250, copying the backup path folder content in the issuing Agent to the corresponding file position of the monitoring folder in a pure file secure copying mode when the attribute change occurs.
In embodiment 2, the tamper resistant Agent program is installed on the Web server 200, mainly for protecting and monitoring the site. The Web server is tightly combined with Web services (IIS, tomcat, apache and the like), can capture all Web connection requests, can detect the validity of data content and access requests submitted by users, and reports the security risk and newly added security event data of the Web sites according to security policies configured by a system administrator or operation and maintenance personnel in a management control program. And simultaneously, responding to the instruction of a system administrator at a management control end, automatically monitoring in an event triggering mode, and monitoring all contents of the folder in real time by a built-in hash fast algorithm against the attribute of the bottom file. If the attribute is found to be changed, copying the content of the backup path folder to the corresponding file position of the monitoring folder in a non-protocol mode and a pure file secure copying mode, so as to realize security threat removal and malicious attack interception on the web station. And supporting validity detection of the request and shielding illegal requests. The SQL injection attack prevention is supported, the security feature library is updated in time, and the powerful detection and defense capabilities are ensured.
The tamper-proof Agent is installed on the Web server 200, and is mainly used for protecting, backing up and monitoring the resource files of the Web site according to the tamper-proof strategy issued by the management control end. Intercepting operations such as tampering and deleting the webpage, and generating logs and alarms. After the legal request is passed, it is finally returned to the user.
Referring to fig. 3, embodiment 3 also proposes a digital marketing advertisement page tamper-proof method based on a knowledge graph, applied to a release Agent, where the release Agent is set in an update server 300, the method includes:
step 310, receiving relevant access operation information of the site file from the management control end;
step 320, executing corresponding change operation on the synthetic web page according to the related access operation information;
step 330, checking the change of the own file system, and automatically synchronizing the change content of the own file system to one or more Web servers 200 installed with the tamper-resistant Agent;
and 340, acquiring a file copy request from the tamper-resistant Agent, and sending the content of the backup path folder to the tamper-resistant Agent according to the file copy request.
In embodiment 3, the issuing Agent module is installed on the update server 300, and generally only a system administrator can access the site resource file in an operation manner, all operations such as issuing and updating the site file must be performed through the issuing Agent operation, otherwise, an anti-tampering policy may be triggered to issue an alarm or the update is rolled back. The release process is to communicate and transmit files through SSL security protocol, so as to ensure the security of the communication process. The website is automatically reissued after the release failure, and the website can be automatically updated after monitoring and changing through the management control module;
the publishing Agent program is installed on the update server 300, and mainly performs operations such as publishing and real-time updating on site files. The change of the file system is checked by adopting an advanced algorithm, and the change is automatically synchronized to one or more target Web servers 200 provided with tamper-proof modules, and meanwhile, the change can also be used as reference content in webpage recovery, so that manual intervention is reduced, and the data synchronization of a master catalog or a master server and a slave server is supported; the CMS system with various release functions or release modes is in seamless connection; as a preferred implementation manner of example 3, communication and file transmission are performed through SSL security protocol, so as to ensure security of communication process; and automatically reissuing after the release failure, and adding, modifying and deleting all legal webpages through a release Agent program.
As a preferred implementation of embodiment 3, the self file system specifically includes one or more combinations of FAT file system, NTFS file system, CDFS file system, ETC file system.
Referring to fig. 6, embodiment 4 also proposes a digital marketing advertisement page tamper-proof method based on a knowledge-graph, characterized in that the method comprises,
after the identity verification is passed, judging whether the anti-tampering policy configuration authority is provided, if so, performing anti-tampering policy configuration to generate an anti-tampering policy, and applying the anti-tampering policy to a corresponding Web server 200 provided with anti-tampering agents;
the management control end sends relevant access operation information of the site file to the issuing Agent, after the file is filtered by the tamper-proof Agent through the tamper-proof strategy, the relevant access operation information passing through the tamper-proof strategy is passed, webpage information after the relevant access operation is uploaded and backed up, and the relevant access information which does not pass through the tamper-proof strategy is rejected.
As a preferred implementation manner of embodiment 4, the tamper-resistant policy configuration specifically includes configuration information of the scan server and configuration information of the read-write permission of the website resource file.
Referring to fig. 4, the application further provides a digital marketing advertisement page tamper-proof device based on a knowledge graph, which comprises:
the first server 100 is provided with a management control end, and is used for acquiring identity verification information, judging whether the identity verification is passed, acquiring tamper-proof strategy configuration information after the identity verification is passed, judging whether the configuration authority is provided, generating tamper-proof strategy according to the tamper-proof strategy configuration information when the configuration authority is provided, and applying the generated tamper-proof strategy to a target tamper-proof Agent, wherein the tamper-proof strategy comprises the configuration information of a scanning server and the configuration information of the read-write authority of a website resource file, and sending relevant access operation information of the website file to a release Agent;
the Web server 200 is provided with a tamper-resistant Agent, and is used for receiving a tamper-resistant policy from a management control end, capturing a Web connection request, detecting the legitimacy of data content and an access request attached to the Web connection request according to the tamper-resistant policy, reporting security risks existing in a Web site and newly added security event data to the Web server 200, and automatically monitoring in an event-triggered manner, wherein the automatic monitoring specifically comprises that all contents of a folder of the Web server 200 are compared with the bottom file attributes of all the contents, the attributes of all the contents are monitored in real time through a built-in hash fast algorithm, and when the attribute change occurs, the contents of a backup path folder in the issuing Agent are copied to the corresponding file positions of the monitored folder in a pure file secure copying manner;
the update server 300 is provided with a release Agent, and is configured to receive relevant access operation information of a website file from a management control end, execute corresponding change operation on a synthetic Web page according to the relevant access operation information, check changes of a file system of the update server, automatically synchronize changing contents of the file system of the update server to one or more Web servers 200 provided with the tamper-proof Agent, acquire a file copy request from the tamper-proof Agent, and send contents of a backup path folder to the tamper-proof Agent according to the file copy request.
The whole device adopts a system driving level file protection technology (third generation anti-tampering technology) and is based on an event trigger type monitoring mechanism, so that the problems of passive defense, resource consumption and the like are effectively solved. The tamper-resistant system is divided into two major modules: static protection module and dynamic protection module. The static protection module is responsible for protecting the file content part on the website server, and the dynamic protection module is responsible for protecting the access submitted data. Different from traditional tamper-proof software, the webpage tamper-proof system not only pays attention to the protection of website file content, but also greatly enhances the audit function of access to submitted data (SQL injection attack with larger threat, XSS cross-site attack and the like at present belong to attacks performed by using submitted data). In addition, the webpage tamper-proof system uses a brand new trigger type synchronization engine, so that real-time incremental synchronization can be completed better, and the stability of website system release update is ensured.
The application also provides digital marketing advertisement page tamper-proof equipment based on the knowledge graph, which comprises:
a memory 400 for storing a computer program;
and the processor 500 is used for implementing the steps of the digital marketing advertisement page tamper-proof method based on the knowledge graph when executing the computer program.
Referring to fig. 5, the present application further proposes a computer readable storage medium having a computer program stored therein, which when executed by a processor implements the steps of the knowledge-graph-based digital marketing advertisement page tamper-proof method.
The technical scheme can lead the application to have the following advantages:
1. advanced technology
Advanced file driving tamper-proof technology is adopted, and the method is stable, reliable, efficient and high in compatibility. The new generation of kernel driver and file protection ensures that the protection function is not attacked by malicious or illegally terminated. Support large-scale continuous tamper attack protection.
2. Blocking tampering completely
By adopting the file driving technology and the event triggering mechanism, the tamper attack can be thoroughly blocked instead of waiting for the recovery after the content of the website file is tampered. The mechanism can more perfectly ensure the system safety under the condition of violent tampering (continuous and repeated tampering of a plurality of files by utilizing scripts or programs).
3. Real-time delta update
The synchronization also adopts a trigger mechanism, and can respond to the increment update in real time. Compared with the polling type updating detection mode of similar products, the triggering type incremental updating system has smaller resource occupation, faster updating speed and higher efficiency.
Web publication security
Typical Web site updates are published directly to the Web path, which is often a weak link that leads to security risks. If the synchronous mode provided by the webpage tamper-proof system is used, unnecessary writable permissions can be effectively prevented from being opened by the Web path, the safety of original file contents is ensured, and meanwhile, malicious file scripts cannot be written.
5. Comprehensive protection
The real-time dynamic attack protection is combined, and the safety of various webpages and website data is comprehensively protected. And supports tamper detection in a relay/connection state. Support multiple servers, multiple sites, protection of various file types.
Referring to fig. 7, the hardware principles of the present application are as follows,
the user-state application program sends out a webpage request, the digital marketing advertisement page tamper-proof device based on the knowledge graph at the I/O manager is used for monitoring and checking, and the access control/operation audit/read path file system comprises one or more combinations of a FAT file system, an NTFS file system, a CDFS file system and an ETC file system at the kernel file access filtering driver, and then the file system is stored in the storage device through the storage device driver.
Referring to fig. 8, some examples of specific application scenarios below, in which the guangdong mobile APP channel daily living users are over 1000 tens of thousands, support providing accurate marketing information push for users in the form of APP top page popup, top page, check-in page ad slots, life channels, page Banner regions, etc. The honeycomb accurate marketing is based on the honeycomb big data DMP platform, gathers multidimensional Internet channels, opens up the whole flow of accurate advertisement and equity delivery of traffic from advertisers, channels and users, realizes quick positioning and reaching of target clients, and improves marketing success rate. And information such as advertisement resource files and the like is obtained from the advertisement platform through the interface and is dynamically displayed in the Guangdong mobile APP. The advertisement content is ensured not to be tampered and normally displayed by installing the webpage tamper-proof Agent.
The computer readable storage medium to which the present application relates includes Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The description of the related parts in the digital marketing advertisement page tamper-proof device, the device and the computer readable storage medium based on the knowledge graph provided by the embodiment of the application is please refer to the detailed description of the corresponding parts in the digital marketing advertisement page tamper-proof method based on the knowledge graph provided by the embodiment of the application, and the detailed description is omitted herein. In addition, the parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of the corresponding technical solutions in the prior art, are not described in detail, so that redundant descriptions are avoided.
It is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. The digital marketing advertisement page tamper-proof method based on the knowledge graph is characterized by comprising a first server, a Web server and an update server which are interacted with each other, wherein a management control end is arranged on the first server, tamper-proof agents are arranged on the Web server, and release agents are arranged on the update server, and the method comprises the following steps:
the first server is used for acquiring identity verification information and judging whether the identity verification is passed or not;
after the authentication has been passed through the authentication,
acquiring tamper-resistant policy configuration information, judging whether the configuration rights are provided, and generating a tamper-resistant policy according to the tamper-resistant policy configuration information when the configuration rights are provided;
applying the generated tamper-resistant policy to the target tamper-resistant Agent;
the tamper-proof strategy comprises configuration information of a scanning server and configuration information of read-write permission of a website resource file;
sending relevant access operation information of the site file to a release Agent;
the Web server is used for receiving the tamper-proof strategy from the management control end;
capturing a Web connection request, and detecting validity of data content and an access request attached to the Web connection request according to the tamper-proof strategy;
reporting security risks existing in the Web site and newly-added security event data to the Web server;
the automatic monitoring is performed in an event triggering mode, and specifically comprises the following steps:
for all contents of the folder of the Web server, the attributes of all the contents are monitored in real time by a built-in hash fast algorithm against the attributes of the bottom files of all the contents,
copying the backup path folder content in the issuing Agent to the corresponding file position of the monitoring folder in a pure file secure copying mode when the attribute change occurs;
the update server is used for receiving relevant access operation information of the site file from the management control end;
executing corresponding changing operation on the legal web page according to the related access operation information;
checking the change of the self file system, and automatically synchronizing the change content of the self file system to one or more Web servers provided with the tamper-resistant Agent;
acquiring a file copy request from an anti-tampering Agent, and sending the content of a backup path folder to the anti-tampering Agent according to the file copy request;
in particular, the tamper-resistant process includes,
firstly, carrying out identity verification, judging whether tamper-proof strategy configuration permission is provided after the identity verification is passed, if so, carrying out tamper-proof strategy configuration to generate tamper-proof strategies, and applying the tamper-proof strategies to corresponding Web servers provided with tamper-proof agents; the management control end sends relevant access operation information of the website file to the issuing Agent, after the file is filtered by the tamper-proof Agent through the tamper-proof strategy, the relevant access operation information passing through the tamper-proof strategy is passed, and then webpage information after the relevant access operation is uploaded and backed up, and the relevant access information which does not pass through the tamper-proof strategy is rejected.
2. The knowledge-graph-based digital marketing advertisement page tamper-proofing method according to claim 1, wherein the synchronization process of automatically synchronizing the changing content of the own file system to one or more Web servers installed with the tamper-proofing Agent performs information interaction through SSL security protocol.
3. The knowledge-based digital marketing advertisement page tamper-proofing method according to claim 1, wherein the self file system comprises one or more of FAT file system, NTFS file system, CDFS file system and ETC file system.
4. The knowledge-graph-based digital marketing advertisement page tamper-proofing method according to claim 1, wherein the tamper-proofing policy configuration specifically comprises configuration information of a scan server and configuration information of read-write permission of a website resource file.
5. Digital marketing advertisement page tamper-proof device based on knowledge graph, its characterized in that includes:
the system comprises a first server, a second server and a third server, wherein the first server is provided with a management control end and is used for acquiring identity verification information, judging whether the identity verification is passed, acquiring tamper-proof strategy configuration information after the identity verification is passed, judging whether the configuration authority is provided, generating tamper-proof strategy according to the tamper-proof strategy configuration information when the configuration authority is provided, applying the generated tamper-proof strategy to a target tamper-proof Agent, wherein the tamper-proof strategy comprises the configuration information of a scanning server and the configuration information of the read-write authority of a website resource file, and sending related access operation information of the website file to a release Agent;
the Web server is provided with tamper-proof agents, and is used for receiving tamper-proof strategies from a management control end, capturing Web connection requests, carrying out validity detection on data content and access requests attached to the Web connection requests according to the tamper-proof strategies, reporting security risks existing in Web sites and newly added security event data to the Web server, and carrying out automatic monitoring in an event triggering mode, wherein the automatic monitoring specifically comprises the steps of copying the contents of folders of the Web server to the corresponding file positions of the monitored folders in a pure file security copying mode when the change of the attributes occurs, and monitoring the attributes of all the contents in real time by a built-in hash quick algorithm against the attributes of the bottom files of the contents;
the update server is provided with a release Agent and is used for receiving relevant access operation information of the website file from the management control end, executing corresponding change operation on the legal Web page according to the relevant access operation information, checking change of a self file system, automatically synchronizing change contents of the self file system to one or more Web servers provided with the tamper-proof Agent, acquiring a file copy request from the tamper-proof Agent, and sending backup path folder contents to the tamper-proof Agent according to the file copy request.
6. Digital marketing advertisement page tamper-proof equipment based on knowledge graph, characterized by comprising:
a memory for storing a computer program;
a processor for implementing the steps of the knowledge-graph-based digital marketing advertisement page tamper resistant method of any one of claims 1 to 4 when executing the computer program.
7. A computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, which when executed by a processor implements the steps of the knowledge-graph based digital marketing ad page tamper resistant method of any one of claims 1 to 4.
CN202011031222.1A 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph Active CN112187787B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011031222.1A CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011031222.1A CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Publications (2)

Publication Number Publication Date
CN112187787A CN112187787A (en) 2021-01-05
CN112187787B true CN112187787B (en) 2023-10-10

Family

ID=73944967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011031222.1A Active CN112187787B (en) 2020-09-27 2020-09-27 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Country Status (1)

Country Link
CN (1) CN112187787B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837772A (en) * 2021-09-24 2021-12-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for auditing marketing information

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778137A (en) * 2010-01-15 2010-07-14 蓝盾信息安全技术股份有限公司 System and method for preventing webpage from being falsified
CN104348914A (en) * 2014-10-31 2015-02-11 福建六壬网安股份有限公司 Tamper-proofing system file synchronizing system and tamper-proofing system file synchronizing method
CN106682529A (en) * 2017-01-04 2017-05-17 北京国舜科技股份有限公司 Anti-tampering method and anti-tampering terminal
CN109145536A (en) * 2017-06-19 2019-01-04 北京金山云网络技术有限公司 A kind of webpage integrity assurance and device
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN110188574A (en) * 2019-06-06 2019-08-30 上海帆一尚行科技有限公司 A kind of the webpage tamper resistant systems and its method of Docker container
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778137A (en) * 2010-01-15 2010-07-14 蓝盾信息安全技术股份有限公司 System and method for preventing webpage from being falsified
CN104348914A (en) * 2014-10-31 2015-02-11 福建六壬网安股份有限公司 Tamper-proofing system file synchronizing system and tamper-proofing system file synchronizing method
CN106682529A (en) * 2017-01-04 2017-05-17 北京国舜科技股份有限公司 Anti-tampering method and anti-tampering terminal
CN109145536A (en) * 2017-06-19 2019-01-04 北京金山云网络技术有限公司 A kind of webpage integrity assurance and device
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN110188574A (en) * 2019-06-06 2019-08-30 上海帆一尚行科技有限公司 A kind of the webpage tamper resistant systems and its method of Docker container
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment

Also Published As

Publication number Publication date
CN112187787A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
US9306956B2 (en) File system level data protection during potential security breach
US8533818B1 (en) Profiling backup activity
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
WO2008071620A1 (en) Heuristic malware detection
Abiodun et al. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
CN101520831A (en) Safe terminal system and terminal safety method
KR101080953B1 (en) System and method for detecting and protecting webshell in real-time
US9880757B1 (en) Copy data management with data security
KR101977178B1 (en) Method for file forgery check based on block chain and computer readable recording medium applying the same
JP2012526501A (en) Network contents tampering prevention equipment, method and system
CN105260654A (en) Verification method for own integrity of software system
CN113901450A (en) Industrial host terminal safety protection system
US8745010B2 (en) Data storage and archiving spanning multiple data storage systems
Raju et al. SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment
CN112187787B (en) Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN107045605A (en) A kind of real-time metrics method and device
CN111556044A (en) Network security system
CN114218194A (en) Data bank safety system
CN106953874B (en) Website falsification-proof method and device
TW202016785A (en) Method and computer system for preventing malicious software from attacking files of the computer system and corresponding non-transitory computer readable storage medium
CN109145536A (en) A kind of webpage integrity assurance and device
CN113114676B (en) Web safety protection and monitoring system
US20210067554A1 (en) Real-time notifications on data breach detected in a computerized environment
Azemović et al. Efficient model for detection data and data scheme tempering with purpose of valid forensic analysis
Abdullah et al. Achieving consistency of software updates against strong attackers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant