CN106060090A - Website script attack prevention method and device - Google Patents

Website script attack prevention method and device Download PDF

Info

Publication number
CN106060090A
CN106060090A CN201610617181.1A CN201610617181A CN106060090A CN 106060090 A CN106060090 A CN 106060090A CN 201610617181 A CN201610617181 A CN 201610617181A CN 106060090 A CN106060090 A CN 106060090A
Authority
CN
China
Prior art keywords
website
data
script
attack
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610617181.1A
Other languages
Chinese (zh)
Inventor
赖旭东
杨冠文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Happy Software Technology Co Ltd
Original Assignee
Guangzhou Happy Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Happy Software Technology Co Ltd filed Critical Guangzhou Happy Software Technology Co Ltd
Priority to CN201610617181.1A priority Critical patent/CN106060090A/en
Priority to PCT/CN2016/097198 priority patent/WO2018018699A1/en
Publication of CN106060090A publication Critical patent/CN106060090A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a website script attack prevention method and device. The website script attack prevention method comprises the steps of intercepting each request data packet received by a website, wherein each request data packet comprises data contained in network requests which are received by a website and are transmitted based on a hyper text transfer protocol; unpacking each request data packet, thereby obtaining to-be-checked format data; carrying out matching checking on the to-be-checked format data according to a preset security rule, and outputting security data; and encapsulating the security data, thereby obtaining security data packets, and transmitting the security data packets to a core component of the website, wherein the core component comprises a management component and a payment component of the website. According to the method and the device, script attacks of an electronic commerce website can be efficiently and effectively prevented.

Description

Website script attack prevention method and device
Technical field
The present invention relates to computer techno-stress technical field, particularly relate to a kind of website script attack prevention method and dress Put.
Background technology
At present the turnovers of e-commerce in global range sharp rises, the behind of this phenomenon also along with various for Ecommerce and the attack of payment system thereof, wherein come from the attack pattern of WEB (the Internet) to user taking precautions against or The biggest inconvenience is all brought in reparation.
During reality is taken precautions against for above-mentioned attack, inventor finds at least to exist in conventional art to ask as follows Topic:
Traditional attack-defending measure imperfection, the designer of attack often can be by taking some targetedly Strategy evades existing attack-defending measure, and attacking is general weakness based on general WEB application mostly, such as: SQL (structure Change query language: Structured Query Language) inject or cause performing arbitrary script at client browser Cross-site script vulnerability etc., in a word, website script cannot be attacked and carry out efficient and effectively take precautions against by conventional art.
Summary of the invention
Based on this, it is necessary to for traditional problem that attack-defending measure efficiency is low, cannot effectively take precautions against, it is provided that a kind of net Stand script attack prevention method and device.
To achieve these goals, the embodiment of technical solution of the present invention is:
On the one hand, it is provided that a kind of website script attack prevention method, comprise the following steps:
Intercept each request data package that website receives;Request data package be website receive based on Hyper text transfer assist The data that the network request of view transmission comprises;
Request data package is unpacked, obtains formatted data to be verified;
According to preset security rule, formatted data to be verified is carried out coupling verification, output safety data;
Secure data is carried out dress bag, obtains secure data bag, and secure data bag is transferred to the core component of website; Core component includes the management assembly of website and pays assembly.
On the other hand, it is provided that a kind of website script attack-defending device, including:
Interception unit, for intercepting each request data package that website receives;Request data package is the base that website receives In the data that the network request of http transport comprises;
Unpack unit, for request data package is unpacked, obtain formatted data to be verified;
Coupling verification unit, for according to preset security rule, carries out coupling verification, output peace to formatted data to be verified Total evidence;
Dress packet transmission unit, for secure data carries out dress bag, obtains secure data bag, and is transmitted by secure data bag To the core component of website;Core component includes the management assembly of website and pays assembly.
Technique scheme has the advantages that
Website of the present invention script attack prevention method and device, be applied to j2ee (Java 2Platform, Enterprise Edition:java2 platform enterprise level application software), use HTTP (HTML (Hypertext Markup Language) HyperText user Transfer Protocol) protocol access website, use blocker to using HTTP association before eventually arriving at concrete application resource The content of view transmission carries out safety regulation filtration, it is ensured that the protocol contents being transferred to each core component is safe condition;The present invention The script that can the most effectively take precautions against e-commerce website is attacked.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of website of the present invention script attack prevention method embodiment 1;
Fig. 2 is the configuration diagram of website of the present invention script attack prevention method embodiment 2;
Fig. 3 is the structural representation of website of the present invention script attack-defending device embodiment 1.
Detailed description of the invention
For the ease of understanding the present invention, below with reference to relevant drawings, the present invention is described more fully.In accompanying drawing Give the first-selected embodiment of the present invention.But, the present invention can realize in many different forms, however it is not limited to institute herein The embodiment described.On the contrary, providing the purpose of these embodiments is to make to the disclosure more thoroughly comprehensively.
Unless otherwise defined, all of technology used herein and scientific terminology and the technical field belonging to the present invention The implication that technical staff is generally understood that is identical.The term used the most in the description of the invention is intended merely to describe tool The purpose of the embodiment of body, it is not intended that in limiting the present invention.Term as used herein " and/or " include one or more phase Arbitrary and all of combination of the Listed Items closed.
Website of the present invention script attack prevention method embodiment 1:
In order to solve traditional problem that attack-defending measure efficiency is low, cannot effectively take precautions against, the invention provides a kind of net Standing script attack prevention method embodiment 1, Fig. 1 is the schematic flow sheet of website of the present invention script attack prevention method embodiment 1; As it is shown in figure 1, may comprise steps of:
Step S110: intercept each request data package that website receives;Request data package be website receive based on super The data that the network request of text transfer protocol transmission comprises;
Step S120: unpack request data package, obtains formatted data to be verified;
Step S130: according to preset security rule, carries out coupling verification, output safety data to formatted data to be verified;
Step S140: secure data is carried out dress bag, obtains secure data bag, and secure data bag is transferred to website Core component;Core component includes the management assembly of website and pays assembly.
Specifically, the present invention relates to a kind of website visiting blocker, by blocker verification and filtering noxious script with Reach the purpose of guarding website application.The purpose that HTTP request data is unpacked by blocker is in order to packet is split into The data form (formatted data the most to be verified) of the manageable routine of checker, such as, packet is originally that the form of stream carries Sending to e-commerce website, this data stream is just split into the data form of character string by blocker.And to the safe number after filtering According to carrying out the purpose of dress bag, it is in order to data recovery is become original data form.Core component specifically can include electronics business The business member management assembly of website, merchandise control assembly, order management assembly, payment assembly, marketing management assembly and form Management assembly etc..
In a specific embodiment, step S130 carries out to formatted data to be verified coupling verification, output safety The step of data may include that
By regular expression, formatted data regular and to be verified to preset security is mated, and obtains attack script;In advance If safety regulation can include dangerous character and dangerous character string;
Filtering attack script, the formatted data to be verified after filtering exports as secure data.
In a specific embodiment, the above-mentioned step filtering attack script may include that
The character of attack script is carried out escape.
Specifically, the checker of blocker, it is possible to use the mode of regular expression, safety regulation and the number unpacked According to carrying out coupling effect, as found attack script, then filter, i.e. the character of attack script is carried out escape.
In a specific embodiment, step can also be included before step S140:
According to request data package, generate audit log;Audit log can include that request accesses the reference address number of website According to, access mode data and access content-data.
Specifically, after verification completes, audit log can be generated and recorded in storage, consult for management personnel. Audit log have recorded and includes accessing IP (agreement interconnected between network: Internet Protocol), access mode, access Contents etc., management personnel can carry out attack-defending analysis and upgrading of modifying safety regulation according to audit log.
In a specific embodiment, step can also be included before step S120:
According to the feature of website attack script, generate preset security rule;
According to the content of audit log, renewal that preset security rule is modified.
Specifically, attack script has and regular traffic required parameter You Hen great district another characteristic, therefore can root According to the feature of attack script, write safety regulation in advance.Safety regulation can include some dangerous characters or dangerous character string, as Under:
[1] | (vertical bar symbol)
[2] & (& symbol)
[3];(branch)
[4] $ (dollar mark ())
[5] % (percent symbol)
[6]@(at symbol)
[7] ' (single quotation marks)
[8] " (quotation marks)
[9] ' (back slash escape single quotation marks)
[10] " (back slash escape quotation marks)
[11]<>(angle brackets)
[12] () (bracket)
[13]+(plus sige)
[14] CR (carriage return character, ASCII 0x0d)
[15] LF (line feed, ASCII 0x0a)
[16], (comma)
[17] (back slash)
One example of safety regulation (can use space to separate) as follows between symbol:
|&;$ %@' " ' "<>()+CR LF,
In concrete operations, the safety regulation coupling whether a certain attack script can have been arranged can be carried out examination & verification inspection Survey, if be detected that be not matched, be required for this attack script and improve old safety regulation or write new safety rule Then.Therefore, it can safety regulation be saved in configurable file, in order to profit management personnel are to safety regulation amendment upgrading. Management personnel can enter e-commerce website backstage web interface, then clicks on " menu of safety regulation management ", opens web Editing machine, web editing machine reads safety regulation file and shows on editing machine, and entrance can edit pattern.Management personnel edit After good safety regulation, click on save button.Editing machine can update safety regulation file data.
Website of the present invention script attack prevention method embodiment 1, provides a kind of height in j2ee applies based on http protocol Effect is effective takes precautions against the method that script is attacked.When user uses http protocol to access website, eventually arrive at concrete application resource Use blocker that the content using http protocol transmission is carried out safety regulation filtration, it is ensured that to be transferred to each core component before Protocol contents is safe condition;Simultaneously for ensureing that safety regulation can persistently obtain upgrading and meet daily security audit, meeting Interception log recording to storage will provide data analysis convenient for portal management personnel.
Website of the present invention script attack prevention method embodiment 2:
In order to solve traditional problem that attack-defending measure efficiency is low, cannot effectively take precautions against, present invention also offers one Website script attack prevention method embodiment 2, Fig. 2 is the framework signal of website of the present invention script attack prevention method embodiment 2 Figure;As in figure 2 it is shown, browser, IOS APP, Android APP and external subsystems, all HTTP request the most all can be blocked Cutting device to intercept, blocker can be handled as follows:
(1) HTTP request data intercepted is unpacked by blocker.
(2) checker of blocker, it is possible to use the mode of regular expression, carries out safety regulation and the data unpacked Coupling effect, as found attack script, then filters.
(3) attack script suffers from and regular traffic required parameter You Hen great district another characteristic, therefore can be according to attacking Hit the feature of script, pre-set safety regulation.And safety regulation can be stored in configurable file, in order to peace Full rules modification upgrading.
(4) generate audit log after having verified and recorded in storage, for consulting.
(5) after generating audit log, the secure data after filtering being carried out fills bag and is then transferred to each core component.
(6) audit log have recorded and includes accessing IP, access mode, access content etc., can carry out according to audit log Analyze and upgrading that safety regulation is modified.
Wherein, external subsystems specifically can refer to: the son application docked with e-commerce website generation data.Browser, IOS app, Android APP, external subsystems, be all visitor, and they send asking of data acquisition to e-commerce website Ask or submit to the request of data.Core component is the core of e-commerce website.
Website of the present invention script attack-defending device embodiment 1:
Technical scheme based on above website script attack prevention method, simultaneously in order to solve tradition attack-defending measure effect The problem that rate is low, cannot effectively take precautions against, present invention also offers a kind of website script attack-defending device embodiment 1;Fig. 3 is this The structural representation of invention website script attack-defending device embodiment 1, as it is shown on figure 3, may include that
Interception unit 310, for intercepting each request data package that website receives;Request data package is that website receives The data that network request based on http transport comprises;
Unpack unit 320, for request data package is unpacked, obtain formatted data to be verified;
Coupling verification unit 330, for according to preset security rule, carries out coupling verification to formatted data to be verified, defeated Go out secure data;
Dress packet transmission unit 340, for secure data carries out dress bag, obtains secure data bag, and by secure data bag It is transferred to the core component of website;Core component includes the management assembly of website and pays assembly.
In a specific embodiment, coupling verification unit 330 may include that
Matching module 332, for by regular expression, formatted data regular and to be verified to preset security is carried out Join, obtain attack script;Preset security rule can include dangerous character and dangerous character string;
Filtering module 334, for filtering attack script, the formatted data to be verified after filtering is as safety number According to exporting.
In a specific embodiment, filtering module 334 is for carrying out escape to the character of attack script.
In a specific embodiment, website script attack-defending device can also include:
Auditable unit 360, for according to request data package, generates audit log;Audit log can include that request accesses The reference address data of website, access mode data and access content-data.
In a specific embodiment, website script attack-defending device can also include:
Preset updating block 350, for the feature according to website attack script, generate preset security rule;And according to examining The content of meter daily record, renewal that preset security rule is modified.
Website of the present invention script attack-defending device embodiment 1, provides a kind of height in j2ee applies based on http protocol Effect is effective takes precautions against the method that script is attacked.When user uses http protocol to access website, eventually arrive at concrete application resource Use blocker that the content using http protocol transmission is carried out safety regulation filtration, it is ensured that to be transferred to each core component before Protocol contents is safe condition;Simultaneously for ensureing that safety regulation can persistently obtain upgrading and meet daily security audit, meeting Interception log recording to storage will provide data analysis convenient for portal management personnel.
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, not to above-mentioned reality The all possible combination of each technical characteristic executed in example is all described, but, as long as the combination of these technical characteristics is not deposited In contradiction, all it is considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, but also Can not therefore be construed as limiting the scope of the patent.It should be pointed out that, come for those of ordinary skill in the art Saying, without departing from the inventive concept of the premise, it is also possible to make some deformation and improvement, these broadly fall into the protection of the present invention Scope.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a website script attack prevention method, it is characterised in that comprise the following steps:
Intercept each request data package that website receives;Described request data package be described website receive based on hypertext pass The data that the network request of transmission protocol transmission comprises;
Described request data package is unpacked, obtains formatted data to be verified;
According to preset security rule, described formatted data to be verified is carried out coupling verification, output safety data;
Described secure data is carried out dress bag, obtains secure data bag, and described secure data bag is transferred to described website Core component;Described core component includes the management assembly of described website and pays assembly.
Website the most according to claim 1 script attack prevention method, it is characterised in that according to preset security rule, right Described formatted data to be verified carries out coupling verification, and the step of output safety data includes:
By regular expression, to be verified formatted data regular and described to described preset security is mated, and obtains and attacks foot This;Described preset security rule includes dangerous character and dangerous character string;
Filtering described attack script, the formatted data described to be verified after filtering carries out defeated as described secure data Go out.
Website the most according to claim 2 script attack prevention method, it is characterised in that described attack script was carried out The step of filter includes:
The character of described attack script is carried out escape.
4. according to the website script attack prevention method described in claims 1 to 3 any one, it is characterised in that to described peace Total according to carrying out dress bag, obtain secure data bag, and described secure data bag is transferred to the step of the core component of described website Further comprise the steps of: before rapid
According to described request data package and described secure data bag, generate audit log;Described audit log includes that request accesses The reference address data of described website, access mode data and access content-data.
Website the most according to claim 4 script attack prevention method, it is characterised in that to the request data package intercepted Unpack, further comprise the steps of: before obtaining the step of formatted data to be verified
According to the feature of website attack script, generate described preset security rule;
According to the content of described audit log, renewal that described preset security rule is modified.
6. a website script attack-defending device, it is characterised in that including:
Interception unit, for intercepting each request data package that website receives;Described request data package is that described website receives The data that comprise of network request based on http transport;
Unpack unit, for described request data package is unpacked, obtain formatted data to be verified;
Coupling verification unit, for according to preset security rule, carries out coupling verification, output peace to described formatted data to be verified Total evidence;
Dress packet transmission unit, for described secure data carries out dress bag, obtains secure data bag, and by described secure data bag It is transferred to the core component of described website;Described core component includes the management assembly of described website and pays assembly.
Website the most according to claim 6 script attack-defending device, it is characterised in that described coupling verification unit bag Include:
Matching module, for by regular expression, to be verified formatted data regular and described to described preset security is carried out Join, obtain attack script;Described preset security rule includes dangerous character and dangerous character string;
Filtering module, for filtering described attack script, the formatted data described to be verified after filtering is as described Secure data exports.
Website the most according to claim 7 script attack-defending device, it is characterised in that described filtering module is for institute The character stating attack script carries out escape.
9. according to the website script attack-defending device described in claim 6 to 8 any one, it is characterised in that also include:
Auditable unit, for according to described request data package, generates audit log;It is described that described audit log includes that request accesses The reference address data of website, access mode data and access content-data.
Website the most according to claim 9 script attack-defending device, it is characterised in that also include:
Preset updating block, for the feature according to website attack script, generate described preset security rule;And examine according to described The content of meter daily record, renewal that described preset security rule is modified.
CN201610617181.1A 2016-07-29 2016-07-29 Website script attack prevention method and device Pending CN106060090A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610617181.1A CN106060090A (en) 2016-07-29 2016-07-29 Website script attack prevention method and device
PCT/CN2016/097198 WO2018018699A1 (en) 2016-07-29 2016-08-29 Website scripting attack prevention method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610617181.1A CN106060090A (en) 2016-07-29 2016-07-29 Website script attack prevention method and device

Publications (1)

Publication Number Publication Date
CN106060090A true CN106060090A (en) 2016-10-26

Family

ID=57196781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610617181.1A Pending CN106060090A (en) 2016-07-29 2016-07-29 Website script attack prevention method and device

Country Status (2)

Country Link
CN (1) CN106060090A (en)
WO (1) WO2018018699A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506548A (en) * 2016-12-23 2017-03-15 努比亚技术有限公司 The defence installation of cross-site scripting attack and method
CN107437025A (en) * 2017-08-07 2017-12-05 郑州云海信息技术有限公司 A kind of Data Audit method and device
CN108108471A (en) * 2018-01-02 2018-06-01 武汉斗鱼网络科技有限公司 Data filtering method, device, server and readable storage medium storing program for executing

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769833B (en) * 2021-01-12 2023-01-24 恒安嘉新(北京)科技股份公司 Method and device for detecting command injection attack, computer equipment and storage medium
CN112887274B (en) * 2021-01-12 2023-04-14 恒安嘉新(北京)科技股份公司 Method and device for detecting command injection attack, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073811A1 (en) * 2002-10-15 2004-04-15 Aleksey Sanin Web service security filter
US20070136809A1 (en) * 2005-12-08 2007-06-14 Kim Hwan K Apparatus and method for blocking attack against Web application
CN104079528A (en) * 2013-03-26 2014-10-01 北大方正集团有限公司 Method and system of safety protection of Web application
CN104519008A (en) * 2013-09-26 2015-04-15 北大方正集团有限公司 Cross-site scripting attack defense method and device and application server
CN104601540A (en) * 2014-12-05 2015-05-06 华为技术有限公司 Cross-site scripting (XSS) attack defense method and Web server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291394B (en) * 2011-07-22 2014-06-11 网宿科技股份有限公司 Security defense system based on network accelerating equipment
CN104348789B (en) * 2013-07-30 2018-04-27 中国银联股份有限公司 For preventing the Web server and method of cross-site scripting attack

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073811A1 (en) * 2002-10-15 2004-04-15 Aleksey Sanin Web service security filter
US20070136809A1 (en) * 2005-12-08 2007-06-14 Kim Hwan K Apparatus and method for blocking attack against Web application
CN104079528A (en) * 2013-03-26 2014-10-01 北大方正集团有限公司 Method and system of safety protection of Web application
CN104519008A (en) * 2013-09-26 2015-04-15 北大方正集团有限公司 Cross-site scripting attack defense method and device and application server
CN104601540A (en) * 2014-12-05 2015-05-06 华为技术有限公司 Cross-site scripting (XSS) attack defense method and Web server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506548A (en) * 2016-12-23 2017-03-15 努比亚技术有限公司 The defence installation of cross-site scripting attack and method
CN107437025A (en) * 2017-08-07 2017-12-05 郑州云海信息技术有限公司 A kind of Data Audit method and device
CN108108471A (en) * 2018-01-02 2018-06-01 武汉斗鱼网络科技有限公司 Data filtering method, device, server and readable storage medium storing program for executing

Also Published As

Publication number Publication date
WO2018018699A1 (en) 2018-02-01

Similar Documents

Publication Publication Date Title
CN106060090A (en) Website script attack prevention method and device
CN101388768B (en) Method and device for detecting malicious HTTP request
US10110637B2 (en) Directing audited data traffic to specific repositories
US11886619B2 (en) Apparatus and method for securing web application server source code
US9740869B1 (en) Enforcement of document element immutability
CN102891897B (en) Webpage sharing method and server and client
CN103888490B (en) A kind of man-machine knowledge method for distinguishing of full automatic WEB client side
EP2521049B1 (en) Methods and systems for validating input data
KR100732689B1 (en) Web Security Method and apparatus therefor
CN111177779B (en) Database auditing method, device, electronic equipment and computer storage medium
CN101610264A (en) The management method of a kind of firewall system, safety service platform and firewall system
CN101834866A (en) CC (Communication Center) attack protective method and system thereof
Zhang et al. Notice of retraction: A static analysis tool for detecting web application injection vulnerabilities for asp program
CN103914655A (en) Downloaded file security detection method and device
CN111191246A (en) Spring annotation based security development verification method
CN110213375A (en) A kind of method, apparatus and electronic equipment of the IP access control based on cloud WAF
Sönmez Security qualitative metrics for open web application security project compliance
Tang et al. L-WMxD: Lexical based webmail XSS discoverer
CN112395485A (en) Policy big data mining method and device, computer equipment and storage medium
CN104579931B (en) The access method and device of a kind of copending document based on mail
CN106911649A (en) A kind of method and apparatus for detecting network attack
CN103581321B (en) A kind of creation method of refer chains, device and safety detection method and client
CN106911635A (en) A kind of method and device of detection website with the presence or absence of backdoor programs
CN116545674A (en) Email phishing exercise method, system, equipment and medium free of privacy information collection
CN110858836A (en) Network attack defense method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161026

RJ01 Rejection of invention patent application after publication