CN108289077B - Method and device for carrying out fuzzy detection analysis on WEB server security - Google Patents

Method and device for carrying out fuzzy detection analysis on WEB server security Download PDF

Info

Publication number
CN108289077B
CN108289077B CN201710013578.4A CN201710013578A CN108289077B CN 108289077 B CN108289077 B CN 108289077B CN 201710013578 A CN201710013578 A CN 201710013578A CN 108289077 B CN108289077 B CN 108289077B
Authority
CN
China
Prior art keywords
service
matrix
action
security
time sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710013578.4A
Other languages
Chinese (zh)
Other versions
CN108289077A (en
Inventor
令周扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710013578.4A priority Critical patent/CN108289077B/en
Publication of CN108289077A publication Critical patent/CN108289077A/en
Application granted granted Critical
Publication of CN108289077B publication Critical patent/CN108289077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a method and a device for carrying out fuzzy detection analysis on the security of a WEB server, relating to the field of the security of the WEB server, wherein the method comprises the following steps: pre-judging whether the user request message is abnormal or not by analyzing the user request message during the service execution period; if the pre-judging result is that the user request message is abnormal, acquiring a weight matrix and a judging matrix of the corresponding action matrix of the service; and performing fuzzy operation by using the weight matrix and the judgment matrix of the action matrix corresponding to the service, and determining the safety of the WEB server according to the fuzzy operation result. The embodiment of the invention carries out WEB server security detection and analysis based on user behaviors, can prevent abnormal behaviors such as malicious orders and the like, and improves the WEB server security.

Description

Method and device for carrying out fuzzy detection analysis on WEB server security
Technical Field
The invention relates to the field of WEB server security, in particular to a method and a device for carrying out fuzzy detection analysis on WEB server security.
Background
In the internet environment, the importance of WEB server security is undoubted.
Generally, for a WEB server running online, the common WEB security detection means is as follows: a security manufacturer scans which bugs exist in the system by using a security tool, or makes security assessment on the WEB server by using schemes such as manual penetration test and the like, and then developers adopt corresponding security reinforcement schemes according to problems indicated in assessment reports.
In practical applications, a security reinforcing scheme commonly adopted is cooperatively achieved through two aspects, on one hand, a firewall mechanism is added, the main purpose is to isolate or protect a server from attacks, in some cases, simple means such as Uniform Resource Locator (URL) address filtering or parameter rule checking are added to prevent vulnerabilities such as Structured Query Language (SQL) injection, Cross Site Scripting (CSS), and the like, and on the other hand, security of an application service itself is mainly improved through means such as coding.
However, the prior art has the following defects in the application process:
1. the firewall is more focused on physical attacks, and for abnormal requests disguised as normal operations or apparently normal service requests, the situation that the requests still belong to illegal requests and the like can be found through associated contexts, so that the judgment mechanism is difficult.
2. The security reinforcement is made harder by invasive means such as deep penetration, and the technology of preventing the loophole by adopting the code is always in a passive state so as to be fatigued and cause accidents by carelessness.
3. The safety awareness of application (or business) developers is not enough, and professional security personnel are not always in the process of business, so that a good and reasonable filtering rule mechanism is difficult to be planned to prevent the application (or business) developers from happening, and the improvement is usually performed after the system development is completed, but the participation is insufficient in the development stage; meanwhile, once the safety requirement is considered during application software development, the business logic is abnormal and complicated, and particularly for the safety reinforcement of the existing system, the development difficulty and the maintenance cost are greatly increased.
Disclosure of Invention
According to the method and the device for carrying out fuzzy detection analysis on the security of the WEB server, which are provided by the embodiment of the invention, the problem of low security of the WEB server is solved.
The method for carrying out fuzzy detection analysis on the security of the WEB server, provided by the embodiment of the invention, comprises the following steps:
pre-judging whether the user request message is abnormal or not by analyzing the user request message during the service execution period;
if the pre-judging result is that the user request message is abnormal, acquiring a weight matrix and a judging matrix of the corresponding action matrix of the service;
and performing fuzzy operation by using the weight matrix and the judgment matrix of the action matrix corresponding to the service, and determining the safety of the WEB server according to the fuzzy operation result.
Preferably, the pre-judging whether there is an abnormality of the user request message by analyzing the user request message during the service execution includes:
and pre-judging whether the user request message is abnormal or not by analyzing the quantity fluctuation of the user request message in unit time during service execution.
Preferably, the pre-judging whether there is an abnormality of the user request message by analyzing the user request message during the service execution includes:
the execution sequence of the corresponding service action requested by the user is determined by analyzing the user request message during the service execution period, and whether the user request message is abnormal or not is judged in advance according to the execution sequence.
Preferably, the performing fuzzy operation by using the weight matrix and the evaluation matrix of the action matrix corresponding to the service, and determining the security of the WEB server according to the result of the fuzzy operation includes:
and carrying out fuzzy operation on the weight matrix and the judgment matrix of the corresponding action matrix of the service to obtain a safety matrix when the service action in the corresponding action matrix is executed according to the time sequence, and determining the safety when the service action is executed according to the time sequence according to the safety matrix.
Preferably, the action matrix is formed by one or more sets of service actions performed in time sequence for the service.
Preferably, the weight matrix is formed by weights corresponding to each service action in the action matrix, and is determined by the following steps:
determining an initial weight matrix according to a service action execution sequence and an action dependency relationship set in a service development period, and adjusting the initial weight matrix by using a fuzzy operation result in the service execution period.
Preferably, the evaluation matrix is formed by the values of the membership degrees of the service actions of the services to different security evaluation indexes.
According to the storage medium provided by the embodiment of the invention, the program for implementing the method for carrying out the fuzzy detection analysis on the security of the WEB server is stored.
The device for carrying out fuzzy detection analysis on the security of the WEB server provided by the embodiment of the invention comprises the following steps:
the pre-judging module is used for pre-judging whether the user request message is abnormal or not by analyzing the user request message during the service execution period;
the obtaining module is used for obtaining a weight matrix and a judgment matrix of the action matrix corresponding to the service when the prejudgment result is that the user request message is abnormal;
and the processing module is used for performing fuzzy operation by using the weight matrix and the judgment matrix of the action matrix corresponding to the service, and determining the safety of the WEB server according to the fuzzy operation result.
Preferably, the pre-judging module pre-judges whether there is an abnormality of the user request message by analyzing the fluctuation of the number of the user request messages in unit time during service execution, or determines an execution sequence of a corresponding service action requested by the user by analyzing the user request messages during service execution, and pre-judges whether there is an abnormality of the user request message according to the execution sequence.
Preferably, the processing module performs fuzzy operation on the weight matrix and the evaluation matrix of the corresponding action matrix of the service to obtain a security matrix when the service action in the corresponding action matrix is executed according to a time sequence, and determines security when the service action is executed according to the time sequence according to the security matrix.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the embodiment of the invention carries out WEB server security detection and analysis based on user behaviors, can prevent abnormal behaviors such as malicious orders and the like, and improves the WEB server security.
Drawings
FIG. 1 is a flowchart of a method for fuzzy detection analysis of security of a WEB server according to an embodiment of the present invention;
FIG. 2 is a block diagram of an apparatus for fuzzy detection analysis of security of a WEB server according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a system module for performing fuzzy detection analysis on security of a WEB server according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of calculating an evaluation membership based on historical averages according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be understood that the preferred embodiments described below are only for the purpose of illustrating and explaining the present invention, and are not to be construed as limiting the present invention.
Fig. 1 is a flowchart of a method for performing fuzzy detection analysis on security of a WEB server according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
step S101: and analyzing the user request message during the service execution period to prejudge whether the user request message is abnormal or not.
And pre-judging whether the user request message is abnormal or not by analyzing the quantity fluctuation of the user request message in unit time during service execution. For example, a period may be set, if the number of the user request messages received in the history period is substantially stable, and the number of the user request messages received in the current period is much larger than the number of the user request messages received in the history period, an extreme point will appear on the data curve, which indicates that the data is abnormally fluctuated, and there may be an abnormality in the user request messages.
Or, determining the execution sequence of the corresponding service action requested by the user by analyzing the user request message during service execution, and prejudging whether the user request message is abnormal or not according to the execution sequence. For example, the service action 2 should be executed after the service action 1, but it is found by analyzing the user request message that the service action 2 is executed frequently before the service action 1 is executed, which indicates that there may be an abnormality in the user request message.
Step S102: and if the pre-judgment result indicates that the user request message is abnormal, acquiring a weight matrix and a judgment matrix of the action matrix corresponding to the service.
The action matrix is formed by one or more groups of service actions executed according to time sequence of the service, for example, account opening, browsing, inquiring and account canceling are executed according to time sequence, and the action matrix formed by service actions of account opening, browsing, inquiring and account canceling is formed.
The weight matrix is composed of weights corresponding to all business actions in the action matrix, and is determined through the following steps: firstly, an initial weight matrix is determined according to a business action execution sequence and action dependency relationship set in a business development period. Secondly, because the result obtained by performing fuzzy operation by using the initial weight matrix is inconsistent with the safety of the actual WEB server, namely, the safety problem is determined after the fuzzy operation is performed by using the initial weight matrix, and when the safety problem is actually found not to exist, the initial weight matrix is proved to be inaccurate, and adjustment is needed at the moment.
The evaluation matrix is composed of the membership degree values of the service action of the service to different safety evaluation indexes. Specifically, a plurality of safety evaluation indexes can be set as required, and then the membership degree of the business action to different safety evaluation indexes is determined according to the historical data of the business action.
Step S103: and performing fuzzy operation by using the weight matrix and the judgment matrix of the action matrix corresponding to the service, and determining the safety of the WEB server according to the fuzzy operation result.
And carrying out fuzzy operation on the weight matrix and the judgment matrix of the corresponding action matrix of the service to obtain a safety matrix when the service action in the corresponding action matrix is executed according to the time sequence, and determining the safety when the service action is executed according to the time sequence according to the safety matrix. That is, the safety matrix is composed of the values of the degree of membership of the action timing to the difference and the safety evaluation index.
It will be understood by those skilled in the art that all or part of the steps in the method according to the above embodiments may be implemented by a program, which may be stored in a computer-readable storage medium, and includes steps S101 to S103 when the program is executed. The storage medium may be ROM/RAM, magnetic disk, optical disk, etc.
Fig. 2 is a block diagram of an apparatus for performing fuzzy detection analysis on security of a WEB server according to an embodiment of the present invention, as shown in fig. 2, including:
and the prejudging module is used for prejudging whether the user request message is abnormal or not by analyzing the user request message during the service execution period.
And the obtaining module is used for obtaining the weight matrix and the judgment matrix of the action matrix corresponding to the service when the prejudgment result is that the user request message is abnormal. The action matrix is composed of one or more groups of service actions of the service executed according to time sequence. The weight matrix is composed of weights corresponding to all the business actions in the action matrix, and is determined by the following steps: determining an initial weight matrix according to a service action execution sequence and an action dependency relationship set in a service development period, and adjusting the initial weight matrix by using a fuzzy operation result in the service execution period. The evaluation matrix is composed of the membership degree values of the service action of the service to different safety evaluation indexes.
And the processing module is used for performing fuzzy operation by using the weight matrix and the judgment matrix of the action matrix corresponding to the service, and determining the safety of the WEB server according to the fuzzy operation result.
The working steps of the device comprise: the pre-judging module pre-judges whether the user request message is abnormal or not by analyzing the quantity fluctuation of the user request message in unit time during the service execution period or the execution sequence of the corresponding service action requested by the user, and preliminarily judges whether the abnormality exists or not. If the abnormal condition exists, calling the corresponding weight matrix and the evaluation matrix to carry out fuzzy operation to obtain a safety matrix when the business action in the corresponding action matrix is executed according to the time sequence, and determining the safety when the business action is executed according to the time sequence according to the safety matrix. If the safety is low, namely the safety risk is high, the abnormal possibility is high, and at the moment, safety warning needs to be carried out. Since the operation result may be inconsistent with the actual situation, the weight matrix needs to be adjusted in a self-learning manner until the result of the fuzzy operation performed by using the adjusted weight matrix is consistent with the actual situation.
Fig. 3 is a schematic structural diagram of a system module for performing fuzzy detection analysis on security of a WEB server according to an embodiment of the present invention, and as shown in fig. 3, the system includes an apparatus for performing fuzzy detection analysis on security of a WEB server, where the apparatus includes an extremum detection module (for implementing a function of the prejudging module in fig. 2), a weight setting module, a multiple fuzzy operation module (for implementing a function of the acquiring module in fig. 2 and a fuzzy operation function of the processing module in fig. 2), and a state judgment module (for implementing a function of determining security of the processing module in fig. 2).
An extreme value detection module: the method detects a request with extreme characteristics from the request message, and specifically identifies the condition that an abnormal inflection point or abnormal fluctuation of data occurs when a business action is executed during the operation of the system, such as the sudden increase of the number of the request messages.
A weight setting module: the initial rule and the weight matrix are set according to the application or the service characteristics and are used for fuzzy calculation.
A multiple fuzzy operation module: and fuzzy calculation of the service which possibly has abnormal operation is realized.
A state determination module: and receiving the fuzzy calculation result, obtaining a final state and using the final state for alarming or recovering.
The information processing steps of the device of the embodiment of the invention comprise:
step A, a weight setting module is defined in a service function development stage, and when a service developer develops a function, m service key actions (namely service actions) are defined according to a sequence executed in sequence and a relevant dependency relationship to form a one-dimensional action matrix R containing m elements.
Step B, a plurality of action matrixes can be set for the functional module with complex business logic, and meanwhile, the functional module can be divided into a plurality of levels according to the atomization degree of the action, namely, the functional module can be expressed as a multi-dimensional action matrix or a plurality of one-dimensional action matrices;
and C, the service developer continues to draw up a one-dimensional matrix V containing n comments for the functions of the whole service module.
And D, marking an action dimension matrix (namely the action matrix) containing m elements with initial rule weight values, wherein the initial rule weight values are filled in the action dimension matrix and are represented by a matrix A, and the weight values can be interpreted as the possibility of the system executing according to the action sequence and the dependency relationship.
And E, automatically determining the membership degree of each business action on a certain comment according to the average value of the historical data of each business action during the running of the system.
And forming a judgment matrix R' of the action matrix R according to the membership degree of each business action on a certain comment.
And F, the extreme value detection module identifies the condition that an abnormal inflection point or data abnormal fluctuation occurs during the action execution when the system runs, such as the abnormal sequence or quantity of the action execution, and the like, so that the system automatically switches in the detection to deeply analyze and judge whether the request actually has the abnormal occurrence.
And G, carrying out fuzzy operation on the weight matrix A and the action matrix R by the multiple fuzzy operation module, and outputting a calculation result.
Specifically, the fuzzy operation is performed on the weight matrix a and the evaluation matrix R' of the action matrix R.
And H, receiving the fuzzy calculation result output in the step G by the state judgment module, obtaining the evaluation of the final state according to the size of the comment in the calculation result, outputting the evaluation, and subsequently finishing actions such as alarming or flow limitation and the like.
The system for carrying out fuzzy detection analysis on the security of the WEB server further comprises the following steps: a WEB message receiving and responding unit and a service execution unit.
As shown in fig. 3, it can be seen from the figure that the positions and the work flows of the modules of the system are shown, and the specific steps include:
step 1: and defining a weight setting module.
In the function development stage of the business system, a weight setting module can be predefined in advance, and m business key actions are defined by developers according to the execution sequence and the related dependency relationship to form a one-dimensional action matrix R containing m elements.
For the creation of the action matrix, various methods may be adopted, and one of the simplest scenarios may be that the action matrix is defined as some key function calls in the application execution process, for example, for a WEB service of a color ring back tone service, the key function calls may be account opening, account selling, query, browsing, listening, ordering, giving, deleting, and the like, that is, the one-dimensional action matrix may be expressed in the following form: r ═ account opening, account selling, query, browsing, listening on trial, purchase, presentation, deletion }.
For such a matrix, the color ring back tone service developer can clearly indicate the sequence and interdependence of the execution of actions, for example, the purchase is always performed after the account is opened, and the giving operation cannot occur after the account is sold. For the evaluation index of security, it is natural that the highest account is opened, the second time is bought and given, and the sensitivity of query and browsing is lowest, so that for the following action matrix R ═ opening, account, query, browsing, listening on test, purchasing, giving, deleting }, the corresponding weight matrix a may be labeled as a ═ 0.92,0.24,0.10,0.09,0.22,0.75,0.83,0.47}, so as to embody the above evaluation index.
The weight setting module can be used as a component of the service version to be packaged with the version, and opens a corresponding API interface for the fuzzy detection analysis system based on the user behavior to call when running.
Step 2: the system of this embodiment, through the design facing to the tangent plane, operates between two modules, namely, the message receiving and response unit and the service execution unit of the WEB server, and can participate in message processing and response in real time, or operate alone, for example, the specific application scenarios include:
(1) the preprocessing link before the message processing of the message receiving and transmitting unit is realized by directly analyzing the message content;
(2) the operation log/event analysis link after the service processing is finished is realized by analyzing log keywords or event characteristics;
(3) and executing the service processing concurrently and judging and realizing the service processing in real time.
Each implementation has advantages and disadvantages and most commonly is achieved by post-analysis of log keywords or event characteristics, but at the same time is able to alert or send control information to the messaging unit immediately once a problem is discovered.
And step 3: after the system of this embodiment starts to operate, the extreme value detection module first draws the execution data curve of each action in the action matrix in the latest period of time, and based on the average value generated by the data in the longer period, once finding the extreme value point (the data before or after the point is all larger or all smaller than it) larger than the average value, it goes to step 4 to enter the multiple fuzzy operation module of the detailed data analysis stage.
Step 3 may also calculate the variance between the two (the recent data and the average value), and determine whether to proceed to step 4 through variance change.
And 4, step 4: and the multiple fuzzy operation module performs fuzzy operation on the judgment matrix R' of the weight matrix A and the action matrix R according to an algorithm and outputs a calculation result.
The mathematical model adopted by the multiple fuzzy operation module for evaluation can adopt the following algorithm:
for the evaluated object, a total of m factors are set as u1、u2、…、umExpressed in the form of a set of U ═ U1、u2、…、um}; a total of n evaluation indexes of different degrees are set as v1、v2、…、vnAnd can be expressed in a set form of V ═ V1、v2、…、vn}. If use rijRepresenting the degree of membership of the ith factor to the jth comment, the fuzzy relationship between the factor set and the comment set can be represented by a judgment matrix R'. Wherein r is more than or equal to 0ij=μR'(ui,vj) 1, i is equal to or less than 1, 2, …, m; j is 1, 2, …, n, as shown in fig. 3, the evaluation matrix can be expressed as:
Figure BDA0001205814630000101
each factor weight is recorded as A ═ a1a2…am]Wherein 0. ltoreq. a.ltoreq.1 (i.e. a)1a2…amAre all in [0,1 ]]Interval), the operation result B of A and R' can be used as the evaluation object after integrating various factorsAnd finally, judging. The mathematical model of the fuzzy comprehensive evaluation can be expressed as the following calculation formula:
Figure BDA0001205814630000111
wherein, "o" represents a fuzzy operator, and the specific calculation formula is:
Figure BDA0001205814630000113
that is, element B in matrix BjIs equal to the action matrix a ═ a1a2…am]And evaluating the fuzzy operation value of the jth column element in the matrix R'. In specific operation, firstly, a is selectediAnd rijAnd then selects the maximum value from the m smaller values obtained as bjThe value of (c).
For example, for the following action matrix R ═ { open, cancel, query }, the operation process is as follows:
the comment is first defined briefly into three levels, i.e., V ═ high, medium, low, as shown in fig. 4, because rijAnd representing the membership degree of the ith factor to the jth comment, obtaining a two-dimensional data matrix for each element in the action matrix according to the relation between the current requested action and the historical data average value, wherein the two-dimensional data matrix can be represented as follows:
R1=[0.9,0.1,0.1],
R2=[0.2,0,5,0.1]
R3=[0.4,0.8,0.6]
wherein, to R1The actual situation of the data can be interpreted as that the possibility that the system evaluates that the account opening action belongs to three different levels of high, medium and low security risks when the account opening action occurs is [0.9,0.1 ]]In other words, the high risk is most likely.
And 5: the weight setting module with reference to the initial setting is set to a value of [0.92,0.24,0.10 ═ a]According to a specific calculation formula of the fuzzy operation, calculating to obtain a result B1=[0.9,0.24,0.1]。
For B as above1May be used to interpret the actual situation of the result of (A)When the system executes the action sequence of opening, canceling and inquiring, the probability of generating high risk is 0.9 at the maximum, and the probability of generating low risk is 0.1 at the minimum.
Step 6: the above calculation result B1Only R according to R1,R2,R3When the actual system runs, a plurality of groups of different data matrixes are obtained according to different start and stop times and different time granularity (which can also be regarded as data sampling periods), at the moment, the system performs similar multi-fuzzy calculation on the plurality of groups of different data matrixes, and a result B is obtained after multiple iterations2
And 7: except for time factors, the sequence of action execution is also an important factor influencing evaluation in the actual operation process, so that R is subjected to iterative computation again by adopting a means of filling blank data and transposing transformation according to a predefined standard sequence A, and a plurality of B are generated in the middle3~BnThe provisional calculation result of (2).
And 8: temporarily calculating the result B1~BnAnd forming a new data matrix and carrying out fuzzy calculation again on the A initially set in the weight setting module to obtain a data result B'.
And step 9: the weight matrix a, the time granularity or the motion filling constant and other data parameters can be adjusted for a plurality of times at this time, the data change situation is observed according to the actual situation, and the step 4 is carried out to execute repeated iterative computation until a predefined warning or a set threshold value is reached. This step can be either manually engaged in the correction or automatically performed by the system after setting the standard fitting data.
Step 10: and the state judgment module receives the final calculation result B, determines to execute alarm or send control information to the WEB message receiving and sending unit, and ends the process.
The invention is explained based on a fuzzy detection analysis system of user behavior.
In summary, the embodiments of the present invention have the following technical effects:
1. the embodiment of the invention provides a weight setting module which can be defined in a service function development stage, and compared with a detection rule formulated by a safety detector or an expert system similar to a malicious code characteristic rule automatically summarized through code comparison analysis and the like, the weight setting module is defined by the developer in the implementation process, so that the accuracy is ensured, the simplicity in implementation is realized, and the influence of a safety detection system on the normal service execution process is avoided to a great extent.
2. For a system running in real time, the more powerful the system can detect the higher the performance requirement of the comprehensive security detection system on the system itself, so that the problems of too high cost of security reinforcement or great influence on the performance of system service and the like can exist.
3. The embodiment of the invention can be operated as a part of service security reinforcement, can also be operated in cooperation with an external independent security detection system, has the characteristics of light invasiveness and easy disassembly and loose coupling, and is easily suitable for various service scenes.
Although the present invention has been described in detail hereinabove, the present invention is not limited thereto, and various modifications can be made by those skilled in the art in light of the principle of the present invention. Thus, modifications made in accordance with the principles of the present invention should be understood to fall within the scope of the present invention.

Claims (8)

1. A method for fuzzy detection analysis of WEB server security comprises the following steps:
whether abnormal user behaviors exist is judged in advance by analyzing the quantity fluctuation of user request messages or the execution sequence of service actions corresponding to the user request messages during service execution;
if the pre-judging result is that abnormal user behaviors exist, acquiring an action matrix formed by each service action executed according to the time sequence of the service during the service execution period, a weight matrix formed by the weight of each service action executed according to the time sequence in the action matrix and a judging matrix formed by the membership value of each service action executed according to the time sequence in the action matrix to different safety evaluation indexes;
and performing fuzzy operation by using a weight matrix formed by the weight of each service action executed according to the time sequence in the action matrix and a judgment matrix formed by the membership value of each service action executed according to the time sequence in the action matrix to different safety evaluation indexes to obtain different safety evaluation indexes when each service action is executed according to the time sequence in the action matrix so as to determine the safety of the WEB server.
2. The method of claim 1, wherein the predicting whether the abnormal user behavior exists by analyzing the number fluctuation of the user request messages or the execution sequence of the service actions corresponding to the user request messages during the service execution comprises:
and pre-judging whether abnormal user behaviors exist or not by analyzing the quantity fluctuation of user request messages in unit time during service execution.
3. The method of claim 1, wherein the predicting whether the abnormal user behavior exists by analyzing the number fluctuation of the user request messages or the execution sequence of the service actions corresponding to the user request messages during the service execution comprises:
the execution sequence of the corresponding service action requested by the user is determined by analyzing the user request message during the service execution period, and whether abnormal user behaviors exist or not is judged in advance according to the execution sequence.
4. The method according to claim 1, wherein the performing fuzzy operation by using a weight matrix composed of weights of the service actions performed in the action matrix according to the time sequence and a judgment matrix composed of membership values of the service actions performed in the action matrix according to the time sequence to different safety evaluation indexes to obtain different safety evaluation indexes of the service actions performed in the action matrix according to the time sequence so as to determine the safety of the WEB server comprises:
and carrying out fuzzy operation on the weight matrix and the judgment matrix of the action matrix corresponding to the service to obtain a security matrix formed by different security evaluation indexes when each service action in the action matrix is executed according to a time sequence, and determining the security of the WEB server when the service action is executed according to the time sequence according to the security matrix.
5. The method according to any of claims 1-4, wherein the weight matrix is determined by:
determining an initial weight matrix according to a service action execution sequence and an action dependency relationship set in a service development period, and adjusting the initial weight matrix by using a fuzzy operation result in the service execution period.
6. An apparatus for fuzzy detection analysis of security of a WEB server, comprising:
the pre-judging module is used for pre-judging whether abnormal user behaviors exist or not by analyzing the quantity fluctuation of user request messages or the execution sequence of service actions corresponding to the user request messages during service execution;
the obtaining module is used for obtaining an action matrix formed by each service action executed according to the time sequence during the service execution period, a weight matrix formed by the weight of each service action executed according to the time sequence in the action matrix and a judging matrix formed by the membership value of each service action executed according to the time sequence in the action matrix to different safety evaluation indexes when the pre-judging result shows that abnormal user behaviors exist;
and the processing module is used for performing fuzzy operation by utilizing a weight matrix formed by the weight of each service action executed according to the time sequence in the action matrix and a judgment matrix formed by the membership value of each service action executed according to the time sequence in the action matrix to different safety evaluation indexes to obtain different safety evaluation indexes when each service action is executed according to the time sequence in the action matrix so as to determine the safety of the WEB server.
7. The apparatus of claim 6, wherein the pre-judging module pre-judges whether an abnormal user behavior exists by analyzing a fluctuation of a number of user request messages per unit time during service execution, or determines an execution sequence of a corresponding service action requested by a user by analyzing a user request message during service execution, and pre-judges whether an abnormal user behavior exists according to the execution sequence.
8. The apparatus according to claim 6, wherein the processing module performs fuzzy operation on the weight matrix and the evaluation matrix of the action matrix corresponding to the service to obtain a security matrix formed by different security evaluation indexes when each service action in the action matrix is executed according to a time sequence, and determines the security of the WEB server when the service action is executed according to the time sequence according to the security matrix.
CN201710013578.4A 2017-01-09 2017-01-09 Method and device for carrying out fuzzy detection analysis on WEB server security Active CN108289077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710013578.4A CN108289077B (en) 2017-01-09 2017-01-09 Method and device for carrying out fuzzy detection analysis on WEB server security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710013578.4A CN108289077B (en) 2017-01-09 2017-01-09 Method and device for carrying out fuzzy detection analysis on WEB server security

Publications (2)

Publication Number Publication Date
CN108289077A CN108289077A (en) 2018-07-17
CN108289077B true CN108289077B (en) 2021-09-21

Family

ID=62819318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710013578.4A Active CN108289077B (en) 2017-01-09 2017-01-09 Method and device for carrying out fuzzy detection analysis on WEB server security

Country Status (1)

Country Link
CN (1) CN108289077B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492394B (en) * 2018-10-25 2024-05-03 平安科技(深圳)有限公司 Abnormal service request identification method and terminal equipment
CN112968900A (en) * 2021-02-26 2021-06-15 云账户技术(天津)有限公司 Cross-site scripting attack vulnerability detection method and device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7681235B2 (en) * 2003-05-19 2010-03-16 Radware Ltd. Dynamic network protection
CN103489137A (en) * 2013-10-17 2014-01-01 东南大学 Action sequence determination method for reactive power compensation device of wind power system
CN104378361A (en) * 2014-10-24 2015-02-25 苏州阔地网络科技有限公司 Network intrusion detection method and system
CN104598880A (en) * 2015-03-06 2015-05-06 中山大学 Behavior identification method based on fuzzy support vector machine
CN105243328A (en) * 2015-09-24 2016-01-13 哈尔滨工程大学 Behavioral characteristic based Ferry horse defense method
CN105656923A (en) * 2016-02-18 2016-06-08 中国工程物理研究院计算机应用研究所 Binary protocol format analysis method based on fuzzy weighting
CN105827611A (en) * 2016-04-06 2016-08-03 清华大学 Distributed rejection service network attack detection method and system based on fuzzy inference
CN106209829A (en) * 2016-07-05 2016-12-07 杨林 A kind of network security management system based on warning strategies

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761576B (en) * 2011-04-28 2015-04-01 中兴通讯股份有限公司 Web system malicious polyphonic ringtone ordering preventing method and server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7681235B2 (en) * 2003-05-19 2010-03-16 Radware Ltd. Dynamic network protection
CN103489137A (en) * 2013-10-17 2014-01-01 东南大学 Action sequence determination method for reactive power compensation device of wind power system
CN104378361A (en) * 2014-10-24 2015-02-25 苏州阔地网络科技有限公司 Network intrusion detection method and system
CN104598880A (en) * 2015-03-06 2015-05-06 中山大学 Behavior identification method based on fuzzy support vector machine
CN105243328A (en) * 2015-09-24 2016-01-13 哈尔滨工程大学 Behavioral characteristic based Ferry horse defense method
CN105656923A (en) * 2016-02-18 2016-06-08 中国工程物理研究院计算机应用研究所 Binary protocol format analysis method based on fuzzy weighting
CN105827611A (en) * 2016-04-06 2016-08-03 清华大学 Distributed rejection service network attack detection method and system based on fuzzy inference
CN106209829A (en) * 2016-07-05 2016-12-07 杨林 A kind of network security management system based on warning strategies

Also Published As

Publication number Publication date
CN108289077A (en) 2018-07-17

Similar Documents

Publication Publication Date Title
CN110399925B (en) Account risk identification method, device and storage medium
CN102171657B (en) Simplified communication of a reputation score for an entity
US11429565B2 (en) Terms of service platform using blockchain
CN111027070B (en) Malicious application detection method, medium, device and apparatus
CN110851872B (en) Risk assessment method and device for private data leakage
CN110020002A (en) Querying method, device, equipment and the computer storage medium of event handling scheme
US20200250587A1 (en) Framework for multi-tenant data science experiments at-scale
CN110569159A (en) Baffle generation method, device, equipment and computer storage medium
CN110991871A (en) Risk monitoring method, device, equipment and computer readable storage medium
CN113392426A (en) Method and system for enhancing data privacy of an industrial or electrical power system
CN108289077B (en) Method and device for carrying out fuzzy detection analysis on WEB server security
CN114003920A (en) Security assessment method and device for system data, storage medium and electronic equipment
CN111669365B (en) Network security test method and device
CN112968796A (en) Network security situation awareness method and device and computer equipment
US10089475B2 (en) Detection of security incidents through simulations
US20160050101A1 (en) Real-Time Network Monitoring and Alerting
CN112015715A (en) Industrial Internet data management service testing method and system
CN115203032A (en) Whole machine software detection method and device based on intelligent equipment
CN114579809A (en) Event analysis method and device, electronic equipment and storage medium
CN113609146A (en) Change operation risk control method and device
CN112948829A (en) File searching and killing method, system, equipment and storage medium
CN111934949A (en) Safety test system based on database injection test
CN113542204A (en) Protection rule generation method and device and storage medium
CN114499998B (en) Security protection method, device, electronic equipment and storage medium
CN115001771B (en) Verification code defending method, system, equipment and storage medium based on automatic updating

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant