CN109145536A - A kind of webpage integrity assurance and device - Google Patents

A kind of webpage integrity assurance and device Download PDF

Info

Publication number
CN109145536A
CN109145536A CN201710465752.9A CN201710465752A CN109145536A CN 109145536 A CN109145536 A CN 109145536A CN 201710465752 A CN201710465752 A CN 201710465752A CN 109145536 A CN109145536 A CN 109145536A
Authority
CN
China
Prior art keywords
file
operation requests
webpage
target webpage
requests
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710465752.9A
Other languages
Chinese (zh)
Other versions
CN109145536B (en
Inventor
李鸣雷
邱雁杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd, Beijing Kingsoft Cloud Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN201710465752.9A priority Critical patent/CN109145536B/en
Publication of CN109145536A publication Critical patent/CN109145536A/en
Application granted granted Critical
Publication of CN109145536B publication Critical patent/CN109145536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of webpage integrity assurance and devices, which comprises receives the file operation requests for being directed to target webpage file;It monitors whether to access the corresponding operation table of the target webpage file;If it is, judging whether the file operation requests are webpage tamper operation requests;If so, refusing to respond the file operation requests.Using the embodiment of the present invention, the risk that can not restore after being tampered to avoid web page files.

Description

A kind of webpage integrity assurance and device
Technical field
The present invention relates to filed of network information security, in particular to a kind of webpage integrity assurance and device.
Background technique
There are three types of application layer webpage tamper-resistance techniques common at present: timing cycle scanning technique, digital watermark technology, thing Part triggering technique.
Wherein, timing cycle scanning technique is by external mechanical according to time threshold set by user, to targeted website It is polled access, whether detection web page files are consistent with the web page files backed up, if inconsistent, illustrate the web page files It has been be tampered that, the web page files distorted have been restored with the web page files backed up.
Digital watermark technology is that integrity checking is carried out when webpage is browsed, by comparing accessed web page files therewith The watermark of the web page files of preceding backup prevents the web page files being tampered from being shown to judge whether accessed file is tampered User, and the web page files distorted are restored with the web page files backed up.
Event triggering technique is monitored by catalogue of the User space program to protection, if catalogue is modified, monitoring Program will obtain system notification event, then judge whether it is tampering according to relevant configuration strategy, if it is tampering, Then it is restored.
Above-mentioned three kinds of tamper resistant methods are all to be restored again after web page files are tampered, but if be tampered Web page files are maliciously kidnapped, and the risk that can not restore may be generated.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of webpage integrity assurance and device, is usurped to avoid web page files The risk that can not restore after changing.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of webpage integrity assurance, the method includes the steps:
Receive the file operation requests for being directed to target webpage file;
It monitors whether to access the corresponding operation table of the target webpage file;
If it is, judging whether the file operation requests are webpage tamper operation requests;
If so, refusing to respond the file operation requests.
Optionally, the operation table is that index node operates table and/or file operation table.
It is optionally, described to judge whether the file operation requests are webpage tamper operation requests, comprising:
By operating table and/or the corresponding kernel file handling function setting hook of file operation table to the index node The mode of function detects whether the file operation requests are webpage tamper operation requests.
Optionally, the method also includes:
When judging the file operation requests not is webpage tamper operation requests, the file operation requests are responded.
Optionally, it is described judge whether the file operation requests are webpage tamper operation requests before, further includes:
According to the corresponding configuration strategy of the target webpage file, the corresponding configuration text of the target webpage file is generated Part.
It is optionally, described to judge whether the file operation requests are webpage tamper operation requests, comprising:
Obtain the corresponding configuration file of the target webpage file;
According to the configuration strategy in the configuration file, judge whether the file operation requests are that webpage tamper operation is asked It asks.
Optionally, it is described refuse to respond the file operation requests after, further includes:
According to the file operation requests, operation log is distorted in generation.
In order to achieve the above objectives, the embodiment of the invention also discloses a kind of webpage tamper resistant device, described device includes:
Receiving module, for receiving the file operation requests for being directed to target webpage file;
Monitoring modular accesses the corresponding operation table of the target webpage file for monitoring whether;
Judgment module is used in monitoring module monitors operation table corresponding to the access target webpage file, Judge whether the file operation requests are webpage tamper operation requests;
Refuse module, for judging that the file operation requests are webpage tamper operation requests in the judgment module When, refuse to respond the file operation requests.
Optionally, the operation table is that index node operates table and/or file operation table.
Optionally, the judgment module, is specifically used for:
By operating table and/or the corresponding kernel file handling function setting hook of file operation table to the index node The mode of function detects whether the file operation requests are webpage tamper operation requests.
Optionally, described device further include:
Respond module is webpage tamper operation requests for judging the file operation requests not in the judgment module When, respond the file operation requests.
Optionally, described device further include:
First generation module, for judging whether the file operation requests are webpage tamper operation in the judgment module Before request, according to the corresponding configuration strategy of the target webpage file, the corresponding configuration text of the target webpage file is generated Part.
Optionally, the judgment module, comprising:
Submodule is obtained, for obtaining the corresponding configuration file of the target webpage file;
Judging submodule, for whether judging the file operation requests according to the configuration strategy in the configuration file For webpage tamper operation requests.
Optionally, described device further include:
Second generation module, for after the refusal module refuses to respond the file operation requests, according to described Operation log is distorted in file operation requests, generation.
As seen from the above, scheme provided by the embodiment of the present invention is receiving the file operation for being directed to target webpage file After request, if monitoring to access the corresponding operation table of the target webpage file, judge whether this document operation requests are that webpage is usurped Change operation requests, if so, refusing to respond this document operation requests.Compared with prior art, side provided in an embodiment of the present invention In case, due to monitoring that accessing the target webpage file corresponds to before responding the file operation for target webpage file Operation table when, need whether to be that malice is distorted request and judged to this document operation requests, when determining that this document operation asks Seeking Truth malice refuses to respond this document operation requests when distorting request, that is to say, that and target webpage file will not be maliciously tampered, The risk that can not restore after being tampered so as to avoid web page files.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the first flow diagram of webpage integrity assurance provided in an embodiment of the present invention;
Fig. 2 is second of flow diagram of webpage integrity assurance provided in an embodiment of the present invention;
Fig. 3 is the first flow diagram of webpage tamper resistant device provided in an embodiment of the present invention;
Fig. 4 is second of flow diagram of webpage tamper resistant device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It should be noted that webpage integrity assurance provided in an embodiment of the present invention can be applied to linux system, it is related to To the Virtual File System (Virtual File System, VFS) of linux system, a distinguishing feature of Virtual File System It is to support the access of a variety of file system, such as ext3, nfs.Wherein, the data structure in VFS include index node object and File object, the corresponding index node object of a file, due to opening simultaneously and operating one there may be multiple processes The case where file, therefore a file may correspond to multiple file objects.And the corresponding index of each index node object Nodal operation table, the corresponding file operation table of each file object, accordingly, it can be said that the corresponding index section of a file Point operation table, may correspond to multiple file operation tables.
Certainly, webpage integrity assurance provided in an embodiment of the present invention can also be applied to other similar above system System, the application are not defined the specific application environment of webpage integrity assurance provided in an embodiment of the present invention.The application It is illustrated by taking (SuSE) Linux OS as an example.
The index node object of one file can be understood as a pointer, be directed toward this document specifically depositing in disk partition Storage space is set, and when carrying out system calling, the information that index node object stores is called in memory, and be filled into index node It operates in table, each member in the operation table is function pointer, is directed toward the realization function of modification attribute.Here realization letter Number is also referred to as kernel file handling function.
File object is the expression of the file opened in memory, is mainly used for establishing the file in process and disk Corresponding relationship.The relevant operational set composing document of file object operates table, and each member in the operation table is that function refers to Needle is directed toward some specific operation and realizes function, as write member is directed toward the realization function of file write operations.Here reality Existing function is also referred to as kernel file handling function.
There are two types of runlevel, respectively kernel state and User space, kernel state program is program in (SuSE) Linux OS The program of kernel spacing is operated in, User space program is to operate in the program of user's space.
When a task or process are when executing the code of user oneself, it is claimed to be in user's run mode (User space), this When processor run in the minimum personal code work of privilege level, i.e., the task or process operate in user's space.Appoint when one Business or process execute system and call and enter in kernel code when executing, then claim task or process be in kernel run mode (or simple Referred to as kernel state), processor is in the highest kernel code of privilege level and executes at this time, i.e., the task or process operate in interior Nuclear space.
Webpage integrity assurance in the prior art is realized by operating in the program of User space, as timing cycle is swept Technology, digital watermark technology, event triggering technique are retouched, is restored again after detecting that web page files are modified, it may Web page files are caused maliciously to be kidnapped the risk that can not restore.And webpage integrity assurance provided in an embodiment of the present invention by Kernel state carries out security protection to web page files, avoids User space program and is easy the risk maliciously stopped, to web page files The defence for distorting operation, has evaded the influence of watermarking algorithm performance caused by server, and the defence of real-time blocking formula is not responding to malice Operation requests avoid the risk that can not restore after web page files are tampered.
Specifically, timing cycle scanning technique passes through external mechanical according to time threshold set by user, to target network Station is polled the mode of access, be affected to targeted website, low efficiency and covering surface it is smaller, the main object that covers is pure quiet State website.And scheme provided by the embodiment of the present invention is blocked before distorting operation requests response, and it is high-efficient, to net Standing, it is small to influence, and the characteristic of a variety of file system accesses is supported since Virtual File System in linux system is utilized, covers object It is more.
Digital watermark technology is adopted using Web server kernel inside technology as the kernel inside module of web server Integrity checking is carried out when webpage is browsed with the form of web server access triggers.Using watermark contrast module as plug-in unit It is inserted into different web servers, by the comparison to accessed file watermark, realizes the protection to webpage, it is main to protect Object is static file and script.The major defect of the technology has: (1) digital watermarking is calculated to server access performance and resource Occupancy has certain influence;(2) real-time response is carried out not when file is tampered;(3) need to increase independent publication when disposing Server;(4) software module relies on web container, need to develop different modules for different web containers;(5) watermarking algorithm is deposited In insecurity;(6) when facing lasting modification, it not can guarantee webpage and be not tampered.And scheme provided by the embodiment of the present invention It carries out detecting whether the operation requests are to distort request before operation requests response, does not need to carry out website in additional portion Administration, refuses to respond before file is tampered and distorts operation, it is ensured that file is not tampered, and safety is higher, to server Performance influences smaller.
Event triggering technique is monitored by catalogue of the User space program to protection, if catalogue is modified, monitoring Program will obtain system notification event, then malice tampering be judged whether it is according to configuration strategy, if it is malicious modification Behavior then restores it, and main protected object is static file and script.The major defect of the technology are as follows: (1) User space There is the risk maliciously terminated in program, be difficult to evade;(2) user carries out the lasting modification of high speed to web page files, it would be possible to lead The case where causing file that can not restore;(3) after user modifies to web page files, file handle is kidnapped immediately, will lead to file The case where can not restoring.And scheme provided by the embodiment of the present invention, file is protected in kernel state, avoids User space There is the risk maliciously terminated in program, blocked before distorting operation and executing, avoiding can not be extensive after file is tampered Multiple risk.
To solve prior art problem, the embodiment of the invention provides a kind of webpage integrity assurance and devices.Lower kept man of a noblewoman A kind of webpage integrity assurance is first provided for the embodiments of the invention to be described in detail.
Fig. 1 is the first flow diagram of webpage integrity assurance provided in an embodiment of the present invention, and this method can wrap It includes:
S101 receives the file operation requests for being directed to target webpage file.
Wherein, user can be reading file operation, operating writing-file, deletion file to the file operation of target webpage file It operates or other is directed to the operation of web page files, may include: mark, the file of target webpage file in file operation requests Information, certain the application such as the mark of operation, the user for executing file operation do not limit the letter for including in file operation requests Breath, the mark of above-mentioned file operation reads file operation, operating writing-file for indicating this document operation, delete file operation or Person other be directed to web page files operation.
It is understood that for linux system, when user carries out file operation to target webpage file, meeting Triggering the documentary information event of linux kernel, i.e. linux kernel receives the file operation requests for the web page files, That is this document operation enters kernel state from User space.
S102 monitors whether to access the corresponding operation table of the target webpage file;If it is, executing S103.
Specifically, aforesaid operations table can operate table and/or file operation table for index node.As seen from the above description, In linux kernel state, each target webpage file is corresponding with index node operation table and file operation table.In kernel state pair When target webpage file carries out file operation, require to access first the corresponding index node operation table of the target webpage file and File operation table obtains this document according to the function pointer in above-mentioned table and operates corresponding realization function, carries out the realization function Corresponding system is called, and the file operation to target webpage file is completed.
S103 judges whether this document operation requests are webpage tamper operation requests;If so, executing S104.
In practical application, when monitoring to access the corresponding index node operation table of the target webpage file and/or file behaviour When making table, need to judge whether this document operation requests are webpage tamper operation requests.
It in one implementation, can be by corresponding interior to above-mentioned index node operation table and/or file operation table The mode of hooking function is arranged in core file manipulation function, and whether detection this document operation requests are webpage tamper operation requests.Tool Body, the parameter in table and/or file operation table is operated by modification index node, operates table and/or file in index node It operates table corresponding kernel file handling function and hooking function is set.
Hooking function is pre-set detection function according to the corresponding configuration strategy of target webpage file, is used for basis The corresponding configuration strategy of target webpage file judges whether file operation requests are webpage tamper operation requests.Specifically, configuration Strategy can be the access authority of target webpage file, indicate to allow or specific permission is forbidden to access file.If this document is grasped It is consistent with the access authority in configuration strategy to make request, indicates that this document operation requests are not webpage tamper operation requests;If should File operation requests and the access authority in configuration strategy are inconsistent, indicate that this document operation requests are that webpage tamper operation is asked It asks.
For example, the configuration strategy of web page files A is that user A is forbidden to carry out write operation, i.e. user A does not write this document A The permission of operation, and other users have the permission of write operation to this document A;So, when receiving user A to web page files A Write operation requests after, hooking function judges that this document operation requests are usurped for webpage according to the configuration strategy of web page files A Change operation requests;After receiving write operation requests of the user B to web page files A, according to the configuration strategy of web page files A, It is webpage tamper operation requests that hooking function, which judges this document operation requests not,.
It should be noted that in the application, it can be individually corresponding in the corresponding index node operation table of target webpage file Kernel file handling function be arranged hooking function, individually the corresponding kernel file handling function of file operation table can also be set Hooking function is set, since each target webpage file may correspond to multiple file operation tables, it is therefore desirable to each file Hooking function is all arranged in the corresponding kernel file handling function of operation table.It, can also be simultaneously in a kind of preferable embodiment Table is operated to index node and hooking function is arranged in the corresponding kernel file handling function of index node operation table, it is more preferable to realize Protection effect.
S104 refuses to respond this document operation requests.
When judging this document operation requests is webpage tamper operation requests, in order to guarantee the peace of target webpage file Entirely, it needs to refuse to respond this document operation requests.
When judging this document operation requests not is webpage tamper operation requests, it should also respond this document operation and ask It asks, to guarantee that the file operation for target webpage file is normally carried out.
Further, due to judging that this document operation requests are webpage tamper operation requests, in order to track webpage tamper Operation, can also be according to this document after refusing to respond this document operation requests convenient for analyzing to distorting operation behavior Operation log is distorted in operation requests, generation.
It can be with specifically, distorting the information for including in operation log are as follows: the mark for distorting operation, carries out at the file distorted The IP address distorted distorts the time etc., and the application is not defined to distorting the information for including in operation log.
As seen from the above, scheme provided by the embodiment of the present invention is receiving the file operation for being directed to target webpage file After request, if monitoring to access the corresponding operation table of the target webpage file, judge whether this document operation requests are that webpage is usurped Change operation requests, if so, refusing to respond this document operation requests.Compared with prior art, side provided in an embodiment of the present invention In case, due to monitoring that accessing the target webpage file corresponds to before responding the file operation for target webpage file Operation table when, need whether to be that malice is distorted request and judged to this document operation requests, when determining that this document operation asks Seeking Truth malice refuses to respond this document operation requests when distorting request, that is to say, that and target webpage file will not be maliciously tampered, The risk that can not restore after being tampered so as to avoid web page files.
It should be noted that the access authority in the corresponding configuration strategy of target webpage file can be from file operation class The various aspects such as type, user, process are configured.It in one particular embodiment of the present invention, can be according to the web page files Configuration strategy generates corresponding configuration file and is judging file operation in order to which system flexibly sets or modify configuration strategy When whether request is webpage tamper operation requests, after the configuration strategy in the configuration file is read by hooking function, according to configuration Strategy is judged.
In a kind of specific implementation of the application, receive for target webpage file file operation requests it Before, the corresponding configuration file of target webpage file can be generated first according to the corresponding configuration strategy of target webpage file.In reality In, as long as it is corresponding to generate target webpage file before judging whether file operation requests be webpage tamper operation requests Configuration file, be all it is reasonable, the application does not limit this.
Based on above-mentioned specific implementation, referring to fig. 2, second of flow diagram of webpage integrity assurance is provided, Compared with embodiment illustrated in fig. 1, in the present embodiment, judge whether this document operation requests are webpage tamper operation in step S103 Before request, can also include:
S105 generates the corresponding configuration text of the target webpage file according to the corresponding configuration strategy of target webpage file Part.
It, can be multi-party from file operation type, user, process etc. to the configuration strategy of target webpage file in practical application The access authority in face is configured.For example, user A forbids carrying out file operation type A's to target webpage file in process A File operation, user B allow to carry out target webpage file in process A the file operation, etc. of file operation type A.
Correspondingly, above-mentioned steps S103, judges whether file operation requests are webpage tamper operation requests, may include:
S1031 obtains the corresponding configuration file of target webpage file.
S1032 judges whether this document operation requests are webpage tamper operation according to the configuration strategy in the configuration file Request.
Specifically, judging whether this document operation requests are webpage tamper behaviour according to the configuration strategy in the configuration file When requesting, judge whether above-mentioned file operation requests match with above-mentioned configuration strategy, if matching, can be determined that this document Operation requests are webpage tamper operation requests, if mismatching, can be determined that this document operation requests not is webpage tamper operation Request.
For example, configuration strategy can be the access authority of target webpage file, indicates to allow or specific permission is forbidden to visit Ask file.If this document operation requests are consistent with the access authority in configuration strategy, indicate that this document operation requests are not webpages Distort operation requests;If this document operation requests and the access authority in configuration strategy are inconsistent, this document operation requests are indicated For webpage tamper operation requests.
Above-mentioned configuration strategy can also be other content, but deterministic process is similar with above situation, here no longer one by one It enumerates.
By foregoing description it is recognised that by hooking function according to the corresponding configuration strategy detection file behaviour of target webpage file Request whether to be webpage tamper operation requests.In the present embodiment, hooking function obtains that target webpage file is corresponding to match first File is set, the configuration strategy in the configuration file is read, protection detection is carried out according to configuration strategy, whether judges this document request For webpage tamper operation requests.
As seen from the above, scheme provided by the embodiment of the present invention is receiving the file operation for being directed to target webpage file After request, if monitoring to access the corresponding operation table of the target webpage file, judge whether this document operation requests are that webpage is usurped Change operation requests, if so, refusing to respond this document operation requests.Compared with prior art, side provided in an embodiment of the present invention In case, due to monitoring that accessing the target webpage file corresponds to before responding the file operation for target webpage file Operation table when, need whether to be that malice is distorted request and judged to this document operation requests, when determining that this document operation asks Seeking Truth malice refuses to respond this document operation requests when distorting request, that is to say, that and target webpage file will not be maliciously tampered, The risk that can not restore after being tampered so as to avoid web page files;Further, according to the configuration strategy of target webpage file Corresponding configuration file is generated, configuration strategy is flexibly set or modified convenient for system.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of webpage tamper resistant devices.
Corresponding with embodiment of the method shown in FIG. 1, Fig. 3 is the of webpage tamper resistant device provided in an embodiment of the present invention A kind of structural schematic diagram, the apparatus may include: receiving module 301, monitoring modular 302, judgment module 303 refuse module 304, in which:
Receiving module 301, for receiving the file operation requests for being directed to target webpage file;
Monitoring modular 302 accesses the corresponding operation table of the target webpage file for monitoring whether;
Judgment module 303 accesses the corresponding operation of the target webpage file for monitoring in the monitoring modular 302 When table, judge whether the file operation requests are webpage tamper operation requests;
Refuse module 304, for judging that the file operation requests are webpage tamper operations in the judgment module 303 When request, the file operation requests are refused to respond.
In practical applications, the operation table can operate table and/or file operation table for index node.
In practical applications, the judgment module 303, specifically can be used for:
By operating table and/or the corresponding kernel file handling function setting hook of file operation table to the index node The mode of function detects whether the file operation requests are webpage tamper operation requests.
In practical applications, which can also include:
Respond module (not shown) is for judging the file operation requests not in the judgment module 303 When webpage tamper operation requests, the file operation requests are responded.
In practical applications, which can also include:
Second generation module (not shown) is asked for refusing to respond the file operation in the refusal module 304 After asking, according to the file operation requests, operation log is distorted in generation.
As seen from the above, scheme provided by the embodiment of the present invention is receiving the file operation for being directed to target webpage file After request, if monitoring to access the corresponding operation table of the target webpage file, judge whether this document operation requests are that webpage is usurped Change operation requests, if so, refusing to respond this document operation requests.Compared with prior art, side provided in an embodiment of the present invention In case, due to monitoring that accessing the target webpage file corresponds to before responding the file operation for target webpage file Operation table when, need whether to be that malice is distorted request and judged to this document operation requests, when determining that this document operation asks Seeking Truth malice refuses to respond this document operation requests when distorting request, that is to say, that and target webpage file will not be maliciously tampered, The risk that can not restore after being tampered so as to avoid web page files.
Corresponding with embodiment of the method shown in Fig. 2, Fig. 4 is the of webpage tamper resistant device provided in an embodiment of the present invention Two kinds of structural schematic diagrams, compared with embodiment illustrated in fig. 3, in the present embodiment, which can also include: first Generation module 305, in which:
First generation module 305, for judging whether the file operation requests are that webpage is usurped in the judgment module 303 Before changing operation requests, according to the corresponding configuration strategy of the target webpage file, it is corresponding to generate the target webpage file Configuration file.
Correspondingly, the judgment module 303, may include: to obtain submodule 3031, judging submodule 3032, in which:
Submodule 3031 is obtained, for obtaining the corresponding configuration file of the target webpage file;
Judging submodule 3032, for judging the file operation requests according to the configuration strategy in the configuration file It whether is webpage tamper operation requests.
As seen from the above, scheme provided by the embodiment of the present invention is receiving the file operation for being directed to target webpage file After request, if monitoring to access the corresponding operation table of the target webpage file, judge whether this document operation requests are that webpage is usurped Change operation requests, if so, refusing to respond this document operation requests.Compared with prior art, side provided in an embodiment of the present invention In case, due to monitoring that accessing the target webpage file corresponds to before responding the file operation for target webpage file Operation table when, need whether to be that malice is distorted request and judged to this document operation requests, when determining that this document operation asks Seeking Truth malice refuses to respond this document operation requests when distorting request, that is to say, that and target webpage file will not be maliciously tampered, The risk that can not restore after being tampered so as to avoid web page files;Further, according to the configuration strategy of target webpage file Corresponding configuration file is generated, configuration strategy is flexibly set or modified convenient for system.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (14)

1. a kind of webpage integrity assurance, which is characterized in that the method includes the steps:
Receive the file operation requests for being directed to target webpage file;
It monitors whether to access the corresponding operation table of the target webpage file;
If it is, judging whether the file operation requests are webpage tamper operation requests;
If so, refusing to respond the file operation requests.
2. the method according to claim 1, wherein the operation table is that index node operates table and/or file Operate table.
3. according to the method described in claim 2, it is characterized in that, described judge whether the file operation requests are that webpage is usurped Change operation requests, comprising:
By operating table and/or the corresponding kernel file handling function setting hooking function of file operation table to the index node Mode, detect whether the file operation requests are webpage tamper operation requests.
4. the method according to claim 1, wherein the method also includes:
When judging the file operation requests not is webpage tamper operation requests, the file operation requests are responded.
5. the method according to claim 1, wherein judging whether the file operation requests are webpage described Before distorting operation requests, further includes:
According to the corresponding configuration strategy of the target webpage file, the corresponding configuration file of the target webpage file is generated.
6. according to the method described in claim 5, it is characterized in that, described judge whether the file operation requests are that webpage is usurped Change operation requests, comprising:
Obtain the corresponding configuration file of the target webpage file;
According to the configuration strategy in the configuration file, judge whether the file operation requests are webpage tamper operation requests.
7. the method according to claim 1, wherein it is described refuse to respond the file operation requests after, Further include:
According to the file operation requests, operation log is distorted in generation.
8. a kind of webpage tamper resistant device, which is characterized in that described device includes:
Receiving module, for receiving the file operation requests for being directed to target webpage file;
Monitoring modular accesses the corresponding operation table of the target webpage file for monitoring whether;
Judgment module, for judging in monitoring module monitors operation table corresponding to the access target webpage file Whether the file operation requests are webpage tamper operation requests;
Refuse module, for refusing when the judgment module judges that the file operation requests are webpage tamper operation requests Lost art answers the file operation requests.
9. device according to claim 8, which is characterized in that the operation table is that index node operates table and/or file Operate table.
10. device according to claim 9, which is characterized in that the judgment module is specifically used for:
By operating table and/or the corresponding kernel file handling function setting hooking function of file operation table to the index node Mode, detect whether the file operation requests are webpage tamper operation requests.
11. device according to claim 8, which is characterized in that described device further include:
Respond module, for when it is webpage tamper operation requests that the judgment module, which judges the file operation requests not, Respond the file operation requests.
12. device according to claim 8, which is characterized in that described device further include:
First generation module, for judging whether the file operation requests are webpage tamper operation requests in the judgment module Before, according to the corresponding configuration strategy of the target webpage file, the corresponding configuration file of the target webpage file is generated.
13. device according to claim 12, which is characterized in that the judgment module, comprising:
Submodule is obtained, for obtaining the corresponding configuration file of the target webpage file;
Judging submodule, for judging whether the file operation requests are net according to the configuration strategy in the configuration file Page distorts operation requests.
14. device according to claim 8, which is characterized in that described device further include:
Second generation module, for after the refusal module refuses to respond the file operation requests, according to the file Operation log is distorted in operation requests, generation.
CN201710465752.9A 2017-06-19 2017-06-19 Webpage tamper-proofing method and device Active CN109145536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710465752.9A CN109145536B (en) 2017-06-19 2017-06-19 Webpage tamper-proofing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710465752.9A CN109145536B (en) 2017-06-19 2017-06-19 Webpage tamper-proofing method and device

Publications (2)

Publication Number Publication Date
CN109145536A true CN109145536A (en) 2019-01-04
CN109145536B CN109145536B (en) 2021-03-26

Family

ID=64804399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710465752.9A Active CN109145536B (en) 2017-06-19 2017-06-19 Webpage tamper-proofing method and device

Country Status (1)

Country Link
CN (1) CN109145536B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022305A (en) * 2019-03-07 2019-07-16 北京华安普特网络科技有限公司 Web portal security guard system and method
CN110765453A (en) * 2019-09-27 2020-02-07 山东高速信联科技有限公司 Tamper-proof method and system for ETC online recharging service
CN112052423A (en) * 2020-10-10 2020-12-08 杭州安恒信息安全技术有限公司 Data tamper-proof method, system and related device
CN112187787A (en) * 2020-09-27 2021-01-05 广州瀚信通信科技股份有限公司 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324885A (en) * 2013-06-19 2013-09-25 山东中创软件商用中间件股份有限公司 Method and system for protecting kernel-level file
CN104766009A (en) * 2015-03-18 2015-07-08 杭州安恒信息技术有限公司 System for preventing webpage document tampering based on operating system bottom layer
CN104778423A (en) * 2015-04-28 2015-07-15 福建六壬网安股份有限公司 Webpage tamper-resistant method based on file-driven watermark comparison
CN105550599A (en) * 2015-12-29 2016-05-04 山东中创软件商用中间件股份有限公司 Linux virtual file system-based tamper-proof method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324885A (en) * 2013-06-19 2013-09-25 山东中创软件商用中间件股份有限公司 Method and system for protecting kernel-level file
CN104766009A (en) * 2015-03-18 2015-07-08 杭州安恒信息技术有限公司 System for preventing webpage document tampering based on operating system bottom layer
CN104778423A (en) * 2015-04-28 2015-07-15 福建六壬网安股份有限公司 Webpage tamper-resistant method based on file-driven watermark comparison
CN105550599A (en) * 2015-12-29 2016-05-04 山东中创软件商用中间件股份有限公司 Linux virtual file system-based tamper-proof method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022305A (en) * 2019-03-07 2019-07-16 北京华安普特网络科技有限公司 Web portal security guard system and method
CN110765453A (en) * 2019-09-27 2020-02-07 山东高速信联科技有限公司 Tamper-proof method and system for ETC online recharging service
CN112187787A (en) * 2020-09-27 2021-01-05 广州瀚信通信科技股份有限公司 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN112187787B (en) * 2020-09-27 2023-10-10 广州瀚信通信科技股份有限公司 Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN112052423A (en) * 2020-10-10 2020-12-08 杭州安恒信息安全技术有限公司 Data tamper-proof method, system and related device

Also Published As

Publication number Publication date
CN109145536B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN113489713B (en) Network attack detection method, device, equipment and storage medium
US10491621B2 (en) Website security tracking across a network
EP3533199B1 (en) Detection of fraudulent account usage in distributed computing systems
CN109145536A (en) A kind of webpage integrity assurance and device
WO2014103115A1 (en) Illicit intrusion sensing device, illicit intrusion sensing method, illicit intrusion sensing program, and recording medium
US10587652B2 (en) Generating false data for suspicious users
CN108769070A (en) One kind is gone beyond one's commission leak detection method and device
Lee et al. Protecting data on android platform against privilege escalation attack
CN105049445A (en) Access control method and stand-alone access controller
CN112580066B (en) Data protection method and device
Raju et al. SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment
CN114722432A (en) Access control method and device for Linux file system
US11144656B1 (en) Systems and methods for protection of storage systems using decoy data
CN105183799B (en) Authority management method and client
Kaczmarek et al. Operating system security by integrity checking and recovery using write‐protected storage
CN116185785A (en) Early warning method and device for file abnormal change
CN116048554A (en) Container mirror image security scanning method and device, electronic equipment and storage medium
CN111241547A (en) Detection method, device and system for unauthorized vulnerability
Park et al. An enhanced security framework for reliable Android operating system
CN114268481A (en) Method, device, equipment and medium for processing illegal external connection information of intranet terminal
Abdullah et al. File integrity monitor scheduling based on file security level classification
Sykosch et al. Hunting observable objects for indication of compromise
CN106372510B (en) A kind of monitoring method and device of operation information
KR20140108779A (en) Apparatus and method for secure cloud system using dummy authentification key
KR102309695B1 (en) File-based deception technology for thwarting malicious users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant