CN110138774A - A kind of hold-up interception method of the general CC attack of dynamic configuration - Google Patents
A kind of hold-up interception method of the general CC attack of dynamic configuration Download PDFInfo
- Publication number
- CN110138774A CN110138774A CN201910399079.2A CN201910399079A CN110138774A CN 110138774 A CN110138774 A CN 110138774A CN 201910399079 A CN201910399079 A CN 201910399079A CN 110138774 A CN110138774 A CN 110138774A
- Authority
- CN
- China
- Prior art keywords
- configuration
- attack
- hold
- general
- configuration information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of hold-up interception methods of the general CC attack of dynamic configuration, belong to computer field.Method includes the following steps: obtaining configuration information;It is intercepted based on the configuration rule in the configuration information.The present invention can be realized configuration flexibly, and web Configuration Online, preservation can come into force;The present invention can support multiple dimensions, support to press domain name, the character string and regular expression matching of the address URL, can be calculated based on the independence of tri- dimensions of IP, AGENT, COOKIE, support the differentiation of request protocol;The present invention can be realized distributed calculating in real time, carries out unified counting using Redis cluster, guarantees the accuracy intercepted under distributed environment.
Description
Technical field
The present invention relates to computer fields, are related to a kind of hold-up interception method of general CC attack of dynamic configuration.
Background technique
As flourishing for mobile Internet is extensive universal with Internet of Things, various mobile platform Malware layers go out
Not poor, the internet of things equipment of a large amount of mobile device and not security guarantee brings corpse into as " broiler chicken " by criminal
Network, and then manipulate it and attack other network equipments, after control amount reaches certain amount grade, ddos attack is carried out, this is right
The attacking and defending of DDoS brings new challenge.
CC attack is a seed type of ddos attack, is the attack of FLOOD specifically for Web application layer a kind of, attack
Person sends the request of a large amount of seeming legitimacies to destination Web server, causes Web by the meat machine on proxy server or network
Server resource exhausts, and bursts until delay machine is run quickly, to cannot respond to the request of normal users.
CC attack has been the attack pattern of popular refusal service always at present, and the solution of mainstream is all at present
It is to be limited by the number of concurrent to IP to solve this kind of attack, as the cost of replacement IP is higher and higher, the method for attack
More and more, Dan Cong IP is intercepted not only cannot defend CC to attack well, while be also possible to lead to the normal of normal users
Request is identified as attacking.
In addition, mainstream solution is required to solve by configuration server at present, configuration mode is very inconvenient, can prevent
Imperial dimension is also very limited.Under distributed environment, the unified configuration of threshold value cannot achieve.
Summary of the invention
For the defects in the prior art, the present invention provides a kind of hold-up interception method of general CC attack of dynamic configuration, solves
It intercepts configuration and supports a variety of dimensions, dynamic configuration is supported to come into force in real time, support distributed real-time calculating and precisely intercept.
In order to achieve the above objectives, the invention provides the following technical scheme:
A kind of hold-up interception method of the general CC attack of dynamic configuration, which is characterized in that method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
Further, the configuration information is to develop configuration feature by php+html to be pre-configured with.
Further, the configuration information is stored in Redis cluster with postponing.
Further, it is as described in Nginx Lua acquisition that the configuration rule based in the configuration information, which intercept,
The configuration information of Redis cluster deposit was implemented later.
Further, the configuration rule based in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
Further, described count is more than http state of the Nginx Lua directly in response to mistake when configuring threshold value
Specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration
State returns to user by Nginx.
Further, the php+html exploitation configuration configures under linux.
Further, the configuration information includes: domain name, request type, URL_PATH, counts dimension, count the period, count
Threshold value intercepts threshold value and intercepts state.
Further, domain name is text box;
The request type is GET or POST;
The URL_PATH is text box, supports selection text matches and regular expression matching;
The counting dimension supports selection IP, AGENT and COOKIE;
The counting period is text box, and unit is the second;
The count threshold is text box, will recording-related information more than this threshold value when counting;
The interception threshold value is text box, is more than that this threshold value can intercept automatically when counting;
The interception state is 444 or 302.
The invention also provides a kind of computer installation, including memory, processor and storage are on a memory and can
The computer program run on a processor, the processor realize the method when executing the computer program.
The invention also provides a kind of computer readable storage mediums, store computer program, the computer thereon
The method is realized when program is executed by processor.
The beneficial effects of the present invention are embodied in:
The present invention can be realized configuration flexibly, and web Configuration Online, preservation can come into force;
The present invention can support multiple dimensions, support to press domain name, the character string and regular expression matching of the address URL, can
Independent calculating based on tri- dimensions of IP, AGENT, COOKIE, supports the differentiation (POST, GET) of request protocol;
The present invention can be realized distributed calculating in real time, unified counting be carried out using Redis cluster, under distributed environment
Guarantee the accuracy intercepted.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element
Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is and a kind of consistent hold-up interception method flow chart of the general CC attack of dynamic configuration of a certain embodiment of the present invention;
Fig. 2 is and a kind of hold-up interception method flow chart of the general CC attack of the consistent dynamic configuration of another embodiment of the present invention.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for
Clearly illustrate technical solution of the present invention, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention
It encloses.
It should be noted that unless otherwise indicated, technical term or scientific term used in this application should be this hair
The ordinary meaning that bright one of ordinary skill in the art are understood.
CC (Challenge Collapsar, Challenging black hole) attack: be a seed type of ddos attack, using constantly it is right
Server, which sends a large amount of legitimate connection requests, to be made to form refusal service;
Http File Agent framework is Nginx proxy server, and carries out unified planning, transparent access institute to access url
Resource in connectivity device: after Nginx proxy server receives request, resource is carried out by being internally embedded Nginx lua
Mapping logic, by taking out the specified Meta information in url, into Metadata database, inquiry is connected to sets Nginx lua
The actual stored path of standby upper resource, is then jumped by inside, takes out associated documents simultaneously from the storage equipment of router
It returns to client, when client call listed files interface, returns to the mapping path access_path and resource of resource
Authentic document name file, client by specific url access file server download to file resource.
As shown in Figure 1, for a kind of hold-up interception method of the general CC attack of dynamic configuration, method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
Further, the configuration information is to develop configuration feature by php+html to be pre-configured with.
The php+html uses HTML technology, carries out exploitation configuration using PHP language.
Further, the configuration information is stored in Redis cluster with postponing.
Further, it is as described in Nginx Lua acquisition that the configuration rule based in the configuration information, which intercept,
The configuration information of Redis cluster deposit was implemented later.
Further, the configuration rule based in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
Further, described count is more than http state of the Nginx Lua directly in response to mistake when configuring threshold value
Specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration
State returns to user by Nginx.
Further, the php+html exploitation configuration configures under linux.
Further, the configuration information includes: domain name, request type, URL_PATH, counts dimension, count the period, count
Threshold value intercepts threshold value and intercepts state.
Further, domain name is text box;
The request type is GET or POST;
The URL_PATH is text box, supports selection text matches and regular expression matching;
The counting dimension supports selection IP, AGENT and COOKIE;
The counting period is text box, and unit is the second;
The count threshold is text box, will recording-related information more than this threshold value when counting;
The interception threshold value is text box, is more than that this threshold value can intercept automatically when counting;
The interception state is 444 or 302.As shown in Fig. 2, for a kind of hold-up interception method of the general CC attack of dynamic configuration,
Method includes the following steps:
S1: using php+html exploitation configuration feature and configuration information is stored in Redis cluster;
S2:Nginx Lua obtains Redis configuration information, and is counted according to configuration rule;
S3: http state of the Nginx Lua directly in response to mistake when more than configuration threshold value.
In specific application scenarios, firstly, develop corresponding configuration feature using php+html, configuration page bread contain with
Lower information:
1, domain name, text box
2, request type (optional: GET, POST, unlimited)
3, URL_PATH, text box support selection text matches and regular expression matching
4, dimension is counted, supports selection IP, AGENT, COOKIE
5, period, text box, unit second (minimum to support 1 second) are counted
6, count threshold, text box (when count be more than this threshold value will recording-related information)
7, threshold value, text box (being more than that this threshold value can intercept automatically when counting) are intercepted
8, it is (optional: 444,302) to intercept state
These information can be saved in Redis cluster after submitting.Nginx Lua can timing acquisition Redis data (per second)
And be cached in Nginx caching, Nginx Lua parses all solicited messages according to the rule of acquisition, according to the rule of configuration
Request is calculated, counting is calculated using the Hincrby method of Redis, what guarantee counted in the case of high concurrency
Accuracy.The ageing mechanism carried using Redis is set as the counting period key expired time of Redis.
Configuration configuration PHP develops environment under linux
1, the installation of MySQL
In the installation file MySQL-server-4.0.20-0.i386.rpm of the official website MySQL downloading MySQL, execute following
Order complete MySQL installation.
rpm-ivh MySQL-server-4.0.20-0.i386.rpm
In the case where being not provided with MySQL password, by testing whether MySQL installs success to issue orders.
mysql-u root
There is similar welcome to the mysql mointor.commands end with;Or g printed words, say
It is bright to install successfully.
2, the installation of Apache
From the compressed package of the official website of Apache downloading unix version, by taking httpd-2.0.52.tar.gz as an example, it is assumed that resource
Packet be placed on/usr/local/src under, into this catalogue after decompress, order it is as follows:
cd/usr/local/src
tar-zxvf httpd-2.0.52.tar.gz
After decompression, into catalogue httpd-2.0.52, execute to issue orders:
./configure--prefix=/usr/local/apache2--enable--module=s o
Wherein -- prefix=/usr/local/apache2 is used to specify the installation directory of Apache.Followed by volume
It translates, execution one, which is issued orders, completes installation.
make
mae install
3, the installation of configuration PHP exploitation environment
1) from the compressed package of the official website PHP downloading php5.1.4.tar.gz, this document packet is decompressed, is ordered as follows:
tar-zxf php5.1.4.tar.gz
2) catalogue after going to decompression executes and completes the relevant configurations such as PHP installation directory to issue orders:
./configure--prefix=/usr/local/php-with-mysql=/var/lib/m ysql
3) PHP is then compiled, is ordered as follows:
make
make install
4) under the lib catalogue for replicating the big installation directory of file PHP under current directory, and it is renamed as php.ini, order is such as
Under:
cp php.ini-dist/usr/local/php/lib/php.ini
5) after configuring PHP exploitation the installing of environment more than, relevant configuration is carried out referring to the content configured under windows,
Configuration item is similar with configuration method.
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration
State returns to user by Nginx, to effectively intercept to CC attack, has also evaded that normal users are intercepted to ask
Topic.
The mounting means of OpenResty
For some common Linux release versions,Official's precompile packet is provided.Ensure to use this first
Kind of mode is installed.
For Mac OS X or macOS user, it is recommended to use homebrew packet management tool installs OpenResty.It can be with
It directly uses and such as issues orders:
brew install openresty/brew/openresty
If being the OpenResty installed from homebrew/nginx before, please first carry out:
brew untap homebrew/nginx
If downloading the source code packet of OpenResty not yet, Download pages of downloading please be arrive.
It is possible, firstly, to which OpenResty is installed and constructed according to following example.
tar-xzvf openresty-VERSION.tar.gz
cd openresty-VERSION/
./configure
make
sudo make install
VERSION in example is substituted for the version number of OpenResty, such as 1.11.2.1.
Preparation before installation
These libraries perl 5.6.1+, libpcre, libssl must be mounted among your computer by you.For Linux
For, you need to confirm allows it that can find them in your system environments path using ldconfig order.
Debian and Ubuntu user
It is recommended to use apt-get and development library below is installed:
apt-get install libpcre3-dev\
libssl-dev perl make build-essential curl
Fedora and RedHat user
It is recommended to use yum and development library below is installed:
yum install pcre-devel openssl-devel gcc curl
Mac OS X (macOS) user
For Mac OS X or macOS user, it is recommended to use homebrew packet management tool installs OpenResty.It can be with
It directly uses and such as issues orders:
brew install openresty/brew/openresty
If being the OpenResty installed from homebrew/nginx before, please first carry out:
brew untap homebrew/nginx
It is recommended to use software management tool and PCRE is first installed, such as Homebrew:
brew update
brew install pcre openssl
PCRE and OpenSSL. directly can also be installed by code
After installing PCRE and OpenSSL, following order can be used and installed:
Assuming that hombrew library is all installed to/usr/local/opt/ catalogue below.
FreeBSD user
Need to install tool below:
devel/gmake
security/openssl
devel/pcre
11 user of Solaris
It needs that tool below is installed from the source of official:
gcc-3
SUNWlibm can be installed under normal conditions according to example below:
pfexec pkg install gcc-3SUNWlibm
Construct OpenResty
Downloading
It is newest from downloading page Download downloadingSource code packet, and by it as following example
Decompression:
tar-xzvf openresty-VERSION.tar.gz
The place of VERSION is substituted for the version number of the source code packet of your downloading, such as 0.8.54.6.
./configure
Then entering openresty-VERSION/ catalogue, then inputting with configuration of issuing orders:
./configure
Default, -- prefix=/usr/local/openresty program can be mounted to/usr/local/openresty
Catalogue.
It can specify various options, such as
It tries to check more options using ./configure--help.
Configuration file (./configure script) operation error can arrive build/nginx-VERSION/objs/
Autoconf.err is found.The place of VERSION must be corresponding with OpenResty version number, such as 0.8.54.6.
The user of Solaris it is noted that
For Solaris, development library insertion/lib generally by way of OpenSSL is installed, therefore is occurred when compiling
When missing OpenSSL illustrates that you installed t, especially some options -- with-ld-opt='-L/
lib'。
make
Following order can be used to compile:
make
If computer supports the characteristic of multicore make work, can compile in this way:
make-j2
Assuming that machine is double-core.
make install
If all there is no problem if the front the step of, following Installing of Command OpenResty can be used into system:
make install
On linux, it usually needs obtain root authority using sudo to complete to install.
It should be appreciated that the embodiment of the present invention can be by computer hardware, the combination of hardware and software or by depositing
The computer instruction in non-transitory computer-readable memory is stored up to be effected or carried out.Standard volume can be used in the method
Journey technology-includes that the non-transitory computer-readable storage media configured with computer program is realized in computer program,
In configured in this way storage medium computer is operated in a manner of specific and is predefined --- according in a particular embodiment
The method and attached drawing of description.Each program can with the programming language of level process or object-oriented come realize with department of computer science
System communication.However, if desired, the program can be realized with compilation or machine language.Under any circumstance, which can be volume
The language translated or explained.In addition, the program can be run on the specific integrated circuit of programming for this purpose.
In addition, the operation of process described herein can be performed in any suitable order, unless herein in addition instruction or
Otherwise significantly with contradicted by context.Process described herein (or modification and/or combination thereof) can be held being configured with
It executes, and is can be used as jointly on the one or more processors under the control of one or more computer systems of row instruction
The code (for example, executable instruction, one or more computer program or one or more application) of execution, by hardware or its group
It closes to realize.The computer program includes the multiple instruction that can be performed by one or more processors.
Further, the method can be realized in being operably coupled to suitable any kind of computing platform, wrap
Include but be not limited to PC, mini-computer, main frame, work station, network or distributed computing environment, individual or integrated
Computer platform or communicated with charged particle tool or other imaging devices etc..Each aspect of the present invention can be to deposit
The machine readable code on non-transitory storage medium or equipment is stored up to realize no matter be moveable or be integrated to calculating
Platform, such as hard disk, optical reading and/or write-in storage medium, RAM, ROM, so that it can be read by programmable calculator, when
Storage medium or equipment can be used for configuration and operation computer to execute process described herein when being read by computer.This
Outside, machine readable code, or part thereof can be transmitted by wired or wireless network.When such media include combining microprocessor
Or other data processors realize steps described above instruction or program when, invention as described herein including these and other not
The non-transitory computer-readable storage media of same type.When the interception of the general CC attack of dynamic configuration according to the present invention
When methods and techniques program, the invention also includes computers itself.
Computer program can be applied to input data to execute function as described herein, to convert input data with life
At storing to the output data of nonvolatile memory.Output information can also be applied to one or more output equipments as shown
Device.In the preferred embodiment of the invention, the data of conversion indicate physics and tangible object, including the object generated on display
Reason and the particular visual of physical objects are described.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme should all cover within the scope of the claims and the description of the invention.
Claims (10)
1. a kind of hold-up interception method of the general CC attack of dynamic configuration, which is characterized in that method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
2. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 1, it is characterised in that:
The configuration information is to develop configuration feature by php+html to be pre-configured with.
3. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 2, it is characterised in that:
The configuration information is stored in Redis cluster with postponing.
4. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 3, which is characterized in that described to be based on
It is the configuration information that the Redis cluster deposit is obtained by Nginx Lua that configuration rule in the configuration information, which intercept,
Implemented later.
5. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 4, which is characterized in that described to be based on
Configuration rule in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
6. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 5, it is characterised in that: the counting
When more than configuration threshold value, http state of the Nginx Lua directly in response to mistake specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http state of configuration
User is returned to by Nginx.
7. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 2, it is characterised in that: the php+
Html exploitation configuration configures under linux.
8. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 1, it is characterised in that: the configuration
Information includes: domain name, request type, URL_PATH, counts dimension, counts period, count threshold, intercepts threshold value and intercept shape
State.
9. a kind of computer installation, can run on a memory and on a processor including memory, processor and storage
Computer program, it is characterised in that: the processor is realized when executing the computer program such as any one of claim 1-8 institute
The method stated.
10. a kind of computer readable storage medium, stores computer program thereon, it is characterised in that: the computer program
The method according to claim 1 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910399079.2A CN110138774A (en) | 2019-05-14 | 2019-05-14 | A kind of hold-up interception method of the general CC attack of dynamic configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910399079.2A CN110138774A (en) | 2019-05-14 | 2019-05-14 | A kind of hold-up interception method of the general CC attack of dynamic configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110138774A true CN110138774A (en) | 2019-08-16 |
Family
ID=67573972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910399079.2A Pending CN110138774A (en) | 2019-05-14 | 2019-05-14 | A kind of hold-up interception method of the general CC attack of dynamic configuration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110138774A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
CN115361179A (en) * | 2022-08-04 | 2022-11-18 | 四川启睿克科技有限公司 | CC attack protection method based on custom interception identification |
-
2019
- 2019-05-14 CN CN201910399079.2A patent/CN110138774A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
CN113867818B (en) * | 2021-09-28 | 2024-04-16 | 潍柴动力股份有限公司 | Method, device, computer equipment and medium for generating ini file |
CN115361179A (en) * | 2022-08-04 | 2022-11-18 | 四川启睿克科技有限公司 | CC attack protection method based on custom interception identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11741195B2 (en) | Secure deployment of a software package | |
US11275839B2 (en) | Code package processing | |
US11048620B2 (en) | Distributed system test device | |
US11171982B2 (en) | Optimizing ingestion of structured security information into graph databases for security analytics | |
US9992166B2 (en) | Hierarchical rule development and binding for web application server firewall | |
CN106030528B (en) | Agent data service | |
US10979440B1 (en) | Preventing serverless application package tampering | |
US11029933B1 (en) | Method and standard for integrating aplications into a cloud | |
EP2989543B1 (en) | Method and device for updating client | |
US10762193B2 (en) | Dynamically generating and injecting trusted root certificates | |
US8751620B2 (en) | Validating deployment patterns in a networked computing environment | |
US20130019314A1 (en) | Interactive virtual patching using a web application server firewall | |
US9632765B1 (en) | Customized application package with context specific token | |
US9590859B2 (en) | Discovering resources of a distributed computing environment | |
US20210042631A1 (en) | Techniques for Cyber-Attack Event Log Fabrication | |
CN110138774A (en) | A kind of hold-up interception method of the general CC attack of dynamic configuration | |
CN106709281B (en) | Patch granting and acquisition methods, device | |
Chowhan | Hands-on Serverless Computing: Build, Run and Orchestrate Serverless Applications Using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions | |
CN104361094A (en) | Storage method and device for file in search result, and browser client | |
CN104468475B (en) | A kind of information processing method and electronic equipment | |
CN113420288B (en) | Container mirror image sensitive information detection system and method | |
EP3454237B1 (en) | Secure deployment of a software package | |
JP2018005915A (en) | Method and system for providing application package, and method and system for executing application | |
CN117955962A (en) | Method, device, equipment and storage medium for releasing client application | |
CN117082053A (en) | Method for uploading and downloading cloud-native file service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190816 |
|
RJ01 | Rejection of invention patent application after publication |