CN110138774A - A kind of hold-up interception method of the general CC attack of dynamic configuration - Google Patents

A kind of hold-up interception method of the general CC attack of dynamic configuration Download PDF

Info

Publication number
CN110138774A
CN110138774A CN201910399079.2A CN201910399079A CN110138774A CN 110138774 A CN110138774 A CN 110138774A CN 201910399079 A CN201910399079 A CN 201910399079A CN 110138774 A CN110138774 A CN 110138774A
Authority
CN
China
Prior art keywords
configuration
attack
hold
general
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910399079.2A
Other languages
Chinese (zh)
Inventor
陶安洪
陈继安
文立乾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Tianpeng Network Co Ltd
Original Assignee
Chongqing Tianpeng Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Tianpeng Network Co Ltd filed Critical Chongqing Tianpeng Network Co Ltd
Priority to CN201910399079.2A priority Critical patent/CN110138774A/en
Publication of CN110138774A publication Critical patent/CN110138774A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of hold-up interception methods of the general CC attack of dynamic configuration, belong to computer field.Method includes the following steps: obtaining configuration information;It is intercepted based on the configuration rule in the configuration information.The present invention can be realized configuration flexibly, and web Configuration Online, preservation can come into force;The present invention can support multiple dimensions, support to press domain name, the character string and regular expression matching of the address URL, can be calculated based on the independence of tri- dimensions of IP, AGENT, COOKIE, support the differentiation of request protocol;The present invention can be realized distributed calculating in real time, carries out unified counting using Redis cluster, guarantees the accuracy intercepted under distributed environment.

Description

A kind of hold-up interception method of the general CC attack of dynamic configuration
Technical field
The present invention relates to computer fields, are related to a kind of hold-up interception method of general CC attack of dynamic configuration.
Background technique
As flourishing for mobile Internet is extensive universal with Internet of Things, various mobile platform Malware layers go out Not poor, the internet of things equipment of a large amount of mobile device and not security guarantee brings corpse into as " broiler chicken " by criminal Network, and then manipulate it and attack other network equipments, after control amount reaches certain amount grade, ddos attack is carried out, this is right The attacking and defending of DDoS brings new challenge.
CC attack is a seed type of ddos attack, is the attack of FLOOD specifically for Web application layer a kind of, attack Person sends the request of a large amount of seeming legitimacies to destination Web server, causes Web by the meat machine on proxy server or network Server resource exhausts, and bursts until delay machine is run quickly, to cannot respond to the request of normal users.
CC attack has been the attack pattern of popular refusal service always at present, and the solution of mainstream is all at present It is to be limited by the number of concurrent to IP to solve this kind of attack, as the cost of replacement IP is higher and higher, the method for attack More and more, Dan Cong IP is intercepted not only cannot defend CC to attack well, while be also possible to lead to the normal of normal users Request is identified as attacking.
In addition, mainstream solution is required to solve by configuration server at present, configuration mode is very inconvenient, can prevent Imperial dimension is also very limited.Under distributed environment, the unified configuration of threshold value cannot achieve.
Summary of the invention
For the defects in the prior art, the present invention provides a kind of hold-up interception method of general CC attack of dynamic configuration, solves It intercepts configuration and supports a variety of dimensions, dynamic configuration is supported to come into force in real time, support distributed real-time calculating and precisely intercept.
In order to achieve the above objectives, the invention provides the following technical scheme:
A kind of hold-up interception method of the general CC attack of dynamic configuration, which is characterized in that method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
Further, the configuration information is to develop configuration feature by php+html to be pre-configured with.
Further, the configuration information is stored in Redis cluster with postponing.
Further, it is as described in Nginx Lua acquisition that the configuration rule based in the configuration information, which intercept, The configuration information of Redis cluster deposit was implemented later.
Further, the configuration rule based in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
Further, described count is more than http state of the Nginx Lua directly in response to mistake when configuring threshold value Specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration State returns to user by Nginx.
Further, the php+html exploitation configuration configures under linux.
Further, the configuration information includes: domain name, request type, URL_PATH, counts dimension, count the period, count Threshold value intercepts threshold value and intercepts state.
Further, domain name is text box;
The request type is GET or POST;
The URL_PATH is text box, supports selection text matches and regular expression matching;
The counting dimension supports selection IP, AGENT and COOKIE;
The counting period is text box, and unit is the second;
The count threshold is text box, will recording-related information more than this threshold value when counting;
The interception threshold value is text box, is more than that this threshold value can intercept automatically when counting;
The interception state is 444 or 302.
The invention also provides a kind of computer installation, including memory, processor and storage are on a memory and can The computer program run on a processor, the processor realize the method when executing the computer program.
The invention also provides a kind of computer readable storage mediums, store computer program, the computer thereon The method is realized when program is executed by processor.
The beneficial effects of the present invention are embodied in:
The present invention can be realized configuration flexibly, and web Configuration Online, preservation can come into force;
The present invention can support multiple dimensions, support to press domain name, the character string and regular expression matching of the address URL, can Independent calculating based on tri- dimensions of IP, AGENT, COOKIE, supports the differentiation (POST, GET) of request protocol;
The present invention can be realized distributed calculating in real time, unified counting be carried out using Redis cluster, under distributed environment Guarantee the accuracy intercepted.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is and a kind of consistent hold-up interception method flow chart of the general CC attack of dynamic configuration of a certain embodiment of the present invention;
Fig. 2 is and a kind of hold-up interception method flow chart of the general CC attack of the consistent dynamic configuration of another embodiment of the present invention.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for Clearly illustrate technical solution of the present invention, therefore be only used as example, and cannot be used as a limitation and limit protection model of the invention It encloses.
It should be noted that unless otherwise indicated, technical term or scientific term used in this application should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
CC (Challenge Collapsar, Challenging black hole) attack: be a seed type of ddos attack, using constantly it is right Server, which sends a large amount of legitimate connection requests, to be made to form refusal service;
Http File Agent framework is Nginx proxy server, and carries out unified planning, transparent access institute to access url Resource in connectivity device: after Nginx proxy server receives request, resource is carried out by being internally embedded Nginx lua Mapping logic, by taking out the specified Meta information in url, into Metadata database, inquiry is connected to sets Nginx lua The actual stored path of standby upper resource, is then jumped by inside, takes out associated documents simultaneously from the storage equipment of router It returns to client, when client call listed files interface, returns to the mapping path access_path and resource of resource Authentic document name file, client by specific url access file server download to file resource.
As shown in Figure 1, for a kind of hold-up interception method of the general CC attack of dynamic configuration, method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
Further, the configuration information is to develop configuration feature by php+html to be pre-configured with.
The php+html uses HTML technology, carries out exploitation configuration using PHP language.
Further, the configuration information is stored in Redis cluster with postponing.
Further, it is as described in Nginx Lua acquisition that the configuration rule based in the configuration information, which intercept, The configuration information of Redis cluster deposit was implemented later.
Further, the configuration rule based in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
Further, described count is more than http state of the Nginx Lua directly in response to mistake when configuring threshold value Specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration State returns to user by Nginx.
Further, the php+html exploitation configuration configures under linux.
Further, the configuration information includes: domain name, request type, URL_PATH, counts dimension, count the period, count Threshold value intercepts threshold value and intercepts state.
Further, domain name is text box;
The request type is GET or POST;
The URL_PATH is text box, supports selection text matches and regular expression matching;
The counting dimension supports selection IP, AGENT and COOKIE;
The counting period is text box, and unit is the second;
The count threshold is text box, will recording-related information more than this threshold value when counting;
The interception threshold value is text box, is more than that this threshold value can intercept automatically when counting;
The interception state is 444 or 302.As shown in Fig. 2, for a kind of hold-up interception method of the general CC attack of dynamic configuration, Method includes the following steps:
S1: using php+html exploitation configuration feature and configuration information is stored in Redis cluster;
S2:Nginx Lua obtains Redis configuration information, and is counted according to configuration rule;
S3: http state of the Nginx Lua directly in response to mistake when more than configuration threshold value.
In specific application scenarios, firstly, develop corresponding configuration feature using php+html, configuration page bread contain with Lower information:
1, domain name, text box
2, request type (optional: GET, POST, unlimited)
3, URL_PATH, text box support selection text matches and regular expression matching
4, dimension is counted, supports selection IP, AGENT, COOKIE
5, period, text box, unit second (minimum to support 1 second) are counted
6, count threshold, text box (when count be more than this threshold value will recording-related information)
7, threshold value, text box (being more than that this threshold value can intercept automatically when counting) are intercepted
8, it is (optional: 444,302) to intercept state
These information can be saved in Redis cluster after submitting.Nginx Lua can timing acquisition Redis data (per second) And be cached in Nginx caching, Nginx Lua parses all solicited messages according to the rule of acquisition, according to the rule of configuration Request is calculated, counting is calculated using the Hincrby method of Redis, what guarantee counted in the case of high concurrency Accuracy.The ageing mechanism carried using Redis is set as the counting period key expired time of Redis.
Configuration configuration PHP develops environment under linux
1, the installation of MySQL
In the installation file MySQL-server-4.0.20-0.i386.rpm of the official website MySQL downloading MySQL, execute following Order complete MySQL installation.
rpm-ivh MySQL-server-4.0.20-0.i386.rpm
In the case where being not provided with MySQL password, by testing whether MySQL installs success to issue orders.
mysql-u root
There is similar welcome to the mysql mointor.commands end with;Or g printed words, say It is bright to install successfully.
2, the installation of Apache
From the compressed package of the official website of Apache downloading unix version, by taking httpd-2.0.52.tar.gz as an example, it is assumed that resource Packet be placed on/usr/local/src under, into this catalogue after decompress, order it is as follows:
cd/usr/local/src
tar-zxvf httpd-2.0.52.tar.gz
After decompression, into catalogue httpd-2.0.52, execute to issue orders:
./configure--prefix=/usr/local/apache2--enable--module=s o
Wherein -- prefix=/usr/local/apache2 is used to specify the installation directory of Apache.Followed by volume It translates, execution one, which is issued orders, completes installation.
make
mae install
3, the installation of configuration PHP exploitation environment
1) from the compressed package of the official website PHP downloading php5.1.4.tar.gz, this document packet is decompressed, is ordered as follows:
tar-zxf php5.1.4.tar.gz
2) catalogue after going to decompression executes and completes the relevant configurations such as PHP installation directory to issue orders:
./configure--prefix=/usr/local/php-with-mysql=/var/lib/m ysql
3) PHP is then compiled, is ordered as follows:
make
make install
4) under the lib catalogue for replicating the big installation directory of file PHP under current directory, and it is renamed as php.ini, order is such as Under:
cp php.ini-dist/usr/local/php/lib/php.ini
5) after configuring PHP exploitation the installing of environment more than, relevant configuration is carried out referring to the content configured under windows, Configuration item is similar with configuration method.
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http of configuration State returns to user by Nginx, to effectively intercept to CC attack, has also evaded that normal users are intercepted to ask Topic.
The mounting means of OpenResty
For some common Linux release versions,Official's precompile packet is provided.Ensure to use this first Kind of mode is installed.
For Mac OS X or macOS user, it is recommended to use homebrew packet management tool installs OpenResty.It can be with It directly uses and such as issues orders:
brew install openresty/brew/openresty
If being the OpenResty installed from homebrew/nginx before, please first carry out:
brew untap homebrew/nginx
If downloading the source code packet of OpenResty not yet, Download pages of downloading please be arrive.
It is possible, firstly, to which OpenResty is installed and constructed according to following example.
tar-xzvf openresty-VERSION.tar.gz
cd openresty-VERSION/
./configure
make
sudo make install
VERSION in example is substituted for the version number of OpenResty, such as 1.11.2.1.
Preparation before installation
These libraries perl 5.6.1+, libpcre, libssl must be mounted among your computer by you.For Linux For, you need to confirm allows it that can find them in your system environments path using ldconfig order.
Debian and Ubuntu user
It is recommended to use apt-get and development library below is installed:
apt-get install libpcre3-dev\
libssl-dev perl make build-essential curl
Fedora and RedHat user
It is recommended to use yum and development library below is installed:
yum install pcre-devel openssl-devel gcc curl
Mac OS X (macOS) user
For Mac OS X or macOS user, it is recommended to use homebrew packet management tool installs OpenResty.It can be with It directly uses and such as issues orders:
brew install openresty/brew/openresty
If being the OpenResty installed from homebrew/nginx before, please first carry out:
brew untap homebrew/nginx
It is recommended to use software management tool and PCRE is first installed, such as Homebrew:
brew update
brew install pcre openssl
PCRE and OpenSSL. directly can also be installed by code
After installing PCRE and OpenSSL, following order can be used and installed:
Assuming that hombrew library is all installed to/usr/local/opt/ catalogue below.
FreeBSD user
Need to install tool below:
devel/gmake
security/openssl
devel/pcre
11 user of Solaris
It needs that tool below is installed from the source of official:
gcc-3
SUNWlibm can be installed under normal conditions according to example below:
pfexec pkg install gcc-3SUNWlibm
Construct OpenResty
Downloading
It is newest from downloading page Download downloadingSource code packet, and by it as following example Decompression:
tar-xzvf openresty-VERSION.tar.gz
The place of VERSION is substituted for the version number of the source code packet of your downloading, such as 0.8.54.6.
./configure
Then entering openresty-VERSION/ catalogue, then inputting with configuration of issuing orders:
./configure
Default, -- prefix=/usr/local/openresty program can be mounted to/usr/local/openresty Catalogue.
It can specify various options, such as
It tries to check more options using ./configure--help.
Configuration file (./configure script) operation error can arrive build/nginx-VERSION/objs/ Autoconf.err is found.The place of VERSION must be corresponding with OpenResty version number, such as 0.8.54.6.
The user of Solaris it is noted that
For Solaris, development library insertion/lib generally by way of OpenSSL is installed, therefore is occurred when compiling When missing OpenSSL illustrates that you installed t, especially some options -- with-ld-opt='-L/ lib'。
make
Following order can be used to compile:
make
If computer supports the characteristic of multicore make work, can compile in this way:
make-j2
Assuming that machine is double-core.
make install
If all there is no problem if the front the step of, following Installing of Command OpenResty can be used into system:
make install
On linux, it usually needs obtain root authority using sudo to complete to install.
It should be appreciated that the embodiment of the present invention can be by computer hardware, the combination of hardware and software or by depositing The computer instruction in non-transitory computer-readable memory is stored up to be effected or carried out.Standard volume can be used in the method Journey technology-includes that the non-transitory computer-readable storage media configured with computer program is realized in computer program, In configured in this way storage medium computer is operated in a manner of specific and is predefined --- according in a particular embodiment The method and attached drawing of description.Each program can with the programming language of level process or object-oriented come realize with department of computer science System communication.However, if desired, the program can be realized with compilation or machine language.Under any circumstance, which can be volume The language translated or explained.In addition, the program can be run on the specific integrated circuit of programming for this purpose.
In addition, the operation of process described herein can be performed in any suitable order, unless herein in addition instruction or Otherwise significantly with contradicted by context.Process described herein (or modification and/or combination thereof) can be held being configured with It executes, and is can be used as jointly on the one or more processors under the control of one or more computer systems of row instruction The code (for example, executable instruction, one or more computer program or one or more application) of execution, by hardware or its group It closes to realize.The computer program includes the multiple instruction that can be performed by one or more processors.
Further, the method can be realized in being operably coupled to suitable any kind of computing platform, wrap Include but be not limited to PC, mini-computer, main frame, work station, network or distributed computing environment, individual or integrated Computer platform or communicated with charged particle tool or other imaging devices etc..Each aspect of the present invention can be to deposit The machine readable code on non-transitory storage medium or equipment is stored up to realize no matter be moveable or be integrated to calculating Platform, such as hard disk, optical reading and/or write-in storage medium, RAM, ROM, so that it can be read by programmable calculator, when Storage medium or equipment can be used for configuration and operation computer to execute process described herein when being read by computer.This Outside, machine readable code, or part thereof can be transmitted by wired or wireless network.When such media include combining microprocessor Or other data processors realize steps described above instruction or program when, invention as described herein including these and other not The non-transitory computer-readable storage media of same type.When the interception of the general CC attack of dynamic configuration according to the present invention When methods and techniques program, the invention also includes computers itself.
Computer program can be applied to input data to execute function as described herein, to convert input data with life At storing to the output data of nonvolatile memory.Output information can also be applied to one or more output equipments as shown Device.In the preferred embodiment of the invention, the data of conversion indicate physics and tangible object, including the object generated on display Reason and the particular visual of physical objects are described.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover within the scope of the claims and the description of the invention.

Claims (10)

1. a kind of hold-up interception method of the general CC attack of dynamic configuration, which is characterized in that method includes the following steps:
Obtain configuration information;
It is intercepted based on the configuration rule in the configuration information.
2. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 1, it is characterised in that:
The configuration information is to develop configuration feature by php+html to be pre-configured with.
3. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 2, it is characterised in that:
The configuration information is stored in Redis cluster with postponing.
4. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 3, which is characterized in that described to be based on It is the configuration information that the Redis cluster deposit is obtained by Nginx Lua that configuration rule in the configuration information, which intercept, Implemented later.
5. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 4, which is characterized in that described to be based on Configuration rule in the configuration information intercept and is specifically included:
The Nginx Lua is counted according to configuration rule;
When described count more than configuration threshold value, http state of the Nginx Lua directly in response to mistake.
6. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 5, it is characterised in that: the counting When more than configuration threshold value, http state of the Nginx Lua directly in response to mistake specifically:
Judged by Nginx Lua, when counting value be greater than configuration interception threshold value, will be directly according to the http state of configuration User is returned to by Nginx.
7. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 2, it is characterised in that: the php+ Html exploitation configuration configures under linux.
8. a kind of hold-up interception method of the general CC attack of dynamic configuration according to claim 1, it is characterised in that: the configuration Information includes: domain name, request type, URL_PATH, counts dimension, counts period, count threshold, intercepts threshold value and intercept shape State.
9. a kind of computer installation, can run on a memory and on a processor including memory, processor and storage Computer program, it is characterised in that: the processor is realized when executing the computer program such as any one of claim 1-8 institute The method stated.
10. a kind of computer readable storage medium, stores computer program thereon, it is characterised in that: the computer program The method according to claim 1 is realized when being executed by processor.
CN201910399079.2A 2019-05-14 2019-05-14 A kind of hold-up interception method of the general CC attack of dynamic configuration Pending CN110138774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910399079.2A CN110138774A (en) 2019-05-14 2019-05-14 A kind of hold-up interception method of the general CC attack of dynamic configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910399079.2A CN110138774A (en) 2019-05-14 2019-05-14 A kind of hold-up interception method of the general CC attack of dynamic configuration

Publications (1)

Publication Number Publication Date
CN110138774A true CN110138774A (en) 2019-08-16

Family

ID=67573972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910399079.2A Pending CN110138774A (en) 2019-05-14 2019-05-14 A kind of hold-up interception method of the general CC attack of dynamic configuration

Country Status (1)

Country Link
CN (1) CN110138774A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium
CN115361179A (en) * 2022-08-04 2022-11-18 四川启睿克科技有限公司 CC attack protection method based on custom interception identification

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file
CN115361179A (en) * 2022-08-04 2022-11-18 四川启睿克科技有限公司 CC attack protection method based on custom interception identification

Similar Documents

Publication Publication Date Title
US11741195B2 (en) Secure deployment of a software package
US11275839B2 (en) Code package processing
US11048620B2 (en) Distributed system test device
US11171982B2 (en) Optimizing ingestion of structured security information into graph databases for security analytics
US9992166B2 (en) Hierarchical rule development and binding for web application server firewall
CN106030528B (en) Agent data service
US10979440B1 (en) Preventing serverless application package tampering
US11029933B1 (en) Method and standard for integrating aplications into a cloud
EP2989543B1 (en) Method and device for updating client
US10762193B2 (en) Dynamically generating and injecting trusted root certificates
US8751620B2 (en) Validating deployment patterns in a networked computing environment
US20130019314A1 (en) Interactive virtual patching using a web application server firewall
US9632765B1 (en) Customized application package with context specific token
US9590859B2 (en) Discovering resources of a distributed computing environment
US20210042631A1 (en) Techniques for Cyber-Attack Event Log Fabrication
CN110138774A (en) A kind of hold-up interception method of the general CC attack of dynamic configuration
CN106709281B (en) Patch granting and acquisition methods, device
Chowhan Hands-on Serverless Computing: Build, Run and Orchestrate Serverless Applications Using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions
CN104361094A (en) Storage method and device for file in search result, and browser client
CN104468475B (en) A kind of information processing method and electronic equipment
CN113420288B (en) Container mirror image sensitive information detection system and method
EP3454237B1 (en) Secure deployment of a software package
JP2018005915A (en) Method and system for providing application package, and method and system for executing application
CN117955962A (en) Method, device, equipment and storage medium for releasing client application
CN117082053A (en) Method for uploading and downloading cloud-native file service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816

RJ01 Rejection of invention patent application after publication