CN113032842B - Webpage tamper-proof system and method based on cloud platform - Google Patents
Webpage tamper-proof system and method based on cloud platform Download PDFInfo
- Publication number
- CN113032842B CN113032842B CN201911364052.6A CN201911364052A CN113032842B CN 113032842 B CN113032842 B CN 113032842B CN 201911364052 A CN201911364052 A CN 201911364052A CN 113032842 B CN113032842 B CN 113032842B
- Authority
- CN
- China
- Prior art keywords
- webpage
- cloud platform
- file
- tamper
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012986 modification Methods 0.000 claims abstract description 23
- 230000004048 modification Effects 0.000 claims abstract description 23
- 238000011084 recovery Methods 0.000 claims abstract description 19
- 230000008569 process Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 abstract description 4
- 230000000694 effects Effects 0.000 description 11
- 238000004458 analytical method Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000012937 correction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2139—Recurrent verification
Abstract
The invention discloses a webpage tamper-proof system and method based on a cloud platform, wherein the system comprises the following steps: the storage module is used for storing the local page file; the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform; and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent. According to the method, the 24-hour uninterrupted monitoring based on the cloud platform website can be realized, the local webpage file is compared with the webpage file of the remote cloud platform, if the webpage on the cloud platform is found to be maliciously tampered by a hacker, the webpage can be recovered at the first time, and the webpage data safety on the cloud is ensured.
Description
Technical Field
The invention belongs to the field of network security, and particularly relates to a webpage tamper-proof system and method based on a cloud platform.
Background
According to annual statistical data of the national Internet emergency center, the network space safety problem faced by China is increasingly serious. Among them, the damage caused by network attack means of network tampering is most remarkable. Part of websites lack reasonable management in links such as construction, operation and maintenance, and have technical loopholes and hidden dangers, and with rapid development of cloud computing technology, network space safety has more and more problems, and common website attack means: once website tampering occurs, unpredictable effects may be generated on website operation.
Disclosure of Invention
In order to solve the technical problems, the invention provides a webpage tamper-proof system and method based on a cloud platform.
In order to achieve the above purpose, the technical scheme of the invention is as follows:
a cloud platform based web tamper resistant system comprising:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent.
The invention discloses a webpage tamper-proof system based on a cloud platform, which can realize uninterrupted 24-hour monitoring based on a cloud platform website, and compare the data of a local webpage file with that of a remote cloud platform.
On the basis of the technical scheme, the following improvement can be made:
preferably, the storage module is further used for storing a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
Preferably, the tamper log is used to record one or more of the following:
the type of manipulation, file, process, time of tampering.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
The webpage tamper-proof method based on the cloud platform operates by utilizing a webpage tamper-proof system based on the cloud platform, and comprises the following steps of:
s1: the storage module stores a local page file;
s2: the data comparison is carried out on the local webpage file and the webpage file of the remote cloud platform by utilizing a comparison module, so that a comparison result is obtained;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating steps S2-S3.
The invention discloses a webpage tamper-proof method based on a cloud platform, which can monitor a cloud platform website for 24 hours without interruption.
As a preferable scheme, when the comparison results obtained in the step S2 are inconsistent, a tamper log is generated and recorded.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
As a preferable scheme, when the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, the mark record is carried out when the difference is found, the recovery module synchronously changes the difference according to the mark record at the moment, and the comparison module continues to compare the data in sequence.
By adopting the preferable scheme, data comparison and data correction can be effectively performed.
As a preferable scheme, when the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, and finds out different parts, the comparison module carries out marking record, and at the moment, the recovery module synchronously changes the different parts according to the marking record, and the comparison module confirms whether the different parts are modified or not;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
By adopting the preferable scheme, the data at the same position is prevented from being quickly modified, so that after the modification, the data comparison is continued in sequence after the modification is confirmed again.
Preferably, when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in the dynamic tampering position frequency table.
By adopting the preferable scheme, the data can be quickly modified.
Preferably, the dynamic tampering location frequency table is updated at regular intervals.
By adopting the preferable scheme, the position information with higher occurrence frequency of the modified data in the time period is sent to the dynamic tampering position frequency table for storage at regular intervals (such as a few seconds, a dozen seconds, a minute and the like).
As a preferable scheme, before the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, the comparison module preferably checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then performs the sequential data comparison.
By adopting the preferable scheme, the data can be quickly modified.
Drawings
Fig. 1 is a schematic diagram of a web page tamper-proof system based on a cloud platform according to an embodiment of the present invention.
Fig. 2 is a diagram of database table construction according to an embodiment of the present invention.
FIG. 3 is a diagram of a database table creation portion code provided by an embodiment of the present invention.
Fig. 4 is a partial data diagram in the database after the webpage tamper-proof program is run according to the embodiment of the present invention.
Fig. 5 is a diagram of tampered webpage and webpage code according to an embodiment of the present invention.
Fig. 6 is a diagram of a restored web page file according to an embodiment of the present invention.
Detailed Description
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
In order to achieve the object of the present invention, in some embodiments of a web page tamper resistant system and method based on a cloud platform, the web page tamper resistant system based on the cloud platform includes:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent.
The invention discloses a webpage tamper-proof system based on a cloud platform, which can realize uninterrupted 24-hour monitoring based on a cloud platform website, and compare the data of a local webpage file with that of a remote cloud platform.
In order to further optimize the implementation effect of the present invention, in other embodiments, the rest of the feature techniques are the same, except that the storage module is further used to store a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
To further optimize the implementation of the present invention, in other embodiments, the remaining feature techniques are the same, except that the tamper log is used to record one or more of the following: the type of manipulation, file, process, time of tampering.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
The webpage tamper-proof method based on the cloud platform operates by utilizing a webpage tamper-proof system based on the cloud platform, and comprises the following steps of:
s1: the storage module stores a local page file;
s2: the data comparison is carried out on the local webpage file and the webpage file of the remote cloud platform by utilizing a comparison module, so that a comparison result is obtained;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating steps S2-S3.
The invention discloses a webpage tamper-proof method based on a cloud platform, which can monitor a cloud platform website for 24 hours without interruption.
The innovation of the application is that the content tampering protection can be carried out on the Web server on the cloud, is more advanced than the traditional WAF products on the market.
From the practical point of view, the method is simple in deployment, easy in configuration, supports lightweight deployment, and is suitable for being applied to production practice activities of enterprises. The website tampering online detection technology based on the cloud architecture can improve the website access experience of users. In addition, the method is particularly suitable for detecting the Web cloud platform, and has high social benefit. The online detection service for website tampering can be provided for enterprises and government departments of all companies, and monitoring of portal websites in a management area by an industry management department and an information security supervision department can be realized.
The project is developed based on a Python programming language, and uses pyhdfs, pymysql, hashlib, base and other library files for realizing the butt joint with a cloud platform and the data encryption and decryption processing.
The technical architecture is shown in fig. 1, wherein the storage module can be a database server, and the comparison module and the recovery module can be arranged in a file tamper-proof server, so that the system has stable performance and moderate response time, and meets the expected performance requirement; the system load pressure and the bearing capacity meet the normal user number and meet the user requirement.
The system has a better safety mechanism and a function of encrypting configuration information, and a user must configure the system running environment before using the related functions, and the system is used according to the operation flow of the instruction.
The cloud platform based WAP cloud platform development design method is based on the Hadoop cloud platform to develop and design, and WAF type products are many in the current market, but WAP products based on the cloud platform are relatively few.
The application adopts Python for development design, and a MySQl database is used as a background database, so that cross-platform development, deployment and use are supported. The data in the configuration file, such as a user name, a password and the like of a connection database, are encrypted by base64, so that the security of the system is improved, the system architecture is clear, lightweight deployment is supported, and the system has a good defense recovery effect and supports quasi-real-time recovery through testing.
Specifically, a Python program is used locally to check md5 of a webpage needing to be deployed on a Web cloud, and a file name, an md5 check value and a file path are stored in a MySQL database.
As shown in fig. 2, database table construction: the database table localfiles has id, name, md and local fields.
As shown in fig. 3, the database table creates a code map.
After running the webpage tamper-proof program locallock, the data in the database is shown in fig. 4.
The index. Html content on the cloud is tampered, and the tampered webpage and webpage codes are shown in fig. 5.
And running a cloudguard cloud file tamper-proof monitoring program locally, and immediately recovering the file when the file is detected to be tampered.
And viewing the restored webpage data file on the cloud, wherein the restoration effect is consistent with that of the original webpage file, and the restored webpage file is opened as shown in fig. 6.
When judging the webpage files on the cloud, the method is realized based on Python programming language, firstly, the information such as file names, md5, file paths and the like stored in the database is obtained, the HDFS is accessed through the pyhdfs library file, whether the md5 values of the local file and the files on the cloud are consistent or not is compared, if the md5 values of the local file and the files on the cloud are inconsistent, the webpage files on the cloud are restored, and the data security of the files on the cloud is improved.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
and when the comparison results obtained in the step S2 are inconsistent, generating and recording a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the mark record is carried out when the difference is found, the recovery module synchronously changes the difference according to the mark record at the moment, and the comparison module continues to compare the data in sequence.
By adopting the preferable scheme, data comparison and data correction can be effectively performed.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, and finds out different parts, marking records are carried out, and the recovery module synchronously changes the different parts according to the marking records at the moment, and the comparison module confirms whether the different parts are modified or not;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
By adopting the preferable scheme, the data at the same position is prevented from being quickly modified, so that after the modification, the data comparison is continued in sequence after the modification is confirmed again.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
and when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in the dynamic tampering position frequency table.
By adopting the preferable scheme, the data can be quickly modified.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
the dynamic tampering position frequency table is updated at regular intervals.
By adopting the preferable scheme, the position information with higher occurrence frequency of the modified data in the time period is sent to the dynamic tampering position frequency table for storage at regular intervals (such as a few seconds, a dozen seconds, a minute and the like).
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
before the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the comparison module preferentially checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then the comparison module compares the position data in sequence.
By adopting the preferable scheme, the data can be quickly modified.
It should be noted that, for the preferred embodiment of the present invention, it is possible for a person skilled in the art to make several variations and modifications without departing from the inventive concept of the present invention, which fall within the protection scope of the present invention.
Claims (7)
1. The webpage tamper-proof method based on the cloud platform is characterized by running by utilizing a webpage tamper-proof system based on the cloud platform, wherein the webpage tamper-proof system based on the cloud platform comprises the following steps:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the webpage file is modified to be consistent;
the webpage tamper-proof method comprises the following steps:
s1, a storage module stores a local page file;
s2, comparing the data of the local webpage file with the webpage file of the remote cloud platform by using a comparison module to obtain a comparison result;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating the steps S2-S3;
when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in a dynamic tampering position frequency table;
before the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the comparison module preferentially checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then the comparison module compares the position data in sequence.
2. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein the storage module is further configured to store a tamper log.
3. The cloud platform-based webpage tamper resistant method of claim 2, wherein the tamper log is used to record one or more of the following:
the type of manipulation, file, process, time of tampering.
4. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison results obtained in the step S2 are inconsistent, a tamper log is generated and recorded.
5. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison module sequentially compares the local webpage file with the webpage file of the remote cloud platform, and a difference is found, a mark record is performed, and at this time, the recovery module synchronously changes the difference according to the mark record, and the comparison module continues sequentially comparing the data.
6. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, and finds out a difference, a mark record is performed, and at this time, the recovery module synchronously changes the difference according to the mark record, and the comparison module confirms again whether the difference is modified;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
7. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein the dynamic tamper location frequency table is updated at regular intervals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911364052.6A CN113032842B (en) | 2019-12-25 | 2019-12-25 | Webpage tamper-proof system and method based on cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911364052.6A CN113032842B (en) | 2019-12-25 | 2019-12-25 | Webpage tamper-proof system and method based on cloud platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113032842A CN113032842A (en) | 2021-06-25 |
CN113032842B true CN113032842B (en) | 2024-01-26 |
Family
ID=76458667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911364052.6A Active CN113032842B (en) | 2019-12-25 | 2019-12-25 | Webpage tamper-proof system and method based on cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113032842B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102057737A (en) * | 2008-07-01 | 2011-05-11 | 朗讯科技公司 | Terminal handover control method and apparatus in wireless communication network |
CN102332071A (en) * | 2011-09-30 | 2012-01-25 | 奇智软件(北京)有限公司 | Methods and devices for discovering suspected malicious information and tracking malicious file |
CN102546253A (en) * | 2012-01-05 | 2012-07-04 | 中国联合网络通信集团有限公司 | Webpage tamper-resistant method, system and management server |
CN102693322A (en) * | 2012-06-01 | 2012-09-26 | 杭州海康威视数字技术股份有限公司 | Multi-language supporting webpage processing method, webpage loading method and systems |
CN103716315A (en) * | 2013-12-24 | 2014-04-09 | 上海天存信息技术有限公司 | Method and device for detecting web page tampering |
US8924335B1 (en) * | 2006-03-30 | 2014-12-30 | Pegasystems Inc. | Rule-based user interface conformance methods |
CN104715004A (en) * | 2013-12-13 | 2015-06-17 | 柯尼卡美能达美国研究所有限公司 | Obfuscating page-description language output to thwart conversion to editable format |
CN105678193A (en) * | 2016-01-06 | 2016-06-15 | 杭州数梦工场科技有限公司 | Tamper-proof processing method and device |
CN108696519A (en) * | 2018-05-10 | 2018-10-23 | 深圳市联软科技股份有限公司 | A kind of webpage tamper resistant systems and method based on shared storage |
CN109257340A (en) * | 2018-08-29 | 2019-01-22 | 北京中科锐链科技有限公司 | A kind of website falsification-proof system and method based on block chain |
CN109344661A (en) * | 2018-09-06 | 2019-02-15 | 南京聚铭网络科技有限公司 | A kind of webpage integrity assurance of the micro code based on machine learning |
CN110008392A (en) * | 2019-03-07 | 2019-07-12 | 北京华安普特网络科技有限公司 | A kind of webpage tamper detection method based on web crawlers technology |
-
2019
- 2019-12-25 CN CN201911364052.6A patent/CN113032842B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924335B1 (en) * | 2006-03-30 | 2014-12-30 | Pegasystems Inc. | Rule-based user interface conformance methods |
CN102057737A (en) * | 2008-07-01 | 2011-05-11 | 朗讯科技公司 | Terminal handover control method and apparatus in wireless communication network |
CN102332071A (en) * | 2011-09-30 | 2012-01-25 | 奇智软件(北京)有限公司 | Methods and devices for discovering suspected malicious information and tracking malicious file |
CN102546253A (en) * | 2012-01-05 | 2012-07-04 | 中国联合网络通信集团有限公司 | Webpage tamper-resistant method, system and management server |
CN102693322A (en) * | 2012-06-01 | 2012-09-26 | 杭州海康威视数字技术股份有限公司 | Multi-language supporting webpage processing method, webpage loading method and systems |
CN104715004A (en) * | 2013-12-13 | 2015-06-17 | 柯尼卡美能达美国研究所有限公司 | Obfuscating page-description language output to thwart conversion to editable format |
CN103716315A (en) * | 2013-12-24 | 2014-04-09 | 上海天存信息技术有限公司 | Method and device for detecting web page tampering |
CN105678193A (en) * | 2016-01-06 | 2016-06-15 | 杭州数梦工场科技有限公司 | Tamper-proof processing method and device |
CN108696519A (en) * | 2018-05-10 | 2018-10-23 | 深圳市联软科技股份有限公司 | A kind of webpage tamper resistant systems and method based on shared storage |
CN109257340A (en) * | 2018-08-29 | 2019-01-22 | 北京中科锐链科技有限公司 | A kind of website falsification-proof system and method based on block chain |
CN109344661A (en) * | 2018-09-06 | 2019-02-15 | 南京聚铭网络科技有限公司 | A kind of webpage integrity assurance of the micro code based on machine learning |
CN110008392A (en) * | 2019-03-07 | 2019-07-12 | 北京华安普特网络科技有限公司 | A kind of webpage tamper detection method based on web crawlers technology |
Non-Patent Citations (2)
Title |
---|
基于云平台的网页防篡改技术在Linux操作系统中的应用;严竞雄;唐日成;王岩;陈浩;姜智钟;黄加;南通职业大学学报;第34卷(第2期);1-5 * |
网页篡改监控系统的设计与实现;刘江;信息科技(第11期);63-70 * |
Also Published As
Publication number | Publication date |
---|---|
CN113032842A (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11526611B2 (en) | Ransomware protection for cloud storage systems | |
US11178170B2 (en) | Systems and methods for detecting anomalous behavior within computing sessions | |
Ab Rahman et al. | Forensic-by-design framework for cyber-physical cloud systems | |
US10339309B1 (en) | System for identifying anomalies in an information system | |
Talha et al. | Analysis of research on amazon AWS cloud computing seller data security | |
CN108268354A (en) | Data safety monitoring method, background server, terminal and system | |
CN108154029A (en) | Intrusion detection method, electronic equipment and computer storage media | |
Abiodun et al. | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey | |
CN102902926A (en) | Website file anti-tampering method based on distributed file synchronization technology | |
CN112685771A (en) | Log desensitization method, device, equipment and storage medium | |
US20210133742A1 (en) | Detection of security threats in a network environment | |
CN107231370A (en) | A kind of data monitoring method based on cloud computing | |
Actoriano et al. | Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2 | |
Abd Razak et al. | Conceptual investigation process model for managing database forensic investigation knowledge | |
CN112637108B (en) | Internal threat analysis method and system based on anomaly detection and emotion analysis | |
Macák et al. | Cybersecurity analysis via process mining: A systematic literature review | |
Khan et al. | Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction | |
US20180295145A1 (en) | Multicomputer Digital Data Processing to Provide Information Security Control | |
CN113032842B (en) | Webpage tamper-proof system and method based on cloud platform | |
CN116956283A (en) | File synchronization-based server-side file tamper-proof method, system and equipment | |
CN116467388A (en) | System and method for maintaining consistency of shared files based on blockchain | |
CN104506519A (en) | Web site access security audit method for MIPS (Million Instructions Per Second) platform | |
Lei et al. | Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. | |
CN109714199B (en) | Network traffic analysis and traceability system based on big data architecture | |
CN112907227A (en) | Software design data file management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |