CN113032842B - Webpage tamper-proof system and method based on cloud platform - Google Patents

Webpage tamper-proof system and method based on cloud platform Download PDF

Info

Publication number
CN113032842B
CN113032842B CN201911364052.6A CN201911364052A CN113032842B CN 113032842 B CN113032842 B CN 113032842B CN 201911364052 A CN201911364052 A CN 201911364052A CN 113032842 B CN113032842 B CN 113032842B
Authority
CN
China
Prior art keywords
webpage
cloud platform
file
tamper
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911364052.6A
Other languages
Chinese (zh)
Other versions
CN113032842A (en
Inventor
严竞雄
张冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Shuqin Data Technology Co ltd
Nantong Institute of Technology
Original Assignee
Nantong Shuqin Data Technology Co ltd
Nantong Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong Shuqin Data Technology Co ltd, Nantong Institute of Technology filed Critical Nantong Shuqin Data Technology Co ltd
Priority to CN201911364052.6A priority Critical patent/CN113032842B/en
Publication of CN113032842A publication Critical patent/CN113032842A/en
Application granted granted Critical
Publication of CN113032842B publication Critical patent/CN113032842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification

Abstract

The invention discloses a webpage tamper-proof system and method based on a cloud platform, wherein the system comprises the following steps: the storage module is used for storing the local page file; the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform; and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent. According to the method, the 24-hour uninterrupted monitoring based on the cloud platform website can be realized, the local webpage file is compared with the webpage file of the remote cloud platform, if the webpage on the cloud platform is found to be maliciously tampered by a hacker, the webpage can be recovered at the first time, and the webpage data safety on the cloud is ensured.

Description

Webpage tamper-proof system and method based on cloud platform
Technical Field
The invention belongs to the field of network security, and particularly relates to a webpage tamper-proof system and method based on a cloud platform.
Background
According to annual statistical data of the national Internet emergency center, the network space safety problem faced by China is increasingly serious. Among them, the damage caused by network attack means of network tampering is most remarkable. Part of websites lack reasonable management in links such as construction, operation and maintenance, and have technical loopholes and hidden dangers, and with rapid development of cloud computing technology, network space safety has more and more problems, and common website attack means: once website tampering occurs, unpredictable effects may be generated on website operation.
Disclosure of Invention
In order to solve the technical problems, the invention provides a webpage tamper-proof system and method based on a cloud platform.
In order to achieve the above purpose, the technical scheme of the invention is as follows:
a cloud platform based web tamper resistant system comprising:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent.
The invention discloses a webpage tamper-proof system based on a cloud platform, which can realize uninterrupted 24-hour monitoring based on a cloud platform website, and compare the data of a local webpage file with that of a remote cloud platform.
On the basis of the technical scheme, the following improvement can be made:
preferably, the storage module is further used for storing a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
Preferably, the tamper log is used to record one or more of the following:
the type of manipulation, file, process, time of tampering.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
The webpage tamper-proof method based on the cloud platform operates by utilizing a webpage tamper-proof system based on the cloud platform, and comprises the following steps of:
s1: the storage module stores a local page file;
s2: the data comparison is carried out on the local webpage file and the webpage file of the remote cloud platform by utilizing a comparison module, so that a comparison result is obtained;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating steps S2-S3.
The invention discloses a webpage tamper-proof method based on a cloud platform, which can monitor a cloud platform website for 24 hours without interruption.
As a preferable scheme, when the comparison results obtained in the step S2 are inconsistent, a tamper log is generated and recorded.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
As a preferable scheme, when the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, the mark record is carried out when the difference is found, the recovery module synchronously changes the difference according to the mark record at the moment, and the comparison module continues to compare the data in sequence.
By adopting the preferable scheme, data comparison and data correction can be effectively performed.
As a preferable scheme, when the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, and finds out different parts, the comparison module carries out marking record, and at the moment, the recovery module synchronously changes the different parts according to the marking record, and the comparison module confirms whether the different parts are modified or not;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
By adopting the preferable scheme, the data at the same position is prevented from being quickly modified, so that after the modification, the data comparison is continued in sequence after the modification is confirmed again.
Preferably, when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in the dynamic tampering position frequency table.
By adopting the preferable scheme, the data can be quickly modified.
Preferably, the dynamic tampering location frequency table is updated at regular intervals.
By adopting the preferable scheme, the position information with higher occurrence frequency of the modified data in the time period is sent to the dynamic tampering position frequency table for storage at regular intervals (such as a few seconds, a dozen seconds, a minute and the like).
As a preferable scheme, before the comparison module compares the local page file with the webpage file of the remote cloud platform in sequence, the comparison module preferably checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then performs the sequential data comparison.
By adopting the preferable scheme, the data can be quickly modified.
Drawings
Fig. 1 is a schematic diagram of a web page tamper-proof system based on a cloud platform according to an embodiment of the present invention.
Fig. 2 is a diagram of database table construction according to an embodiment of the present invention.
FIG. 3 is a diagram of a database table creation portion code provided by an embodiment of the present invention.
Fig. 4 is a partial data diagram in the database after the webpage tamper-proof program is run according to the embodiment of the present invention.
Fig. 5 is a diagram of tampered webpage and webpage code according to an embodiment of the present invention.
Fig. 6 is a diagram of a restored web page file according to an embodiment of the present invention.
Detailed Description
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
In order to achieve the object of the present invention, in some embodiments of a web page tamper resistant system and method based on a cloud platform, the web page tamper resistant system based on the cloud platform includes:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
and the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the modification is consistent.
The invention discloses a webpage tamper-proof system based on a cloud platform, which can realize uninterrupted 24-hour monitoring based on a cloud platform website, and compare the data of a local webpage file with that of a remote cloud platform.
In order to further optimize the implementation effect of the present invention, in other embodiments, the rest of the feature techniques are the same, except that the storage module is further used to store a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
To further optimize the implementation of the present invention, in other embodiments, the remaining feature techniques are the same, except that the tamper log is used to record one or more of the following: the type of manipulation, file, process, time of tampering.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
The webpage tamper-proof method based on the cloud platform operates by utilizing a webpage tamper-proof system based on the cloud platform, and comprises the following steps of:
s1: the storage module stores a local page file;
s2: the data comparison is carried out on the local webpage file and the webpage file of the remote cloud platform by utilizing a comparison module, so that a comparison result is obtained;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating steps S2-S3.
The invention discloses a webpage tamper-proof method based on a cloud platform, which can monitor a cloud platform website for 24 hours without interruption.
The innovation of the application is that the content tampering protection can be carried out on the Web server on the cloud, is more advanced than the traditional WAF products on the market.
From the practical point of view, the method is simple in deployment, easy in configuration, supports lightweight deployment, and is suitable for being applied to production practice activities of enterprises. The website tampering online detection technology based on the cloud architecture can improve the website access experience of users. In addition, the method is particularly suitable for detecting the Web cloud platform, and has high social benefit. The online detection service for website tampering can be provided for enterprises and government departments of all companies, and monitoring of portal websites in a management area by an industry management department and an information security supervision department can be realized.
The project is developed based on a Python programming language, and uses pyhdfs, pymysql, hashlib, base and other library files for realizing the butt joint with a cloud platform and the data encryption and decryption processing.
The technical architecture is shown in fig. 1, wherein the storage module can be a database server, and the comparison module and the recovery module can be arranged in a file tamper-proof server, so that the system has stable performance and moderate response time, and meets the expected performance requirement; the system load pressure and the bearing capacity meet the normal user number and meet the user requirement.
The system has a better safety mechanism and a function of encrypting configuration information, and a user must configure the system running environment before using the related functions, and the system is used according to the operation flow of the instruction.
The cloud platform based WAP cloud platform development design method is based on the Hadoop cloud platform to develop and design, and WAF type products are many in the current market, but WAP products based on the cloud platform are relatively few.
The application adopts Python for development design, and a MySQl database is used as a background database, so that cross-platform development, deployment and use are supported. The data in the configuration file, such as a user name, a password and the like of a connection database, are encrypted by base64, so that the security of the system is improved, the system architecture is clear, lightweight deployment is supported, and the system has a good defense recovery effect and supports quasi-real-time recovery through testing.
Specifically, a Python program is used locally to check md5 of a webpage needing to be deployed on a Web cloud, and a file name, an md5 check value and a file path are stored in a MySQL database.
As shown in fig. 2, database table construction: the database table localfiles has id, name, md and local fields.
As shown in fig. 3, the database table creates a code map.
After running the webpage tamper-proof program locallock, the data in the database is shown in fig. 4.
The index. Html content on the cloud is tampered, and the tampered webpage and webpage codes are shown in fig. 5.
And running a cloudguard cloud file tamper-proof monitoring program locally, and immediately recovering the file when the file is detected to be tampered.
And viewing the restored webpage data file on the cloud, wherein the restoration effect is consistent with that of the original webpage file, and the restored webpage file is opened as shown in fig. 6.
When judging the webpage files on the cloud, the method is realized based on Python programming language, firstly, the information such as file names, md5, file paths and the like stored in the database is obtained, the HDFS is accessed through the pyhdfs library file, whether the md5 values of the local file and the files on the cloud are consistent or not is compared, if the md5 values of the local file and the files on the cloud are inconsistent, the webpage files on the cloud are restored, and the data security of the files on the cloud is improved.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
and when the comparison results obtained in the step S2 are inconsistent, generating and recording a tamper log.
By adopting the preferable scheme, the management personnel can conveniently carry out the later analysis and treatment.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the mark record is carried out when the difference is found, the recovery module synchronously changes the difference according to the mark record at the moment, and the comparison module continues to compare the data in sequence.
By adopting the preferable scheme, data comparison and data correction can be effectively performed.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, and finds out different parts, marking records are carried out, and the recovery module synchronously changes the different parts according to the marking records at the moment, and the comparison module confirms whether the different parts are modified or not;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
By adopting the preferable scheme, the data at the same position is prevented from being quickly modified, so that after the modification, the data comparison is continued in sequence after the modification is confirmed again.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
and when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in the dynamic tampering position frequency table.
By adopting the preferable scheme, the data can be quickly modified.
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
the dynamic tampering position frequency table is updated at regular intervals.
By adopting the preferable scheme, the position information with higher occurrence frequency of the modified data in the time period is sent to the dynamic tampering position frequency table for storage at regular intervals (such as a few seconds, a dozen seconds, a minute and the like).
To further optimize the effect of the present invention, in other embodiments, the remaining feature techniques are the same, except,
before the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the comparison module preferentially checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then the comparison module compares the position data in sequence.
By adopting the preferable scheme, the data can be quickly modified.
It should be noted that, for the preferred embodiment of the present invention, it is possible for a person skilled in the art to make several variations and modifications without departing from the inventive concept of the present invention, which fall within the protection scope of the present invention.

Claims (7)

1. The webpage tamper-proof method based on the cloud platform is characterized by running by utilizing a webpage tamper-proof system based on the cloud platform, wherein the webpage tamper-proof system based on the cloud platform comprises the following steps:
the storage module is used for storing the local page file;
the comparison module is used for comparing the data of the local webpage file with the webpage file of the remote cloud platform;
the recovery module is used for modifying the webpage file of the remote cloud platform according to the local webpage file when the comparison result of the comparison module is inconsistent, until the webpage file is modified to be consistent;
the webpage tamper-proof method comprises the following steps:
s1, a storage module stores a local page file;
s2, comparing the data of the local webpage file with the webpage file of the remote cloud platform by using a comparison module to obtain a comparison result;
if the comparison result is consistent, the operation is not performed;
if the comparison result is inconsistent, entering a step S3;
s3: the method comprises the steps of utilizing a recovery module to modify a webpage file of a remote cloud platform according to a local webpage file until the modification is consistent;
s4: repeating the steps S2-S3;
when the recovery module recovers the data of the same position for a plurality of times, the data position is stored in a dynamic tampering position frequency table;
before the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, the comparison module preferentially checks whether the position data in the dynamic tampering position frequency table are tampered or not, and then the comparison module compares the position data in sequence.
2. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein the storage module is further configured to store a tamper log.
3. The cloud platform-based webpage tamper resistant method of claim 2, wherein the tamper log is used to record one or more of the following:
the type of manipulation, file, process, time of tampering.
4. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison results obtained in the step S2 are inconsistent, a tamper log is generated and recorded.
5. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison module sequentially compares the local webpage file with the webpage file of the remote cloud platform, and a difference is found, a mark record is performed, and at this time, the recovery module synchronously changes the difference according to the mark record, and the comparison module continues sequentially comparing the data.
6. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein when the comparison module compares the local webpage file with the webpage file of the remote cloud platform in sequence, and finds out a difference, a mark record is performed, and at this time, the recovery module synchronously changes the difference according to the mark record, and the comparison module confirms again whether the difference is modified;
if the modification is confirmed, continuing to compare the data in sequence;
if the modification is not completed, the modification is performed again until the modification is completed, and then the data comparison is performed sequentially.
7. The cloud platform-based webpage tamper-proofing method according to claim 1, wherein the dynamic tamper location frequency table is updated at regular intervals.
CN201911364052.6A 2019-12-25 2019-12-25 Webpage tamper-proof system and method based on cloud platform Active CN113032842B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911364052.6A CN113032842B (en) 2019-12-25 2019-12-25 Webpage tamper-proof system and method based on cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911364052.6A CN113032842B (en) 2019-12-25 2019-12-25 Webpage tamper-proof system and method based on cloud platform

Publications (2)

Publication Number Publication Date
CN113032842A CN113032842A (en) 2021-06-25
CN113032842B true CN113032842B (en) 2024-01-26

Family

ID=76458667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911364052.6A Active CN113032842B (en) 2019-12-25 2019-12-25 Webpage tamper-proof system and method based on cloud platform

Country Status (1)

Country Link
CN (1) CN113032842B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102057737A (en) * 2008-07-01 2011-05-11 朗讯科技公司 Terminal handover control method and apparatus in wireless communication network
CN102332071A (en) * 2011-09-30 2012-01-25 奇智软件(北京)有限公司 Methods and devices for discovering suspected malicious information and tracking malicious file
CN102546253A (en) * 2012-01-05 2012-07-04 中国联合网络通信集团有限公司 Webpage tamper-resistant method, system and management server
CN102693322A (en) * 2012-06-01 2012-09-26 杭州海康威视数字技术股份有限公司 Multi-language supporting webpage processing method, webpage loading method and systems
CN103716315A (en) * 2013-12-24 2014-04-09 上海天存信息技术有限公司 Method and device for detecting web page tampering
US8924335B1 (en) * 2006-03-30 2014-12-30 Pegasystems Inc. Rule-based user interface conformance methods
CN104715004A (en) * 2013-12-13 2015-06-17 柯尼卡美能达美国研究所有限公司 Obfuscating page-description language output to thwart conversion to editable format
CN105678193A (en) * 2016-01-06 2016-06-15 杭州数梦工场科技有限公司 Tamper-proof processing method and device
CN108696519A (en) * 2018-05-10 2018-10-23 深圳市联软科技股份有限公司 A kind of webpage tamper resistant systems and method based on shared storage
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN109344661A (en) * 2018-09-06 2019-02-15 南京聚铭网络科技有限公司 A kind of webpage integrity assurance of the micro code based on machine learning
CN110008392A (en) * 2019-03-07 2019-07-12 北京华安普特网络科技有限公司 A kind of webpage tamper detection method based on web crawlers technology

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8924335B1 (en) * 2006-03-30 2014-12-30 Pegasystems Inc. Rule-based user interface conformance methods
CN102057737A (en) * 2008-07-01 2011-05-11 朗讯科技公司 Terminal handover control method and apparatus in wireless communication network
CN102332071A (en) * 2011-09-30 2012-01-25 奇智软件(北京)有限公司 Methods and devices for discovering suspected malicious information and tracking malicious file
CN102546253A (en) * 2012-01-05 2012-07-04 中国联合网络通信集团有限公司 Webpage tamper-resistant method, system and management server
CN102693322A (en) * 2012-06-01 2012-09-26 杭州海康威视数字技术股份有限公司 Multi-language supporting webpage processing method, webpage loading method and systems
CN104715004A (en) * 2013-12-13 2015-06-17 柯尼卡美能达美国研究所有限公司 Obfuscating page-description language output to thwart conversion to editable format
CN103716315A (en) * 2013-12-24 2014-04-09 上海天存信息技术有限公司 Method and device for detecting web page tampering
CN105678193A (en) * 2016-01-06 2016-06-15 杭州数梦工场科技有限公司 Tamper-proof processing method and device
CN108696519A (en) * 2018-05-10 2018-10-23 深圳市联软科技股份有限公司 A kind of webpage tamper resistant systems and method based on shared storage
CN109257340A (en) * 2018-08-29 2019-01-22 北京中科锐链科技有限公司 A kind of website falsification-proof system and method based on block chain
CN109344661A (en) * 2018-09-06 2019-02-15 南京聚铭网络科技有限公司 A kind of webpage integrity assurance of the micro code based on machine learning
CN110008392A (en) * 2019-03-07 2019-07-12 北京华安普特网络科技有限公司 A kind of webpage tamper detection method based on web crawlers technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于云平台的网页防篡改技术在Linux操作系统中的应用;严竞雄;唐日成;王岩;陈浩;姜智钟;黄加;南通职业大学学报;第34卷(第2期);1-5 *
网页篡改监控系统的设计与实现;刘江;信息科技(第11期);63-70 *

Also Published As

Publication number Publication date
CN113032842A (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US11526611B2 (en) Ransomware protection for cloud storage systems
US11178170B2 (en) Systems and methods for detecting anomalous behavior within computing sessions
Ab Rahman et al. Forensic-by-design framework for cyber-physical cloud systems
US10339309B1 (en) System for identifying anomalies in an information system
Talha et al. Analysis of research on amazon AWS cloud computing seller data security
CN108268354A (en) Data safety monitoring method, background server, terminal and system
CN108154029A (en) Intrusion detection method, electronic equipment and computer storage media
Abiodun et al. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
CN102902926A (en) Website file anti-tampering method based on distributed file synchronization technology
CN112685771A (en) Log desensitization method, device, equipment and storage medium
US20210133742A1 (en) Detection of security threats in a network environment
CN107231370A (en) A kind of data monitoring method based on cloud computing
Actoriano et al. Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2
Abd Razak et al. Conceptual investigation process model for managing database forensic investigation knowledge
CN112637108B (en) Internal threat analysis method and system based on anomaly detection and emotion analysis
Macák et al. Cybersecurity analysis via process mining: A systematic literature review
Khan et al. Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction
US20180295145A1 (en) Multicomputer Digital Data Processing to Provide Information Security Control
CN113032842B (en) Webpage tamper-proof system and method based on cloud platform
CN116956283A (en) File synchronization-based server-side file tamper-proof method, system and equipment
CN116467388A (en) System and method for maintaining consistency of shared files based on blockchain
CN104506519A (en) Web site access security audit method for MIPS (Million Instructions Per Second) platform
Lei et al. Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack.
CN109714199B (en) Network traffic analysis and traceability system based on big data architecture
CN112907227A (en) Software design data file management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant