CN113411318A - Website shutdown method and device and related equipment - Google Patents

Website shutdown method and device and related equipment Download PDF

Info

Publication number
CN113411318A
CN113411318A CN202110650518.XA CN202110650518A CN113411318A CN 113411318 A CN113411318 A CN 113411318A CN 202110650518 A CN202110650518 A CN 202110650518A CN 113411318 A CN113411318 A CN 113411318A
Authority
CN
China
Prior art keywords
website
shutdown
cloud protection
access request
protection node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110650518.XA
Other languages
Chinese (zh)
Other versions
CN113411318B (en
Inventor
蔡建科
范渊
杨勃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN202110650518.XA priority Critical patent/CN113411318B/en
Publication of CN113411318A publication Critical patent/CN113411318A/en
Application granted granted Critical
Publication of CN113411318B publication Critical patent/CN113411318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A website shutdown method, a website shutdown device and related equipment are provided. The application discloses a website shutdown method, which comprises the steps of receiving an access request sent by a request end; determining a cloud protection node according to the access request; sending the access request to the cloud protection node; when a shutdown page fed back by the cloud protection node is received, sending the shutdown page to the request end; according to the website shutdown method, the cloud protection nodes are additionally arranged between the website system and the cloud protection platform to perform website shutdown, so that rapid and efficient website shutdown can be realized, and network safety is effectively guaranteed. The application also discloses a website shutdown device, a website system, a cloud protection system and a computer readable storage medium, which all have the beneficial effects.

Description

Website shutdown method and device and related equipment
Technical Field
The application relates to the technical field of network security, in particular to a website shutdown method, and further relates to a website shutdown device, a website system, a cloud protection system and a computer readable storage medium.
Background
With the high-speed development of information-based construction, more and more industry users begin to choose to migrate services to public clouds or private cloud platforms, however, while the cloud brings convenience to the users, corresponding security problems begin to emerge, such as data large concentration, cloud platform security problems, service security problems, and the like. At present, network security faces a high-risk situation, faces various attack threats such as 0day outbreak, DDOS (Distributed Denial of Service), tampering, information leakage, scanning/crawler and the like, and has great influence on social politics and economy. Therefore, with the increasing popularization of cloud computing, intensification and service, professional website cloud security products and expert team services are urgently needed by users in various industries.
In the related art, the website shutdown is mostly realized by methods of stopping domain name resolution or manually changing a website page into a website shutdown page, but the methods all need to spend a large amount of time for operation and response. Obviously, when a website is tampered with and cannot be shut down at the first time, adverse effects are easily caused. For example, in some application scenarios, the website shutdown is required to be performed within 1 minute after the security event is found, and the prior art cannot effectively meet the current requirements at all.
Therefore, how to implement fast and efficient website shutdown and ensure network security is a problem to be urgently solved by technical personnel in the field.
Disclosure of Invention
The website shutdown method can realize rapid and efficient website shutdown and effectively ensure network safety; another object of the present application is to provide a website shutdown device, a website system, a cloud protection system, and a computer-readable storage medium, which also have the above beneficial effects.
In a first aspect, the present application provides a website shutdown method, including:
receiving an access request sent by a request terminal;
determining a cloud protection node according to the access request;
sending the access request to the cloud protection node;
and when a shutdown page fed back by the cloud protection node is received, sending the shutdown page to the request end.
Preferably, the determining a cloud protection node according to the access request includes:
and performing domain name resolution on the access request, and determining the cloud protection node.
Preferably, the feeding back the shutdown page by the cloud protection node includes:
determining a target website according to the access request;
judging whether a preset storage space has a shutdown page related to the target website or not;
and if so, feeding the shutdown page back to the website system.
Preferably, the website shutdown method further includes:
receiving a shutdown webpage about a shutdown website issued by a cloud protection platform;
and storing the shutdown web page of the shutdown website to the preset storage space.
Preferably, the website shutdown method further includes:
when the preset storage space does not have a shutdown page related to the target website, sending the access request to a source station of the target website to acquire response information fed back by the source station;
and feeding back the response information to the website system so that the website system feeds back the response information to the request terminal.
In a second aspect, the present application further discloses a cloud protection system, including:
the request terminal is used for sending an access request to the website system;
the website system is used for determining a cloud protection node according to the access request and sending the access request to the cloud protection node; sending a shutdown page fed back by the cloud protection node to the request end;
and the cloud protection node is used for feeding back a shutdown page corresponding to the access request to the website system.
Preferably, the cloud protection system further includes:
and the cloud protection platform is used for synchronizing shutdown webpages corresponding to the shutdown websites to the cloud protection node.
In a third aspect, the present application further discloses a website shutdown device, including:
the request receiving module is used for receiving an access request sent by a request end;
the node determining module is used for determining a cloud protection node according to the access request;
the request forwarding module is used for sending the access request to the cloud protection node;
and the website shutdown module is used for sending the shutdown page to the request end when receiving the shutdown page fed back by the cloud protection node.
In a fourth aspect, the present application further discloses a website system, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of any of the website shutdown methods described above.
In a fifth aspect, the present application further discloses a computer readable storage medium having a computer program stored therein, which when executed by a processor, is configured to implement the steps of any one of the website shutdown methods described above.
The website shutdown method comprises the steps of receiving an access request sent by a request end; determining a cloud protection node according to the access request; sending the access request to the cloud protection node; and when a shutdown page fed back by the cloud protection node is received, sending the shutdown page to the request end.
Therefore, according to the website shutdown method, the cloud protection node is additionally arranged between the website system and the cloud protection platform to realize website shutdown, when a security event occurs in a website or the website needs to be shutdown temporarily, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security and avoid causing larger bad influence, and therefore the website shutdown method effectively meets the requirements of high efficiency, light weight and low influence of mass users on website security event response.
The website shutdown device, the website system, the cloud protection system and the computer readable storage medium provided by the application all have the beneficial effects, and are not repeated herein.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a schematic flowchart of a website shutdown method provided in the present application;
FIG. 2 is a general flowchart of a website shutdown method provided by the present application;
fig. 3 is a schematic structural diagram of a cloud protection system provided in the present application;
FIG. 4 is a schematic structural diagram of a website shutdown device according to the present application;
fig. 5 is a schematic structural diagram of a website system provided in the present application.
Detailed Description
The core of the application is to provide a website shutdown method, which can realize rapid and efficient website shutdown and effectively ensure network safety; another core of the present application is to provide a website shutdown device, a website system, a cloud protection system, and a computer-readable storage medium, which also have the above beneficial effects.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the related art, the website shutdown is mostly realized by methods of stopping domain name resolution or manually changing a website page into a website shutdown page, but the methods all need to spend a large amount of time for operation and response. Obviously, when a website is tampered with and cannot be shut down at the first time, adverse effects are easily caused. For example, in some application scenarios, the website shutdown is required to be performed within 1 minute after the security event is found, and the prior art cannot effectively meet the current requirements at all.
Therefore, in order to solve the technical problems, the application provides a website shutdown method, in which a cloud protection node is additionally arranged between a website system and a cloud protection platform to realize website shutdown, and when a website has a security event or temporarily needs to shutdown the website, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security, and avoid causing larger bad influences.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a website shutdown method provided in the present application, where the website shutdown method may include:
s101: receiving an access request sent by a request terminal;
the step aims to realize the reception of an access request, namely an access request aiming at a target website, so as to realize the access to the target website, wherein the target website is a website which a user needs to access. Specifically, when a user needs to access a certain website (target website), an access request for the website may be initiated through a request end, where the request end may be a front end of a website system or another user terminal independent of the website system.
S102: determining a cloud protection node according to the access request;
the method comprises the steps of determining a cloud protection node, wherein the cloud protection node is used for achieving a website shutdown function and is deployed between a website system and a cloud protection platform. Specifically, each website in the website system is connected with a cloud protection platform, and the cloud protection platform provides a cloud protection function for each website in the website system; further, when a website security event occurs in the target website or the website needs to be shut down due to other reasons, a shutdown page corresponding to the target website can be set in the cloud protection node, so that the cloud protection node can directly feed back the shutdown page when receiving an access request for the target website, and website shutdown is achieved.
It can be understood that, in the whole cloud protection system, the number of cloud protection nodes is not unique, and can be deployed by a technician according to the actual situation. For example, each cloud protection node may provide a shutdown function for one or more or all websites in one website system, or may provide a shutdown function for only one type of websites in multiple website systems, which is not limited in this application.
As a preferred embodiment, the determining the cloud protection node according to the access request may include: and performing domain name resolution on the access request, and determining a cloud protection node.
The preferred embodiment provides a specific cloud protection node determination method, which is realized based on domain name resolution operation. Specifically, domain name resolution refers to a service that directs a domain name to a website space IP, so that people can conveniently access a website through the registered domain name.
S103: sending the access request to a cloud protection node;
this step is intended to implement the forwarding function of the access request, here to the cloud protection node. Specifically, the cloud protection node is deployed between the website system and the cloud protection platform and used for achieving a website shutdown function, so that the website system does not directly send an access request initiated by a request end to a target website source station for request response, but sends the access request to the cloud protection node, and the cloud protection node judges whether the target website is shutdown or not, so that whether a shutdown page needs to be fed back to the website system or the access request needs to be forwarded to the target website source station for request response is determined. Further, when the target website is shut down, the cloud protection node directly feeds back a shutdown page corresponding to the target website to the website system.
As a preferred embodiment, the cloud protection node feedback shutdown page may include: determining a target website according to the access request; judging whether a shutdown page related to the target website exists in the preset storage space or not; and if so, feeding back the shutdown page to the website system.
The preferred embodiment provides a method for realizing that a cloud protection node feeds back a shutdown page to a website system. Specifically, for a website that needs shutdown, a corresponding shutdown page may be deployed in the cloud protection node, and for a website that does not need shutdown, a shutdown page does not need to be deployed, where the shutdown page may be deployed in a preset storage space of the cloud protection node, such as a local cache, an internal memory, a storage, and the like. Further, since the access request is an access request for a target website, when the cloud protection node receives the access request, the target website may be determined according to the access request, and then whether the target website is a shutdown website is determined by judging whether a shutdown page corresponding to the target website is stored in a preset storage space, and if so, the shutdown page may be directly fed back to the website system.
As a preferred embodiment, the website shutdown method may further include: when the preset storage space does not have a shutdown page related to the target website, sending an access request to a source station of the target website to acquire response information fed back by the source station; and feeding back the response information to the website system so that the website system feeds back the response information to the request end.
Specifically, when a shutdown page related to the target website does not exist in the preset storage space of the cloud protection node, it is indicated that the target website is not the shutdown website, and at this time, a normal website access process is continued. In a specific implementation process, the cloud protection node firstly sends an access request to a source station of a target website for website access, and implements request response, namely obtains response information fed back by the source station; further, since the access request is forwarded by the cloud protection node, the response information can be fed back to the website system through the cloud protection node, and then fed back to the request terminal by the website system for output and display, thereby realizing a normal website access process.
As a preferred embodiment, the website shutdown method may further include: receiving a shutdown webpage about a shutdown website issued by a cloud protection platform; and storing the shutdown web page of the shutdown website to a preset storage space.
The website shutdown method provided by the preferred embodiment can also realize the synchronous update function of the shutdown webpage in the cloud protection node, and the function can be realized by a cloud protection platform. As described above, the cloud protection platform can provide a cloud protection function for each website in the website system, and on this basis, the shutdown page in the cloud protection node can be synchronously updated. In a specific implementation process, a website administrator can customize shutdown webpages about each website on a cloud protection platform according to actual requirements, and when a certain website needs to be shutdown, the corresponding shutdown webpage can be issued to the corresponding cloud protection node and stored to the preset storage space of the cloud protection node, so that when the cloud protection node receives an access request for the website, the corresponding shutdown webpage can be directly fed back.
S104: and when a shutdown page fed back by the cloud protection node is received, sending the shutdown page to a request end.
This step is intended to achieve feedback of the shutdown page. Specifically, when a shutdown page fed back by the cloud protection node is received, it is indicated that a target website accessed currently is a shutdown website and cannot be accessed, and at this time, the received shutdown page may be forwarded to the request terminal and output and displayed to inform the requesting user that the target website is shutdown and cannot be accessed.
Therefore, according to the website shutdown method, the cloud protection node is additionally arranged between the website system and the cloud protection platform to realize website shutdown, when a security event occurs in a website or the website needs to be shutdown temporarily, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security and avoid causing larger bad influence, and therefore the website shutdown method effectively meets the requirements of high efficiency, light weight and low influence of mass users on website security event response.
The embodiment of the application takes a Web system as an example and provides another website shutdown method.
Referring to fig. 2, fig. 2 is a general flowchart of a website shutdown method provided in the present application.
Firstly, a uniform cloud protection platform is established for accessing a website needing cloud protection. Under the condition of normal access, an accessor initiates an access request, and the Web system performs domain name resolution according to the access request to determine a cloud protection node; further, for the cloud protection node, the received access requests are cleaned, the processed access requests are sent to the website source station for request response, and finally, a request visitor is responded.
Further, when a website security event occurs or the website needs to be shut down due to other reasons, a website administrator can customize a corresponding shut-down page on the cloud protection platform, and the cloud protection platform synchronizes the shut-down page to the cloud protection node, so that the cloud protection node can directly feed back the shut-down page to the website when receiving an access request about the website, and does not forward the access request to a website source station for request response. Furthermore, the website administrator can customize the website shutdown page on the cloud protection platform according to actual needs, and replace or update the website shutdown page in the cloud protection node.
In addition, the cloud protection platform is provided with a one-key shutdown function, and under special conditions, a website administrator can perform one-key shutdown on the website through the cloud protection platform.
Therefore, according to the website shutdown method provided by the embodiment of the application, the cloud protection node is additionally arranged between the website system and the cloud protection platform to realize website shutdown, when a security event occurs to a website or the website needs to be shutdown temporarily, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security and avoid causing larger bad influence, and therefore the website shutdown method effectively meets the requirements of high efficiency, light weight and low influence of mass users on website security event response.
To solve the above technical problem, the present application further provides a cloud protection system, please refer to fig. 3, where fig. 3 is a schematic structural diagram of the cloud protection system provided in the present application, and the cloud protection system may include:
the request terminal 1 is used for sending an access request to the website system 2;
the website system 2 is used for determining the cloud protection node 3 according to the access request and sending the access request to the cloud protection node 3; sending a shutdown page fed back by the cloud protection node 3 to the request terminal 1;
and the cloud protection node 3 is used for feeding back the shutdown page corresponding to the access request to the website system 2.
Therefore, in the cloud protection system provided by the embodiment of the application, the cloud protection node is additionally arranged between the website system and the cloud protection platform to realize website shutdown, when a security event occurs in a website or the website needs to be shutdown temporarily, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security and avoid causing larger bad influence, and thus the website shutdown method effectively meets the requirements of high efficiency, light weight and low influence of mass users on website security event response.
As a preferred embodiment, the cloud protection system may further include a cloud protection platform, configured to synchronize shutdown webpages corresponding to the shutdown websites with the cloud protection node.
As a preferred embodiment, the cloud protection node 3 may be specifically configured to determine a target website according to an access request; judging whether a shutdown page related to the target website exists in the preset storage space or not; and if so, feeding back the shutdown page to the website system.
As a preferred embodiment, the cloud protection node 3 may be further configured to send an access request to a source station of the target website to obtain response information fed back by the source station when the preset storage space does not have a shutdown page related to the target website; and feeding back the response information to the website system so that the website system feeds back the response information to the request end.
For the introduction of the system provided by the present application, please refer to the above method embodiment, which is not described herein again.
To solve the above technical problem, the present application further provides a website shutdown device, please refer to fig. 4, where fig. 4 is a schematic structural diagram of the website shutdown device provided in the present application, and the website shutdown device may include:
a request receiving module 10, configured to receive an access request sent by a request end;
a node determining module 20, configured to determine a cloud protection node according to the access request;
the request forwarding module 30 is configured to send an access request to the cloud protection node;
and the website shutdown module 40 is configured to send the shutdown page to the request end when the shutdown page fed back by the cloud protection node is received.
Therefore, the website shutdown device provided by the embodiment of the application realizes website shutdown by additionally arranging the cloud protection node between the website system and the cloud protection platform, and when a website has a security event or needs to be shutdown temporarily, the cloud protection node can directly feed back a corresponding shutdown page to quickly close the website, block bad information, further guarantee network security and avoid causing larger bad influence.
As a preferred embodiment, the node determining module 20 may be specifically configured to perform domain name resolution on the access request to determine the cloud protection node.
For the introduction of the apparatus provided in the present application, please refer to the above method embodiments, which are not described herein again.
To solve the above technical problem, the present application further provides a website system, please refer to fig. 5, where fig. 5 is a schematic structural diagram of the website system provided in the present application, and the website system may include:
a memory 100 for storing a computer program;
the processor 200, when executing the computer program, may implement the steps of any of the above-described website shutdown methods.
For the introduction of the system provided by the present application, please refer to the above method embodiment, which is not described herein again.
To solve the above problem, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, can implement the steps of any one of the above website shutdown methods.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For the introduction of the computer-readable storage medium provided in the present application, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (10)

1. A website shutdown method is characterized by comprising the following steps:
receiving an access request sent by a request terminal;
determining a cloud protection node according to the access request;
sending the access request to the cloud protection node;
and when a shutdown page fed back by the cloud protection node is received, sending the shutdown page to the request end.
2. The website shutdown method according to claim 1, wherein the determining a cloud protection node according to the access request comprises:
and performing domain name resolution on the access request, and determining the cloud protection node.
3. The website shutdown method of claim 1, wherein the cloud protection node feeding back the shutdown page comprises:
determining a target website according to the access request;
judging whether a preset storage space has a shutdown page related to the target website or not;
and if so, feeding the shutdown page back to the website system.
4. The website shutdown method according to claim 3, further comprising:
receiving a shutdown webpage about a shutdown website issued by a cloud protection platform;
and storing the shutdown web page of the shutdown website to the preset storage space.
5. The website shutdown method according to claim 3, further comprising:
when the preset storage space does not have a shutdown page related to the target website, sending the access request to a source station of the target website to acquire response information fed back by the source station;
and feeding back the response information to the website system so that the website system feeds back the response information to the request terminal.
6. A cloud protection system, comprising:
the request terminal is used for sending an access request to the website system;
the website system is used for determining a cloud protection node according to the access request and sending the access request to the cloud protection node; sending a shutdown page fed back by the cloud protection node to the request end;
and the cloud protection node is used for feeding back a shutdown page corresponding to the access request to the website system.
7. The cloud protection system of claim 6, further comprising:
and the cloud protection platform is used for synchronizing shutdown webpages corresponding to the shutdown websites to the cloud protection node.
8. A website shutdown device, comprising:
the request receiving module is used for receiving an access request sent by a request end;
the node determining module is used for determining a cloud protection node according to the access request;
the request forwarding module is used for sending the access request to the cloud protection node;
and the website shutdown module is used for sending the shutdown page to the request end when receiving the shutdown page fed back by the cloud protection node.
9. A website system, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the website shutdown method of any one of claims 1 to 5.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the website shutdown method according to any one of claims 1 to 5.
CN202110650518.XA 2021-06-10 2021-06-10 Website shutdown method and device and related equipment Active CN113411318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110650518.XA CN113411318B (en) 2021-06-10 2021-06-10 Website shutdown method and device and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110650518.XA CN113411318B (en) 2021-06-10 2021-06-10 Website shutdown method and device and related equipment

Publications (2)

Publication Number Publication Date
CN113411318A true CN113411318A (en) 2021-09-17
CN113411318B CN113411318B (en) 2023-02-24

Family

ID=77683598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110650518.XA Active CN113411318B (en) 2021-06-10 2021-06-10 Website shutdown method and device and related equipment

Country Status (1)

Country Link
CN (1) CN113411318B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402620A (en) * 2011-12-26 2012-04-04 余姚市供电局 Method and system for defending malicious webpage
CN102882886A (en) * 2012-10-17 2013-01-16 北京奇虎科技有限公司 Network terminal and method for presenting visited website associated information
CN103605689A (en) * 2013-11-01 2014-02-26 北京奇虎科技有限公司 Method and device for acquiring visiting staying time
CN103873466A (en) * 2014-03-04 2014-06-18 深信服网络科技(深圳)有限公司 HTTPS (Hypertext Transfer Protocol Secure) website filtration and interdict alarm method and device
US9043434B1 (en) * 2011-09-12 2015-05-26 Polyvore, Inc. Alternate page determination for a requested target page
CN105939350A (en) * 2016-05-30 2016-09-14 北京京东尚科信息技术有限公司 Network access control method and system
CN106453216A (en) * 2015-08-13 2017-02-22 阿里巴巴集团控股有限公司 Malicious website interception method, malicious website interception device and client
CN106789980A (en) * 2016-12-07 2017-05-31 北京亚鸿世纪科技发展有限公司 A kind of monitoring administration method and device of website legitimacy
CN107277080A (en) * 2017-08-23 2017-10-20 深信服科技股份有限公司 A kind of is the internet risk management method and system of service based on safety
CN107547555A (en) * 2017-09-11 2018-01-05 北京匠数科技有限公司 A kind of web portal security monitoring method and device
CN110287393A (en) * 2019-06-26 2019-09-27 深信服科技股份有限公司 A kind of webpage acquisition methods, device, equipment and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043434B1 (en) * 2011-09-12 2015-05-26 Polyvore, Inc. Alternate page determination for a requested target page
CN102402620A (en) * 2011-12-26 2012-04-04 余姚市供电局 Method and system for defending malicious webpage
CN102882886A (en) * 2012-10-17 2013-01-16 北京奇虎科技有限公司 Network terminal and method for presenting visited website associated information
CN103605689A (en) * 2013-11-01 2014-02-26 北京奇虎科技有限公司 Method and device for acquiring visiting staying time
CN103873466A (en) * 2014-03-04 2014-06-18 深信服网络科技(深圳)有限公司 HTTPS (Hypertext Transfer Protocol Secure) website filtration and interdict alarm method and device
CN106453216A (en) * 2015-08-13 2017-02-22 阿里巴巴集团控股有限公司 Malicious website interception method, malicious website interception device and client
CN105939350A (en) * 2016-05-30 2016-09-14 北京京东尚科信息技术有限公司 Network access control method and system
CN106789980A (en) * 2016-12-07 2017-05-31 北京亚鸿世纪科技发展有限公司 A kind of monitoring administration method and device of website legitimacy
CN107277080A (en) * 2017-08-23 2017-10-20 深信服科技股份有限公司 A kind of is the internet risk management method and system of service based on safety
CN107547555A (en) * 2017-09-11 2018-01-05 北京匠数科技有限公司 A kind of web portal security monitoring method and device
CN110287393A (en) * 2019-06-26 2019-09-27 深信服科技股份有限公司 A kind of webpage acquisition methods, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN113411318B (en) 2023-02-24

Similar Documents

Publication Publication Date Title
US20180288187A1 (en) Access request conversion method and apparatus
CN112261172B (en) Service addressing access method, device, system, equipment and medium
CN110049022B (en) Domain name access control method and device and computer readable storage medium
CN109189596A (en) The method and apparatus that large-size screen monitors are shown are realized based on Websocket
CN112231711A (en) Vulnerability detection method and device, computer equipment and storage medium
CN112035763A (en) Information processing method, device and system, electronic equipment and storage medium
US20240098499A1 (en) Secure URL Shortener For Character-Limited Messages
US20210112025A1 (en) Method and server for processing messages
US9781140B2 (en) High-yielding detection of remote abusive content
CN114285659A (en) Reverse proxy method, device, equipment and storage medium
CN113411318B (en) Website shutdown method and device and related equipment
CN105933298B (en) Apparatus and method for performing transmission control protocol handshaking
CN110334301B (en) Page restoration method and device
CN110198294A (en) Security attack detection method and device
CN111935316B (en) Method and device for acquiring front-end equipment catalog
CN112202776A (en) Source station protection method and network equipment
CN112837156A (en) Transaction method and device with fixed execution sequence
CN111385248B (en) Attack defense method and attack defense device
CN110830510B (en) Method, device, equipment and storage medium for detecting DOS attack
CN112637316B (en) Communication method and device
CN114006758B (en) Method, device and storage medium for managing equipment identification
CN111245772B (en) CNAME processing method and device and electronic equipment
CN115834525B (en) Terminal access method and device based on ARP control, electronic equipment and storage medium
CN112448931B (en) Network hijacking monitoring method and device
CN112783665B (en) Interface compensation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant