CN116070004B - User behavior association plug-in system, control method thereof, electronic equipment and medium - Google Patents

User behavior association plug-in system, control method thereof, electronic equipment and medium Download PDF

Info

Publication number
CN116070004B
CN116070004B CN202310042648.4A CN202310042648A CN116070004B CN 116070004 B CN116070004 B CN 116070004B CN 202310042648 A CN202310042648 A CN 202310042648A CN 116070004 B CN116070004 B CN 116070004B
Authority
CN
China
Prior art keywords
user
session
user request
module
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310042648.4A
Other languages
Chinese (zh)
Other versions
CN116070004A (en
Inventor
李毅
雷晟
崔培升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ESAFENET TECHNOLOGY DEVELOPMENT CO LTD
Original Assignee
BEIJING ESAFENET TECHNOLOGY DEVELOPMENT CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ESAFENET TECHNOLOGY DEVELOPMENT CO LTD filed Critical BEIJING ESAFENET TECHNOLOGY DEVELOPMENT CO LTD
Priority to CN202310042648.4A priority Critical patent/CN116070004B/en
Publication of CN116070004A publication Critical patent/CN116070004A/en
Application granted granted Critical
Publication of CN116070004B publication Critical patent/CN116070004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9532Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The system comprises a probe module, a user management module, a driving agent module and an analysis module, wherein the probe module is used for injecting an interceptor into a web container according to a preset specification when the web container is started so as to intercept a user request and a session received by the web container and store the user request and the session; the user management module is used for finding and registering user information according to the user request and the session; the driving agent module is used for reconstructing byte codes of the class file and generating an agent driver to send an original sql statement, a user request, a session and user information; the analysis module is used for analyzing and evaluating the original sql statement, the user request and the session and the user information according to a preset evaluation strategy. By adopting the user behavior association plug-in system, the compatibility is strong, and the association accuracy is high.

Description

User behavior association plug-in system, control method thereof, electronic equipment and medium
Technical Field
The disclosure relates generally to the technical field of information security, and in particular relates to a user behavior association plug-in system, a control method thereof, electronic equipment and a medium.
Background
The traditional database auditing system can audit the database by accessing the database flow, so that sensitive or risk operation is found and specific database session, ip address, database user and other information are traced back. Nowadays, most application systems are B/S architecture, users access the application systems through a browser and then connect and operate a database through the application systems, at this time, only the ip addresses of the application systems can be audited, and the application systems are usually fixed by using the database users, so that specific operation sources are difficult to trace back, and three-layer association is generated.
At present, related technologies install corresponding plug-ins under an application system, and complete plug-in configuration according to system information, so that when a database operation is executed, a browser request is obtained, and information such as a browser ip, a protocol and an application system user is analyzed. However, due to the variety of application systems and complex system environment, different configurations are required for different situations, the process is complicated, and meanwhile, the possibility of inaccurate association exists in a concurrent scene.
Disclosure of Invention
In view of the above-mentioned drawbacks or shortcomings in the related art, it is desirable to provide a user behavior association plug-in system, a control method thereof, an electronic device, a medium, and a program, which are strong in compatibility, and at the same time, high in association accuracy.
In a first aspect, the present disclosure provides a user behavior association plug-in system, the system comprising:
the probe module is used for injecting an interceptor into the web container according to a preset specification when the web container is started so as to intercept a user request and a session received by the web container and store the user request and the session;
the user management module is used for discovering and registering user information according to the user request and the session;
the drive agent module is used for reconstructing byte codes of class files and generating an agent drive so as to send an original sql statement, the user request, the session and the user information;
and the analysis module is used for carrying out analysis and evaluation on the original sql statement, the user request and session and the user information according to a preset evaluation strategy.
Optionally, in some embodiments of the present disclosure, the user management module is further configured to parse the user information from the http protocol of the request, and traverse all AttributeName keys in the session.
Optionally, in some embodiments of the present disclosure, the user management module is further configured to clear an expired session and user information associated with the expired session.
Optionally, in some embodiments of the present disclosure, the driving agent module is further configured to detect the class file; and when the class file is used as a target database drive, analyzing the class file, extracting all methods from the byte codes, and searching a method with a return value type of connection.
Optionally, in some embodiments of the present disclosure, the preset specification includes a servlet specification.
Optionally, in some embodiments of the present disclosure, the preset evaluation policy includes at least one of an sql command risk feature and a user blacklist.
Optionally, in some embodiments of the present disclosure, the sql command risk feature includes a SLEEP function, a get_host_name function, or a sys_context function.
In a second aspect, the present disclosure provides a control method for the user behavior association plug-in system according to any one of the first aspects, the method including:
intercepting a user request and a session, and storing the user request and the session;
discovering and registering user information according to the user request and the session;
sending an original sql statement, the user request, the session and the user information;
and according to a preset evaluation strategy, analyzing and evaluating the original sql statement, the user request and session and the user information.
In a third aspect, the present disclosure provides an electronic device comprising a processor and a memory having stored therein at least one instruction, at least one program, code set or instruction set, the instruction, program, code set or instruction set being loaded and executed by the processor to implement the steps of the control method of the second aspect.
In a fourth aspect, the present disclosure provides a computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of the control method of the second aspect.
From the above technical solutions, the embodiments of the present disclosure have the following advantages:
the embodiment of the disclosure provides a user behavior association plug-in system, a control method thereof, electronic equipment and a medium, wherein the system injects an interceptor into a web container through a probe module according to a preset specification so as to intercept a user request and a session received by the web container, store the user request and the session, have better compatibility in different scenes, and simultaneously a user management module can discover and register user information according to the user request and the session; therefore, the drive agent module can reconstruct byte codes of class files and generate agent drives to send original sql sentences, user requests, sessions and user information, compatibility of different database drives and different java versions is ensured, association accuracy is high, and the analysis module can accurately analyze and evaluate the original sql sentences, the user requests, the sessions and the user information according to a preset evaluation strategy, so that reliability is high.
Drawings
Other features, objects and advantages of the present disclosure will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings:
fig. 1 is a schematic view of an application scenario provided in an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a configuration of a user behavior association plug-in system according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a control method of a user behavior association plug-in system according to an embodiment of the present disclosure.
Detailed Description
In order that those skilled in the art will better understand the present disclosure, a technical solution in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person of ordinary skill in the art would obtain without making any inventive effort are within the scope of protection of this disclosure.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the described embodiments of the disclosure may be capable of operation in sequences other than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules that are expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, without conflict, the embodiments of the present disclosure and features of the embodiments may be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
For a better understanding of the embodiments of the present disclosure, the description will now be made with reference to the application scenario shown in fig. 1. For example, as shown in fig. 1, the browser, the web server and the database server in the B/S architecture respectively represent three levels, and three-level association refers to that under the condition of not changing the original architecture mode, data are collected through time and other factors to perform rule analysis, so that each SQL statement is bound to the actual initiator of the SQL statement, that is, the purpose of binding the SQL statement and the URL request is finally achieved.
The user behavior association plug-in system, the control method thereof, the electronic device and the medium provided by the embodiment of the disclosure are described in detail below through fig. 2 to 3.
Fig. 2 is a schematic structural diagram of a user behavior association plug-in system according to an embodiment of the disclosure. The system 100 comprises a probe module 101, a user management module 102, a driving agent module 103 and an analysis module 104, wherein the probe module 101 can inject an interceptor into a web container according to a preset specification when the web container is started so as to intercept user requests and sessions received by the web container and store the user requests and sessions; the user management module 102 is capable of discovering and registering user information based on user requests and sessions; the driving agent module 103 can reconstruct the byte codes of the class file and generate an agent driving to send the original sql statement, the user request, the session and the user information; and the analysis module 104 can analyze and evaluate the original sql statement, the user request, the session and the user information according to a preset evaluation strategy.
Illustratively, the operation of the constituent modules in the system 100 is described below. For example, the preset specifications of the embodiment of the present disclosure include, but are not limited to, the servlet specification, where the probe module 101 may implement the servlet3.0 related specification, create a META-INF/services directory in the three-layer association jar package, and then add a file named java. When the web container is started, the web container calls the implementation class according to the servlet3.0 specification, and at the moment, the implementation class can inject an interceptor into the web container, the interceptor can be used as a probe, and the setting has the advantages that the injection is realized according to the specification standard, the compatibility is better under different scenes, and meanwhile, the configuration can be simplified, and the method is convenient and quick through the mode of actively loading the web container.
Further, the probe module 101 may intercept any user requests and sessions received by the web container and save them to thread-local variables, while invoking the user management module 102 to complete discovery and registration of the user, thereby providing the data required after the three-tier association.
As another example, the manner in which the user management module 102 of embodiments of the present disclosure discovers users can be divided into two broad categories, namely from a request or from a session. Specifically, the method of finding from the request is performed by intercepting the login request and parsing out the user information such as request headers, request payload, request body, query string parameters, and form data from the http protocol, while the method of finding from the session is performed by traversing all AttributeName keys (the information in the session is stored in a key-value key value manner, where AttributeName is the key in the session). In any way, the discovered user information is finally associated with the session and cached.
Optionally, in order to timely clear the expired session, avoiding the risk of memory overflow caused by continuous accumulation of the session, some embodiments of the present disclosure further use a java weak reference mechanism, after the expired session is removed from the web container, once garbage cleaning of the web container is triggered at a later time, the expired session and the user information associated with the expired session are removed, thereby releasing the memory.
For another example, the driving agent module 103 of the embodiment of the present disclosure may use a java agent technology to detect a class file before the bytecode of the class file is loaded by the java virtual machine; when the class file is used as a target database driver, analyzing the class file, extracting all methods from the byte codes, and searching for a method with a return value type of connection, wherein the methods are methods which need to be reconstructed, so that the invasiveness of an application system can be reduced through the proxy of the byte code layer, and the application system is easier to install and disassemble. In order to ensure compatibility of different database drivers with different java versions, the reconfiguration of the embodiments of the present disclosure does not employ a hard-coded approach, but rather implants the relevant code via a dynamic proxy approach. Specifically, renaming the method found in the previous step as a method to be proxied, for example, the original method is named as connect, renaming the method as connect_1, then creating a method identical to the original method, calling the renamed method by using the created method to obtain the original connection, and creating a proxy connection through the original connection by using a dynamic proxy, wherein the proxy connection further creates a proxy state. Finally, the agent state acquires the user request and session saved in the thread local variable by the probe module 101 before sending the original sql Statement, acquires user information such as a user name and ip through the user management module 102, and sends the user information together with the original sql Statement, thereby completing three-layer association.
For example, because of the difference between the system services, it is difficult to formulate a unified standard to perform risk assessment on one sql statement. To ensure accuracy of the evaluation, the analysis module 104 of the embodiment of the disclosure can decide the evaluation policy according to the user, that is, three-layer association provides a web page, so that the user can set relevant policy content through the web page, for example, the preset evaluation policy includes at least one of sql command risk feature and a blacklist of the user. The risk feature of the sql command includes, but is not limited to, a SLEEP function, a get_host_name function, a sys_context function, or the like, but may also be some database functions customized by the user, and the user blacklist includes, but is not limited to, information such as an application user or a client ip of a risk operation.
According to the user behavior association plug-in system provided by the embodiment of the disclosure, the interceptor is injected into the web container through the probe module according to the preset specification so as to intercept the user request and the session received by the web container, store the user request and the session, and have better compatibility in different scenes, and meanwhile, the user management module can discover and register user information according to the user request and the session; therefore, the drive agent module can reconstruct byte codes of class files and generate agent drives to send original sql sentences, user requests, sessions and user information, compatibility of different database drives and different java versions is ensured, association accuracy is high, and the analysis module can accurately analyze and evaluate the original sql sentences, the user requests, the sessions and the user information according to a preset evaluation strategy, so that reliability is high.
Based on the foregoing embodiments, please refer to fig. 3, which is a flowchart illustrating a control method of a user behavior association plug-in system according to an embodiment of the present disclosure. The method can be applied to the user behavior association plug-in system shown in fig. 2, and specifically comprises the following steps:
s101, intercepting a user request and a session, and storing the user request and the session.
S102, discovering and registering user information according to the user request and the session.
S103, sending the original sql statement, the user request and the session and the user information.
S104, analyzing and evaluating the original sql statement, the user request, the session and the user information according to a preset evaluation strategy.
It should be noted that, in this embodiment, the descriptions of the same steps and the same content as those in other embodiments may refer to the descriptions in other embodiments, and are not repeated here.
According to the control method of the user behavior association plug-in system, which is provided by the embodiment of the disclosure, accurate association is realized by intercepting the user request and the session, finding and registering the user information according to the user request and the session, so that the original sql statement, the user request, the session and the user information are sent together, and accurate analysis and evaluation are performed according to the preset evaluation strategy, so that the reliability is high.
Based on the foregoing embodiments, the disclosed embodiments provide an electronic device including a processor and a memory. The memory stores at least one instruction, at least one program, code set, or instruction set that is loaded and executed by the processor to implement the steps of the control method of the corresponding embodiment of fig. 3.
As another aspect, the disclosed embodiments provide a computer readable storage medium storing program code for executing an implementation in the control method of the corresponding embodiment of fig. 3 described above.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, apparatuses and modules described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present disclosure, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms. The modules illustrated as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in each embodiment of the present disclosure may be integrated in one processing unit, or each module may exist alone physically, or two or more units may be integrated in one module. The integrated units may be implemented in hardware or in software functional units. And the integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer-readable storage medium.
Based on such understanding, the technical solution of the present disclosure may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the control method of the various embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be noted that the above embodiments are merely for illustrating the technical solution of the disclosure, and are not limiting; although the present disclosure has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present disclosure.

Claims (9)

1. A user behavior association plug-in system, the system comprising:
the probe module is used for injecting an interceptor into the web container according to a preset specification when the web container is started so as to intercept a user request and a session received by the web container and store the user request and the session;
the user management module is used for discovering and registering user information according to the user request and the session;
the drive agent module is used for reconstructing byte codes of class files and generating an agent drive so as to send an original sql statement, the user request, the session and the user information;
the analysis module is used for analyzing and evaluating the original sql statement, the user request and session and the user information according to a preset evaluation strategy; the preset evaluation policy includes at least one of an sql command risk feature and a user blacklist.
2. The system of claim 1, wherein the user management module is further configured to parse the user information from the http protocol of the request and traverse all AttributeName keys in the session.
3. The system of claim 1, wherein the user management module is further configured to clear an expired session and user information associated with the expired session.
4. The system of claim 1, wherein the drive agent module is further configured to detect the class file; and when the class file is used as a target database drive, analyzing the class file, extracting all methods from the byte codes, and searching a method with a return value type of connection.
5. The system of any of claims 1 to 4, wherein the preset specification comprises a servlet specification.
6. The system of claim 1, wherein the sql command risk feature comprises a SLEEP function, a get_host_name function, or a sys_context function.
7. A control method for the user behavior association plug-in system of any one of claims 1 to 6, characterized in that the method comprises:
intercepting a user request and a session, and storing the user request and the session;
discovering and registering user information according to the user request and the session;
sending an original sql statement, the user request, the session and the user information;
analyzing and evaluating the original sql statement, the user request and the session as well as the user information according to a preset evaluation strategy; the preset evaluation policy includes at least one of an sql command risk feature and a user blacklist.
8. An electronic device comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, the program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the steps of the control method of claim 7.
9. A computer-readable storage medium storing one or more programs executable by one or more processors to implement the steps of the control method of claim 7.
CN202310042648.4A 2023-01-28 2023-01-28 User behavior association plug-in system, control method thereof, electronic equipment and medium Active CN116070004B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310042648.4A CN116070004B (en) 2023-01-28 2023-01-28 User behavior association plug-in system, control method thereof, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310042648.4A CN116070004B (en) 2023-01-28 2023-01-28 User behavior association plug-in system, control method thereof, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN116070004A CN116070004A (en) 2023-05-05
CN116070004B true CN116070004B (en) 2023-06-30

Family

ID=86174477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310042648.4A Active CN116070004B (en) 2023-01-28 2023-01-28 User behavior association plug-in system, control method thereof, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN116070004B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1892664A (en) * 2005-06-30 2007-01-10 国际商业机器公司 Method and system for controlling access to resources
US9699261B2 (en) * 2014-01-14 2017-07-04 Cyber-Ark Software Ltd. Monitoring sessions with a session-specific transient agent
US10154052B1 (en) * 2014-05-23 2018-12-11 Amazon Technologies, Inc. Tracer cookies to detect web session compromise by insiders
CN105338069A (en) * 2015-10-14 2016-02-17 深圳市金证科技股份有限公司 Conversation sharing method crossing web containers, system and web application server
CN110381026B (en) * 2019-06-14 2021-12-10 北京数立得科技有限公司 Business service packaging and accessing system, method and device for rich client
CN114760089A (en) * 2022-02-23 2022-07-15 深圳开源互联网安全技术有限公司 Safety protection method and device for web server

Also Published As

Publication number Publication date
CN116070004A (en) 2023-05-05

Similar Documents

Publication Publication Date Title
Sirer et al. Design and implementation of a distributed virtual machine for networked computers
CA2734774C (en) A user-transparent system for uniquely identifying network-distributed devices without explicitly provided device or user identifying information
US9614927B2 (en) Independent actionscript analytics tools and techniques
US8745579B2 (en) Methods and systems for dynamically composing distributed interactive applications from high-level programming languages
US9235451B2 (en) Browser kernel switching method
US20130160130A1 (en) Application security testing
Bates et al. Transparent web service auditing via network provenance functions
CA2782674A1 (en) System and method for providing virtual web access
WO2017151352A1 (en) Variable runtime transpilation
US7987243B2 (en) Method for media discovery
CN101488965B (en) Domain name filtering system and method
CN103647794A (en) Data correlation method based on J2EE platform and correlation plug-in
WO2009009442A2 (en) Draggable mechanism for identifying and communicating the state of an application
EP2820582B1 (en) Network service interface analysis
GB2514796A (en) Web service testing
CN116070004B (en) User behavior association plug-in system, control method thereof, electronic equipment and medium
Gröne et al. The Apache modeling project
CN114048191A (en) Business correlation method, device, auditing method and database auditing system
Berlin et al. To re-experience the web: A framework for the transformation and replay of archived web pages
CN107105036B (en) Activity tracing method and system for server
Pham A framework for reproducible computational research
Tu et al. Performance Tuning and Optimizing ASP. NET Applications
und Sicherheit et al. The Feasibility of Limiting Access to Fingerprintable Surfaces in Web Browsers
Smirnova et al. Load Testing of Vaadin Flow applications
Salovaara et al. Trusting the Big Friendly Giants: large-scale evaluation of dependencies on Finnish websites

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant