CN117375880A - Webpage tamper-proof system and method - Google Patents

Webpage tamper-proof system and method Download PDF

Info

Publication number
CN117375880A
CN117375880A CN202311148704.9A CN202311148704A CN117375880A CN 117375880 A CN117375880 A CN 117375880A CN 202311148704 A CN202311148704 A CN 202311148704A CN 117375880 A CN117375880 A CN 117375880A
Authority
CN
China
Prior art keywords
webpage
file
monitoring
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311148704.9A
Other languages
Chinese (zh)
Inventor
步敬敏
陈梅
王国广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiahong Information Technology Co ltd
Original Assignee
Shanghai Jiahong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiahong Information Technology Co ltd filed Critical Shanghai Jiahong Information Technology Co ltd
Priority to CN202311148704.9A priority Critical patent/CN117375880A/en
Publication of CN117375880A publication Critical patent/CN117375880A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a webpage tamper-proof system and method; the backup file management module is used for providing a backup center for the static webpage to be protected, the backed-up webpage file is a certificate during webpage recovery, and the file uploaded to the backup center generates a unique watermark value to carry out file identification on the unique watermark value so as to ensure that the webpage recovery cannot be in error; the monitoring management module is used for locking the webpage to be monitored by configuring some parameters, and providing a basis for realizing the real-time monitoring of the webpage; the alarm and recovery module is used for monitoring the webpage in real time; the user management module is used for carrying out unified management on personnel using the system. The invention can realize the omnibearing protection of the webpage efficiently, conveniently and quickly, can position the tampered position at the first time when the event of tampering the webpage occurs, repairs the tampered webpage, maintains the image of the website entitlement, is not affected, and ensures the stability, reliability and expandability of the system.

Description

Webpage tamper-proof system and method
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a webpage tamper-proof system and method.
Background
Webpage tampering refers to that an attacker invades a target website by using a specific means or method and modifies the attack mode of partial content or source codes of the website; if the web page is tampered and cannot be recovered in time, the interests of website owners will be damaged, and adverse effects will be caused to society, especially on authoritative websites, news websites and the like, which will cause immeasurable negative effects.
The basic requirements for webpage tamper resistance are as follows: timely discovering and processing the uploaded Trojan horse and the tampered normal file, and the existing protective measures comprise: strengthening server security settings, including prohibiting remote operation of a registry, disabling CMD commands, starting a firewall and the like, and preventing by installing tamper-proof commercial software such as a cloud shield and the like; the webpage tamper-proof system aims to effectively reduce malicious influence after the webpage is tampered, and under the conditions of interception in advance and double management after restoration, the webpage is immediately restored when interception fails, so that user experience can be improved, the image of a corresponding main body of a website can be maintained, and negative influence is prevented.
The scheme for realizing webpage tamper resistance in the prior art comprises a time polling technology, an event triggering and core embedded technology and a file filtering and event triggering technology; the time polling is specifically to continuously poll and detect the web pages through a program, and the detection is carried out once every other time period, wherein the detection is mainly to detect each web page file in the monitoring files, and the detection is carried out by comparing with the backed-up web page files to judge whether the change occurs or not; because the technology is interval detection, a monitoring blank period exists, and if web page tampering occurs in the blank period, web pages are not easy to check and recover; the event triggering and core embedded technology specifically adopts an asymmetric encryption algorithm, all webpages are encrypted by adopting the asymmetric encryption algorithm, when the webpages are accessed, a server performs secret verification, and only after the verification is passed, the backup file is called for decryption, and the webpages are distributed; according to the technical scheme, before the web page is released, the complete attribute check is required to be carried out on each accessed page, and a great load is brought to a server; the file filtering and event triggering technology relies on a file bottom driving technology, real-time monitoring is carried out on the target webpage file in a time triggering mode, the file filtering technology needs to detect file attributes in real time, once the file attributes are changed, corresponding backup files are copied to the position where the change is detected and covered, the file attribute change can be easily obtained through the file driving technology, excessive resources are not occupied, and file coverage Guo Hengkuai is rapid and efficient; therefore, the technical scheme provides a new system for solving the webpage security problem in the technical scheme so as to improve the webpage tamper resistance and response speed.
Disclosure of Invention
The invention provides a webpage tamper-proof system and method, which comprise functions of webpage real-time monitoring, event alarm processing, webpage recovery and the like, can realize the omnibearing protection of the webpage efficiently, conveniently and quickly, can position a tampered position at the first time when a tampered webpage event occurs, repairs the tampered webpage, maintains the image of a website entitlement person, is not damaged, ensures the stability, reliability and expandability of the system, and solves the problems in the background technology.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention discloses a webpage tamper-proof system, which comprises a backup file management module, a monitoring management module, an alarm and recovery module and a user management module;
the backup file management module is used for providing a backup center for a static webpage to be protected, the backed-up webpage file is a certificate during webpage recovery, and the file uploaded to the backup center generates a unique watermark value to carry out file identification on the file so as to ensure that the webpage recovery cannot be in error;
the monitoring management module is used for locking the webpage to be monitored by configuring some parameters, providing a basis for realizing the real-time monitoring of the webpage, and is divided into a monitoring station sub-module and a monitoring catalog sub-module; the monitoring station submodule distinguishes different servers through different IP addresses of each station according to the characteristics of service layout of an operator, and locks the corresponding servers through a station selecting mode;
the alarm and recovery module is used for monitoring the webpage in real time, carrying out alarm processing at the first time once a tampering event occurs, and immediately recovering the original webpage without affecting the normal use of the webpage;
the user management module is used for carrying out unified management on personnel using the system, so that the system is convenient to use with high efficiency.
Further, the backup file management module comprises the functions of backup file inquiry, backup file addition, backup file deletion and file watermark generation.
Further, the monitoring site submodule comprises functions of adding a site, adding and modifying the site, adding and inquiring the site and deleting the site.
Further, the monitoring catalog submodule comprises catalog inquiry, catalog addition, catalog deletion, monitoring stopping and monitoring starting functions.
Further, the alarm and recovery module comprises functions of generating an alarm, inquiring the alarm, deleting the alarm and recovering the webpage.
Further, the user management module comprises a user management sub-module and a right control sub-module; the user management submodule is used for carrying out a series of management on users of the system, including functions of user addition, user inquiry, user modification and user deletion; the permission control sub-module is used for carrying out functions of user permission modification, permission distribution, permission deletion and permission query on the permissions of each user.
A webpage tamper-proof method comprises the following steps:
s1, after a user account number and a secret are correctly input, a webpage tamper-proof system is successfully logged in, and after login is successful, a management page is entered;
s2, uploading the webpage files to be monitored to a backup file management module in the system, and generating unique backup file watermark values through a watermark algorithm after the files are successfully uploaded;
s3, completing configuration of website information of the webpage, determining an IP address of a server where the webpage to be monitored is located, and configuring program catalog information after the website information is configured, so that the website information of the program catalog is consistent with the website information just configured;
s4, selecting a file to be monitored, after determining site information and program catalog information to be configured, locking the corresponding information, wherein the webpage file is in a monitored state, namely, monitoring is started, and the webpage file is always in monitoring except for external factors after the monitoring is started;
if the file changes, namely an event occurs, immediately calculating an event watermark value, and comparing the event watermark value with a watermark value of a backup file in a database to judge whether the file changes or not;
if the event watermark value is different from the watermark value of the backup file in the database, a tamper event is generated immediately, an alarm record is automatically restored, and the alarm record is updated after the restoration is completed;
otherwise, if the event watermark value is the same as the watermark value of the backup file, the web page is judged to be normally updated without any processing.
Compared with the prior art, the invention has the following beneficial effects:
the invention comprises the functions of real-time monitoring of the web page, event alarm processing, web page recovery and the like, can realize the omnibearing protection of the web page efficiently, conveniently and quickly, can position the tampered position at the first time when the event of tampering the web page occurs, repairs the tampered web page, maintains the image of the website rights, is not affected, and ensures the stability, reliability and expandability of the system.
Of course, it is not necessary for any one product to practice the invention to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a functional block diagram of a web page tamper-proof system according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the web page tamper-proof system of the present invention includes a backup file management module, a monitoring management module, an alarm and recovery module, and a user management module;
the backup file management module is used for providing a backup center for the static webpage to be protected, the backed-up webpage file is a certificate during webpage recovery, and the file uploaded to the backup center generates a unique watermark value to carry out file identification on the file so as to ensure that the webpage recovery cannot be in error; the backup file management module comprises the functions of backup file inquiry, backup file addition, backup file deletion and file watermark generation;
the monitoring management module is used for locking the webpage to be monitored by configuring some parameters, and provides a basis for realizing the real-time monitoring of the webpage, and is divided into a monitoring station sub-module and a monitoring catalog sub-module; the monitoring station submodule distinguishes different servers through different IP addresses of each station according to the characteristics of service layout of an operator, and locks the corresponding servers through a station selecting mode; the monitoring site submodule comprises functions of adding a site, adding and modifying, adding and inquiring and deleting the site; the monitoring catalog submodule comprises catalog inquiry, catalog addition, catalog deletion, monitoring stopping and monitoring starting functions;
the alarm and recovery module is used for monitoring the webpage in real time, carrying out alarm processing at the first time once a tampering event occurs, and immediately recovering the original webpage without affecting the normal use of the webpage; the alarm and recovery module comprises functions of generating an alarm, inquiring the alarm, deleting the alarm and recovering a webpage;
the user management module is used for carrying out unified management on personnel using the system, so that the system is convenient to use with high efficiency; the user management module comprises a user management sub-module and a right control sub-module; the user management submodule is used for carrying out a series of management on users of the system, including functions of user addition, user inquiry, user modification and user deletion; the permission control submodule is used for carrying out functions of user permission modification, permission distribution, permission deletion and permission query on the permissions of each user.
A webpage tamper-proof method comprises the following steps:
s1, after a user account number and a secret are correctly input, a webpage tamper-proof system is successfully logged in, and after login is successful, a management page is entered;
s2, uploading the webpage files to be monitored to a backup file management module in the system, and generating unique backup file watermark values through a watermark algorithm after the files are successfully uploaded;
s3, completing configuration of website information of the webpage, determining an IP address of a server where the webpage to be monitored is located, and configuring program catalog information after the website information is configured, so that the website information of the program catalog is consistent with the website information just configured;
s4, selecting a file to be monitored, after determining site information and program catalog information to be configured, locking the corresponding information, wherein the webpage file is in a monitored state, namely, monitoring is started, and the webpage file is always in monitoring except for external factors after the monitoring is started;
if the file changes, namely an event occurs, immediately calculating an event watermark value, and comparing the event watermark value with a watermark value of a backup file in a database to judge whether the file changes or not;
if the event watermark value is different from the watermark value of the backup file in the database, a tamper event is generated immediately, an alarm record is automatically restored, and the alarm record is updated after the restoration is completed;
otherwise, if the event watermark value is the same as the watermark value of the backup file, the web page is judged to be normally updated without any processing.
The invention comprises the functions of real-time monitoring of the web page, event alarm processing, web page recovery and the like, can realize the omnibearing protection of the web page efficiently, conveniently and quickly, can position the tampered position at the first time when the event of tampering the web page occurs, repairs the tampered web page, maintains the image of the website rights, is not affected, and ensures the stability, reliability and expandability of the system.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (7)

1. The webpage tamper-proof system is characterized by comprising a backup file management module, a monitoring management module, an alarm and recovery module and a user management module;
the backup file management module is used for providing a backup center for a static webpage to be protected, the backed-up webpage file is a certificate during webpage recovery, and the file uploaded to the backup center generates a unique watermark value to carry out file identification on the file so as to ensure that the webpage recovery cannot be in error;
the monitoring management module is used for locking the webpage to be monitored by configuring some parameters, providing a basis for realizing the real-time monitoring of the webpage, and is divided into a monitoring station sub-module and a monitoring catalog sub-module; the monitoring station submodule distinguishes different servers through different IP addresses of each station according to the characteristics of service layout of an operator, and locks the corresponding servers through a station selecting mode;
the alarm and recovery module is used for monitoring the webpage in real time, carrying out alarm processing at the first time once a tampering event occurs, and immediately recovering the original webpage without affecting the normal use of the webpage;
the user management module is used for carrying out unified management on personnel using the system, so that the system is convenient to use with high efficiency.
2. The system of claim 1, wherein the backup file management module includes backup file querying, backup file adding, backup file deleting, and file watermark generating functions.
3. The web page tamper resistant system of claim 1, wherein said monitor site sub-module comprises functionality for adding sites, adding modifications, adding queries, and deleting sites.
4. The web page tamper resistant system of claim 1, wherein said monitor catalog submodule includes catalog inquiry, catalog addition, catalog deletion, monitor stop and monitor start functions.
5. The web page tamper resistant system of claim 1, wherein said alert and recovery module includes functions for generating an alert, querying an alert, deleting an alert, and recovering a web page.
6. The web page tamper resistant system of claim 1, wherein said user management module comprises a user management sub-module and a permission control sub-module; the user management submodule is used for carrying out a series of management on users of the system, including functions of user addition, user inquiry, user modification and user deletion; the permission control sub-module is used for carrying out functions of user permission modification, permission distribution, permission deletion and permission query on the permissions of each user.
7. A web page tamper-resistant method, characterized in that the method is implemented by adopting a web page tamper-resistant system as claimed in any one of claims 1 to 6, and comprises the following steps:
s1, after a user account number and a secret are correctly input, a webpage tamper-proof system is successfully logged in, and after login is successful, a management page is entered;
s2, uploading the webpage files to be monitored to a backup file management module in the system, and generating unique backup file watermark values through a watermark algorithm after the files are successfully uploaded;
s3, completing configuration of website information of the webpage, determining an IP address of a server where the webpage to be monitored is located, and configuring program catalog information after the website information is configured, so that the website information of the program catalog is consistent with the website information just configured;
s4, selecting a file to be monitored, after determining site information and program catalog information to be configured, locking the corresponding information, wherein the webpage file is in a monitored state, namely, monitoring is started, and the webpage file is always in monitoring except for external factors after the monitoring is started;
if the file changes, namely an event occurs, immediately calculating an event watermark value, and comparing the event watermark value with a watermark value of a backup file in a database to judge whether the file changes or not;
if the event watermark value is different from the watermark value of the backup file in the database, a tamper event is generated immediately, an alarm record is automatically restored, and the alarm record is updated after the restoration is completed;
otherwise, if the event watermark value is the same as the watermark value of the backup file, the web page is judged to be normally updated without any processing.
CN202311148704.9A 2023-09-07 2023-09-07 Webpage tamper-proof system and method Pending CN117375880A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311148704.9A CN117375880A (en) 2023-09-07 2023-09-07 Webpage tamper-proof system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311148704.9A CN117375880A (en) 2023-09-07 2023-09-07 Webpage tamper-proof system and method

Publications (1)

Publication Number Publication Date
CN117375880A true CN117375880A (en) 2024-01-09

Family

ID=89399148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311148704.9A Pending CN117375880A (en) 2023-09-07 2023-09-07 Webpage tamper-proof system and method

Country Status (1)

Country Link
CN (1) CN117375880A (en)

Similar Documents

Publication Publication Date Title
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
CN101482887B (en) Anti-tamper verification method for key data in database
CN110889130B (en) Database-based fine-grained data encryption method, system and device
JP5430747B2 (en) Network contents tampering prevention equipment, method and system
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN103294950A (en) High-power secret information stealing malicious code detection method and system based on backward tracing
CN101877039A (en) Fault detection technology of server operating system
CN111885210A (en) Cloud computing network monitoring system based on end user environment
CN110138731B (en) Network anti-attack method based on big data
CN110008392A (en) A kind of webpage tamper detection method based on web crawlers technology
CN104573530A (en) Server safety reinforcing system
GB2592132A (en) Enterprise network threat detection
CN116527299A (en) Network-based safety protection method and dynamic defense system
CN108900505B (en) Cluster audit management and control method based on block chain technology
JP6768965B2 (en) Website monitoring system and monitoring method
CN112422527B (en) Threat assessment system, method and device for substation power monitoring system
CN112187699B (en) Method and system for sensing file theft
US8433798B2 (en) Altering software behavior based on internet connectivity
CN110086812B (en) Safe and controllable internal network safety patrol system and method
CN113114676B (en) Web safety protection and monitoring system
CN117375880A (en) Webpage tamper-proof system and method
CN112187787B (en) Digital marketing advertisement page tamper-proof method, device and equipment based on knowledge graph
CN115834205A (en) Monitoring system illegal external connection alarm system
KR102182397B1 (en) Web Service Protection and Automatic Recovery Method and System Thereof
CN109583204B (en) Method for monitoring static object tampering in mixed environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination