WO2013094847A1 - Appareil et procédé pour un service de pare-feu internet dans un système en nuage - Google Patents

Appareil et procédé pour un service de pare-feu internet dans un système en nuage Download PDF

Info

Publication number
WO2013094847A1
WO2013094847A1 PCT/KR2012/007147 KR2012007147W WO2013094847A1 WO 2013094847 A1 WO2013094847 A1 WO 2013094847A1 KR 2012007147 W KR2012007147 W KR 2012007147W WO 2013094847 A1 WO2013094847 A1 WO 2013094847A1
Authority
WO
WIPO (PCT)
Prior art keywords
web
virtual
proxy server
private
server
Prior art date
Application number
PCT/KR2012/007147
Other languages
English (en)
Korean (ko)
Inventor
김진봉
Original Assignee
(주)케이티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)케이티 filed Critical (주)케이티
Publication of WO2013094847A1 publication Critical patent/WO2013094847A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5603Access techniques

Definitions

  • the present invention relates to an apparatus and a method for a web firewall service in a cloud system, and more particularly, to an apparatus and a method for configuring a web firewall as a virtual machine (VM) in a cloud system to serve.
  • VM virtual machine
  • Modern society is an information society.
  • the leading figure in this information society is the Internet.
  • the Web is constantly evolving and creating new changes, providing us with a variety of conveniences and usefulness.
  • the Web Application Firewall is used to protect the website and provide safe services to customers.
  • Web applications are always in our lives, and the homepages and most services we use through the Internet are Web applications.
  • Most of the web attack is to attack the web server (120) or exploit the contents of the DB (130) by using vulnerabilities generated when building a web application.
  • An attacker inserts a code that bypasses a specific attack code or a vulnerability that only a specific web application has in the HTTP request and sends it to the web server.
  • the web application will behave unintentionally, and the result is to send various information to the attacker via HTTP reply.
  • Web firewalls filter web protocols from the outside to establish web application vulnerability and response processes against web hacking attacks. Unlike existing security solutions, web firewalls perform analysis and blocking at the application level instead of the network layer.
  • FIG. 2 is a diagram illustrating a relay concept of a conventional proxy server.
  • the principle of a web firewall is to inspect and block the contents of packets by applying the proxy principle to all packets entering and leaving a web server.
  • Proxy is a service technology used to access a proxy server from a web browser.
  • the URL requested from the web client is not connected to the server, but is connected to the proxy server 220. do.
  • the proxy server 220 receiving the proxy request sends a request by connecting to the corresponding server of the URL, receives a response instead of the client, and delivers the request to the client 210.
  • An embodiment of the present invention is directed to an apparatus and method for providing a web firewall service in a virtual form in a cloud system by creating and providing a virtual machine (VM) to a subscriber who has applied for a web firewall service.
  • VM virtual machine
  • Web firewall service device in a cloud system for achieving the above technical problem, by receiving a packet to a predetermined public IP (Public IP) for each of the first Private (IP) IP and subscriber A virtual router for transmitting the packet to the assigned first port; Blocking or checking the packet forwarded to the assigned first private IP and the first port, and a second port corresponding to a second private IP and the first port A virtual web proxy server for transmitting the packet to the server; And a web server configured to receive the second private IP and the packet forwarded to the second port and provide a web service.
  • Public IP public IP
  • IP Private IP
  • the virtual router and the virtual web proxy server are characterized in that a virtual machine (VM) in a cloud system.
  • VM virtual machine
  • the information of the first private IP and the first port of the virtual web proxy server is allocated by the virtual router.
  • the virtual web proxy server and the web server are configured in plural, each virtual web proxy server having a different first private IP, and each web server having a different second private ( Private) characterized in that the IP (IP) is assigned.
  • IP IP
  • API application programming interface
  • the first private IP and the second private IP are floating IPs.
  • the apparatus further comprises a load balancer configured to distribute the load of the packet in proportion to the number of the virtual web proxy server and the web server.
  • Web firewall service method in a cloud system for achieving the above technical problem, in a web firewall service method comprising a plurality of web servers, creating a first virtual machine (VM) Generating a virtual router by allocating a public IP to the first virtual machine; A virtual web proxy server is created by creating a second virtual machine (VM) and assigning different first ports for each first private IP and subscriber to the second virtual machine.
  • VM virtual machine
  • a virtual web proxy server is created by creating a second virtual machine (VM) and assigning different first ports for each first private IP and subscriber to the second virtual machine.
  • Creating a virtual web proxy server Transmitting a packet received by the virtual router to the first private IP and the first port, and forwarding the packet to the virtual web proxy server; A packet inspecting step of blocking or inspecting the packet at the virtual web proxy server; And a web server mapping step of forwarding the packet based on a second private IP and a second port assigned to each web server. Characterized in that it comprises a.
  • the information of the first private IP and the first port of the virtual web proxy server is allocated by the virtual router.
  • the virtual web proxy server includes a plurality of virtual web proxy servers, each virtual web proxy server having a different first private IP, and each web server having a different second private IP (IP) is assigned.
  • IP second private IP
  • the virtual web proxy server and a cloud stack (API) linked to the API is an AP including service information requested by the subscriber (API) is received from the cloud stack (Cloud stack) characterized in that the configuration of the configuration and the allocation bandwidth of the virtual web proxy server automatically.
  • API application programming interface
  • the virtual web proxy server is an AP including service information requested by the subscriber (API) is received from the cloud stack (Cloud stack) characterized in that the configuration of the configuration and the allocation bandwidth of the virtual web proxy server automatically.
  • the first private IP and the second private IP are floating IPs.
  • the virtual web proxy server, the web server and the load balancer are configured in a redundant structure.
  • a service such as a single (dual, dual) and bandwidth (Basic, Standard, Advanced, Preminum) of a web firewall that a subscriber has applied for through a cloud portal is used as an API type. It is possible to set automatically by calling.
  • a web firewall, a web server, and a load balancer are configured in a redundant manner to provide a stable service.
  • FIG. 2 is a diagram illustrating a relay concept of a conventional proxy server.
  • FIG. 3 is a diagram showing the configuration of a web firewall service apparatus in the cloud system of the present invention.
  • FIG. 4 is a diagram illustrating a cloud network configuration including a web firewall service apparatus of the present invention.
  • FIG. 5 is a flowchart illustrating a web firewall service method in a cloud system of the present invention.
  • Web firewall service apparatus in a cloud system according to an embodiment of the present invention, by receiving a packet to a predetermined public IP (Public IP) to the first private (IP) and the first port assigned to each subscriber to the first port (IP) A virtual router for transmitting a packet; Blocking or checking the packet forwarded to the assigned first private IP and the first port, and a second port corresponding to a second private IP and the first port A virtual web proxy server for transmitting the packet to the server; And a web server configured to receive the second private IP and the packet forwarded to the second port and provide a web service.
  • Public IP public IP
  • FIG. 3 is a diagram showing the configuration of a web firewall service apparatus in the cloud system of the present invention.
  • the web firewall service apparatus of the present invention relates to an apparatus and method for providing a web firewall service in a virtual form in a cloud system by creating and providing a virtual machine (VM) to a subscriber who has applied for a web firewall service.
  • VM virtual machine
  • a service such as a single (dual, dual) and bandwidth (Basic, Standard, Advanced, Preminum) of a web firewall that a subscriber has applied for through a cloud portal is used as an API type. It can be set automatically by calling.
  • Web firewall service apparatus and method of the present invention is that the web firewall provided in the existing HW appliance products are virtualized and provided to the subscriber in the form of a virtual machine (VM).
  • VM virtual machine
  • Apparatus and method 300 for providing a web firewall service of the present invention includes a virtual router 310, a virtual web proxy server 320, and a web server 330.
  • the virtual router and the virtual web proxy server are composed of virtual machines (VMs) in a cloud system.
  • VMs virtual machines
  • the virtual web proxy server 320 inspects and blocks the contents of the packet by applying a proxy principle to all packets entering and leaving the web server 330 as a web application firewall.
  • the URL requested by the web client is not directly connected to the web server 330, but is connected to the virtual web proxy server 320.
  • the virtual web proxy server 320 receiving the proxy request sends a request by connecting to the corresponding web server of the URL, and receives and returns a response on behalf of the client.
  • the virtual router 310 receives a predetermined public IP and receives a packet through the public IP, and the virtual router 310 acts as a Dynamic Host Configuration Protocol (DHCP) server to provide a virtual web proxy server 320. It assigns floating private IP to.
  • DHCP Dynamic Host Configuration Protocol
  • the virtual router 310 performs a port forwarding of the received packet to the assigned port by assigning a separate port for each subscriber.
  • the virtual web proxy server 320 blocks or inspects a packet forwarded to a private IP and a port allocated by the virtual router 310.
  • the virtual web proxy server 320 serves to deliver the packet received to the private IP (IP) and port assigned to the web server 320.
  • IP private IP
  • the virtual web proxy server 320 maps its private IP and port information to the private IP and port of the web server 330 and transmits it. will be.
  • the firewall function since the firewall function is executed at the same time, it blocks the packet to be transmitted to the other port or blocks the packet detected by the virus.
  • the web server 330 receives a port forwarded packet to its own private IP and port to provide a web service.
  • the response is not immediately performed by the client, but the client forwards the response through the virtual web proxy server 320.
  • the floating private IP and port of the virtual web proxy server 320 are allocated by the virtual router.
  • the virtual web proxy server 320 which is a virtual machine (VM), is interworked with a cloud stack and an application programming interface (API).
  • VM virtual machine
  • API application programming interface
  • the virtual web proxy server 320 automatically receives an API (API) including service information requested by the subscriber from the cloud stack and automatically configures the configuration and allocation bandwidth of the virtual web proxy server.
  • API API
  • the virtual web proxy server 320 which is a web application firewall, may be configured in a single or dual form, and bandwidth may also provide services in various forms such as basic, standard, advanced, and preminum.
  • the virtual web proxy server 320 and the web server 330 may include a plurality of load balancers for distributing the load of packets in proportion to the number of the configured virtual web proxy server 320 and the web server 330 ( Not shown) may be further included.
  • FIG. 4 is a diagram illustrating a cloud network configuration including a web firewall service apparatus of the present invention.
  • the virtual web proxy server 450 is configured as a virtual machine (VM) that executes a web firewall.
  • VM virtual machine
  • Subscribers can apply for web application firewall services in the form of single or dual through the ucloud portal, or apply for bandwidth in various forms such as basic, standard, advanced, and preminum.
  • a virtual router 440 which is a system server, acts as a DHCP server and a virtual web proxy server 450 acts as a client. Allocate Private IP).
  • Private port for the private IP (Private IP) for the use of the management tool (WEB GUI) to set the detailed environment of the individual web firewall virtual machine of the virtual web proxy server 450 is configured for each subscriber.
  • the virtual web proxy server 450 starts Apache to receive a configuration set by a customer in a virtual machine (VM), which is an individual web firewall (WAF), in the form of an API.
  • VM virtual machine
  • WAF individual web firewall
  • License key from central key management server is set and used for automatic online update function.
  • the subscriber's ucloud portal calls basic, standard, advanced, and preminum product information in the form of API to process the service level functions in the web firewall (waf) virtual machine (VM).
  • Waf web firewall
  • VM virtual machine
  • WAF web firewall
  • VM virtual machine
  • the additional data area is used to manage the logs that WAF inspects and detects packets.
  • engineers must configure the partitions for storage in the data area and mount them for use by PostgreSQL DB. There was a problem that was difficult for the customer to set up.
  • an automatic configuration script is created in the WAF VM template, and the parameters are received from the portal and the automatic configuration script is executed.
  • the script first checks if there is any unallocated storage in the VM, and if there is any unallocated storage, it performs partition creation, mount, and DB configuration.
  • WAF web firewall
  • VM virtual machine
  • Portal can configure service for WAF through API.
  • the Layer 2 network (virtual network) method provided in the cloud is a virtual router.
  • VM virtual machine
  • G / W 440
  • Public IP public IP
  • WAF web firewall
  • VM virtual machine
  • the proxy method of the virtual web proxy server 450 transmits the received private IP: port information to a private IP: port of the web server 460. .
  • the virtual web proxy server 450 is automatically configured through API calls, and registers proxy processing for web firewall (WAF) servers, URL and IP registration for web firewall (WAF) servers, and web firewall (WAF). ) Defining detection level, automatic storage allocation, license key registration.
  • Cloudstack manages all the IP and port information of the customer account VM can be configured by mapping with simple information, even if the customer does not have a complex configuration.
  • the cloud stack 430 performs automatic configuration through API call, and creates a web firewall (WAF) server, a service port forwarding process, a WAF management tool, a DB port, and an SSH port forwarding process.
  • WAF web firewall
  • Port information of a web firewall (WAF) virtual machine (VM) and a web server (Web server) 460 may be exposed, and the information may be received and configured by an API of the WAF VM.
  • WAF web firewall
  • VM virtual machine
  • Web server web server
  • WAF Web Firewall
  • VM virtual machine
  • Proxy configuration and URI registration can be configured by accessing the WAF administration tool.
  • the load balancer 420 is a VPX is composed of a commercial SW Load Balancer of Citrix.
  • the load balancer 420 handles automatic configuration and port load balancing through a VPX Load Balancer API (API) call.
  • API VPX Load Balancer API
  • the load balancer 420 processes load balancing in proportion to the number of web firewall virtual machines and web servers to enable load balancing for large packets.
  • the load balancer 420 may process the virtual router 440 (Roter VM) and the virtual web proxy server 450 through the TCP session reuse function.
  • the load balancer 420 and the VPX have an API, which configures the VPX for customer service and distributes ports for load balancing.
  • port forwarding is possible from the virtual router (Router VM) to the virtual web proxy server (WAF VM) through the ports distributed by the load balancer 420, which is an API in the cloud stack 430. Call to configure automatically.
  • Web firewall service apparatus of the present invention can be a redundant configuration.
  • WAF VM web proxy server
  • Compute Node where the virtual machine (VM) is created, is redundant in power, and even if the node itself fails, it is automatically migrated to other nodes in the cluster (8 nodes) to enable continuous service.
  • VM virtual machine
  • Disk is also mirrored so that service is not affected even in the event of a disk failure.
  • the load balancer 420 (VPX) is also redundantly configured in two nodes, and the VPX periodically sends a tcp packet to the web server to determine whether it is a normal service or not.
  • the web firewall is configured as a duplication of Active and Active
  • the web server 460 is configured in plural numbers under the virtual web proxy server (WAF) 450 which is a web firewall.
  • the number of load balancing ports in the VPX 420 which is the load balancer, is divided by the number of virtual web proxy servers X web servers 460 which are web firewalls (WAFs).
  • WAFs web firewalls
  • the web server 460 configures the virtual web proxy server 450, which is a web firewall (WAF), to send packets forwarded to the proxy by different web firewalls (WAF), one web firewall (WAF) is abnormal. By performing the operation, it is possible for the rest of the web firewall (WAF) to utilize the resources of the entire web server 460 while processing the packet.
  • WAF web firewall
  • FIG. 5 is a flowchart illustrating a web firewall service method in a cloud system of the present invention.
  • Web firewall service method in the cloud system of the present invention comprises a plurality of web servers.
  • a virtual machine is created in the cloud system, and a public router (IP) is assigned to the generated virtual machine (VM) to generate a virtual router (Suter).
  • IP public router
  • VM virtual machine
  • VM virtual proxy server
  • Port forwarding the packet received from the virtual router to the virtual private IP (IP) and the assigned port is transmitted to the virtual web proxy server (S530).
  • IP virtual private IP
  • the packet is inspected through the proxy principle of blocking or inspecting the packet in the virtual web proxy server (S540).
  • the packet is port forwarded based on a private IP and a port allocated to each web server (S550).
  • the information of the private IP and the port of the virtual web proxy server is allocated by the virtual router (Router VM).
  • the virtual web proxy server includes a cloud stack API (Api) including the service information requested by the subscriber Receives from (Cloud stack) and automatically configures the configuration and allocation bandwidth of the virtual web proxy server.
  • API application programming interface
  • the private IP assigned to the virtual web proxy server assigned in the router VM and the private IP assigned to the web server are floating IPs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un appareil et un procédé pour fournir un service de pare-feu Internet du type virtualisé dans un système en nuage par création d'une machine virtuelle (VM) pour fournir la VM à un abonné qui demande le service de pare-feu Internet.
PCT/KR2012/007147 2011-12-23 2012-09-06 Appareil et procédé pour un service de pare-feu internet dans un système en nuage WO2013094847A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020110141732A KR101342592B1 (ko) 2011-12-23 2011-12-23 클라우드 시스템에서의 웹 방화벽 서비스 장치 및 방법
KR10-2011-0141732 2011-12-23

Publications (1)

Publication Number Publication Date
WO2013094847A1 true WO2013094847A1 (fr) 2013-06-27

Family

ID=48668701

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2012/007147 WO2013094847A1 (fr) 2011-12-23 2012-09-06 Appareil et procédé pour un service de pare-feu internet dans un système en nuage

Country Status (2)

Country Link
KR (1) KR101342592B1 (fr)
WO (1) WO2013094847A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107205008A (zh) * 2016-03-18 2017-09-26 上海有云信息技术有限公司 云计算环境下web应用防火墙的负载自适应方法
CN107426206A (zh) * 2017-07-17 2017-12-01 北京上元信安技术有限公司 一种对web服务器的防护装置和方法
US10084807B2 (en) 2015-10-16 2018-09-25 Microsoft Technology Licensing, Llc. Detection of bypass vulnerabilities
CN110035060A (zh) * 2019-03-07 2019-07-19 北京华安普特网络科技有限公司 有效防黑客入侵的Web防火墙
US11057349B2 (en) 2017-11-03 2021-07-06 Todyl, Inc. Cloud-based multi-function firewall and zero trust private virtual network

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102306533B1 (ko) * 2015-04-07 2021-09-29 삼성전자주식회사 프록시 서버 관리 방법 및 시스템

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002023855A2 (fr) * 2000-09-13 2002-03-21 Cosine Communications, Inc. Systeme et procede de prestation de services de securite
US20020053034A1 (en) * 2000-11-01 2002-05-02 Nec Corporation Virtual network and virtual network connection system
KR20090065126A (ko) * 2007-12-17 2009-06-22 한국전자통신연구원 가상 머신 디스크 풀을 이용한 가상 머신 프로비저닝 방법
WO2011080063A1 (fr) * 2009-12-31 2011-07-07 International Business Machines Corporation Portage d'images de machine virtuelle entre plates-formes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002023855A2 (fr) * 2000-09-13 2002-03-21 Cosine Communications, Inc. Systeme et procede de prestation de services de securite
US20020053034A1 (en) * 2000-11-01 2002-05-02 Nec Corporation Virtual network and virtual network connection system
KR20090065126A (ko) * 2007-12-17 2009-06-22 한국전자통신연구원 가상 머신 디스크 풀을 이용한 가상 머신 프로비저닝 방법
WO2011080063A1 (fr) * 2009-12-31 2011-07-07 International Business Machines Corporation Portage d'images de machine virtuelle entre plates-formes

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10084807B2 (en) 2015-10-16 2018-09-25 Microsoft Technology Licensing, Llc. Detection of bypass vulnerabilities
CN107205008A (zh) * 2016-03-18 2017-09-26 上海有云信息技术有限公司 云计算环境下web应用防火墙的负载自适应方法
CN107426206A (zh) * 2017-07-17 2017-12-01 北京上元信安技术有限公司 一种对web服务器的防护装置和方法
US11057349B2 (en) 2017-11-03 2021-07-06 Todyl, Inc. Cloud-based multi-function firewall and zero trust private virtual network
CN110035060A (zh) * 2019-03-07 2019-07-19 北京华安普特网络科技有限公司 有效防黑客入侵的Web防火墙

Also Published As

Publication number Publication date
KR101342592B1 (ko) 2013-12-17
KR20130093714A (ko) 2013-08-23

Similar Documents

Publication Publication Date Title
US10554622B2 (en) Secure application delivery system with dial out and associated method
WO2013094847A1 (fr) Appareil et procédé pour un service de pare-feu internet dans un système en nuage
US7254833B1 (en) Electronic security system and scheme for a communications network
US8458786B1 (en) Automated dynamic tunnel management
US7174378B2 (en) Co-location service system equipped with global load balancing (GLB) function among dispersed IDCS
US8959338B2 (en) Remote access manager for virtual computing services
US20230008901A1 (en) Securing containerized applications
WO2020040556A1 (fr) Système et procédé de moissonnage basé sur un navigateur web
WO2015194885A1 (fr) Procédé et système de détection de client à l'origine d'une défaillance, au moyen d'un système de commande de route de client
CN113645213A (zh) 一种基于vpn技术的多终端网络管理监控系统
CN114942826A (zh) 跨网络多集群系统及其访问方法及云计算设备
WO2018008933A1 (fr) Procédé pour fournir un service de cpe virtuel à l'aide d'une seule ligne internet et d'un nuage de virtualisation de fonction de réseau
WO2015102356A1 (fr) Procédé pour autoriser ou bloquer sélectivement du trafic de demande d'accès internet partageant une adresse ip autorisée sur la base d'un temps présent, et système pour détecter un état courant de partage d'adresse ip autorisée et le bloquer de manière à mettre en œuvre ce procédé
CN108880966A (zh) 企业服务总线系统
Amin et al. Edge-computing with graph computation: A novel mechanism to handle network intrusion and address spoofing in SDN
AU2001245048C1 (en) Electronic security system and scheme for a communications network
O'Brien et al. Intrusion tolerance via network layer controls
WO2023286985A1 (fr) Procédé d'authentification d'utilisateur de dispositif de sécurité au moyen de témoins
Lewis Virtual private cloud security
KR102040115B1 (ko) 네트워크 장애처리 자동화 시스템 및 방법
US20230269217A1 (en) Binding flows to unique addresses or ports
CN111314357B (zh) 安全的数据管理系统及其方法
JP7436758B1 (ja) 情報処理システム、情報処理方法および情報処理プログラム
US20230370492A1 (en) Identify and block domains used for nxns-based ddos attack
WO2024071535A1 (fr) Système et procédé de service de passerelle de contrôle d'accès à une base de données basé sur saas

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12859397

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12859397

Country of ref document: EP

Kind code of ref document: A1