[go: up one dir, main page]

CN107528811A - The response method and device of request - Google Patents

The response method and device of request Download PDF

Info

Publication number
CN107528811A
CN107528811A CN201610450731.5A CN201610450731A CN107528811A CN 107528811 A CN107528811 A CN 107528811A CN 201610450731 A CN201610450731 A CN 201610450731A CN 107528811 A CN107528811 A CN 107528811A
Authority
CN
China
Prior art keywords
response information
http response
http
information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610450731.5A
Other languages
Chinese (zh)
Inventor
孔勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610450731.5A priority Critical patent/CN107528811A/en
Priority to PCT/CN2017/079731 priority patent/WO2017219733A1/en
Publication of CN107528811A publication Critical patent/CN107528811A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明提供了一种请求的响应方法及装置,其中,所述方法包括:当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;将经过混扰处理后的HTTP响应信息发送至所述攻击方,采用上述技术方案,解决了相关技术中,防攻击手段总是在攻击发生之后才做出相应的补救措施的问题,进而能够在攻击者发起攻击时,就能够作出相应的补救措施。

The present invention provides a request response method and device, wherein the method includes: when receiving a hypertext transfer protocol HTTP request carrying attack information sent by the attacker, forwarding the HTTP request to the destination server; The target server obtains the HTTP response information corresponding to the HTTP request, and performs scramble processing on the HTTP response information; sends the scrambled HTTP response information to the attacker, and adopts the above technical solution to solve the problem of In related technologies, the anti-attack means always take corresponding remedial measures after an attack occurs, and then can take corresponding remedial measures when an attacker launches an attack.

Description

请求的响应方法及装置Request response method and device

技术领域technical field

本发明涉及通信领域,具体而言,涉及一种请求的响应方法及装置。The present invention relates to the communication field, in particular, to a request response method and device.

背景技术Background technique

在互联网普及率越来越高的今天,生活中网络已经无处不在了。从个人电脑(Personal Computer,简称为PC)时代到移动互联网时代再到将来的物联网时代,网络带来的方便、快捷已然让人们深受其利。然而,不管是广大互联网用户还是IT公司,对网络安全的重视一直未能做到防范于未然,多数情况都是“亡羊补牢”。近年来,针对网络的各种攻击事件频繁发生,给网络安全敲响了警钟,尽管人们采用了各种方法和工具来加强网络通信的安全,但攻击成功的事件数量还是在不断上升。近年来比较“著名”的网络安全事件比如某旅游软件的漏洞事件:安全支付日志可便利下载导致大量用户银行卡信息泄露(包含持卡人姓名身份证、银行卡号、卡CVV码、6位卡Bin)。该漏洞一经曝出就引发了人们关于“电商网站存储用户信用卡等敏感信息,并存在泄露风险”的热议。还有快递1400万信息泄露,交易网站数据的大泄露、500万账户信息被泄、某影业公司的摄影计划、明星隐私、未发表的剧本等敏感信息被窃取、订票网站用户数据泄露含身份证及密码信息等等一系列事件,网络安全的重要性被提升到前所未有的高度。Today, as the penetration rate of the Internet is getting higher and higher, the Internet has become ubiquitous in life. From the era of Personal Computer (PC) to the era of mobile Internet and then to the era of the Internet of Things in the future, the convenience and speed brought by the Internet have already benefited people greatly. However, whether it is the vast number of Internet users or IT companies, the emphasis on network security has not been able to prevent it before it happens, and most of the cases are "remedy". In recent years, various attacks on the network have occurred frequently, which has sounded the alarm for network security. Although people have adopted various methods and tools to strengthen the security of network communication, the number of successful attacks is still increasing. In recent years, the relatively "famous" network security incidents such as the vulnerability incident of a certain travel software: the security payment log can be easily downloaded, resulting in the leakage of a large number of users' bank card information (including the cardholder's name and ID card, bank card number, card CVV code, 6-digit card Bin). As soon as the vulnerability was exposed, it sparked heated discussions about "e-commerce websites store sensitive information such as user credit cards, and there is a risk of leakage". There are also 14 million information leaks in express delivery, large data leaks on trading websites, 5 million account information leaks, a film company’s photography plan, celebrity privacy, unpublished scripts and other sensitive information stolen, booking website user data leaks including With a series of incidents such as ID card and password information, the importance of network security has been raised to an unprecedented height.

目前,网民对涉及财产安全和信息隐私的安全困扰最为关注,其关注前三名分别为网络支付不安全、信息泄露和账号盗取。At present, netizens are most concerned about security troubles involving property security and information privacy, and the top three concerns are insecure online payment, information leakage, and account theft.

由于网络设计之初所具有的开放、互连、共享性,就决定了现在的网络是不安全的,网络频遭各种攻击与破坏。新的攻击手段和方法也越来越多、层出不穷、千变万化。Due to the openness, interconnection, and sharing at the beginning of the network design, it is determined that the current network is not safe, and the network is frequently attacked and destroyed. There are more and more new means and methods of attack, emerge in endlessly, and are ever-changing.

传统的防火墙和入侵检测系统是一种被动的、静态的防卫手段。面对不断出现的新攻击方法,传统的被动防御的手段越来越显得力不从心,常常是系统被攻击之后才做出相应的反应,这样的防御总在攻击发生之后才做出补救措施。Traditional firewalls and intrusion detection systems are passive and static means of defense. In the face of new attack methods that are constantly emerging, traditional passive defense methods are becoming more and more inadequate. Often, the system responds accordingly after the system is attacked. Such defenses always take remedial measures after the attack occurs.

针对相关技术中,防攻击手段总是在攻击发生之后才做出相应的补救措施的问题,尚未提出有效的解决方案。Aiming at the problem in related technologies that the anti-attack means always take corresponding remedial measures after the attack occurs, no effective solution has been proposed yet.

发明内容Contents of the invention

本发明实施例提供了一种请求的响应方法及装置,以至少解决相关技术中防攻击手段总是在攻击发生之后才做出相应的补救措施的问题。Embodiments of the present invention provide a method and device for responding to a request, so as to at least solve the problem in the related art that the anti-attack means always take corresponding remedial measures after the attack occurs.

根据本发明的一个方面,提供了一种请求的响应方法,包括:According to one aspect of the present invention, a method for responding to a request is provided, including:

当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;将经过混扰处理后的HTTP响应信息发送至所述攻击方。When receiving the hypertext transfer protocol HTTP request that the attacker sends and carries the attack information, forward the HTTP request to the destination server; obtain the HTTP response information corresponding to the HTTP request from the destination server, and respond to the HTTP The information is scrambled; and the HTTP response information after the scrambled processing is sent to the attacker.

可选地,对所述HTTP响应信息进行混扰处理之前,所述方法还包括:Optionally, before performing scramble processing on the HTTP response information, the method further includes:

判断所述HTTP请求是否处于混扰处理的作用域内,如果是,对所述HTTP响应信息进行混扰处理。Judging whether the HTTP request is within the scope of scrambling processing, and if so, performing scrambling processing on the HTTP response information.

可选地,对所述HTTP响应信息进行混扰处理,包括:对所述HTTP响应信息的包头和包体进行混扰处理。Optionally, performing scrambling processing on the HTTP response information includes: performing scrambling processing on a packet header and a packet body of the HTTP response information.

可选地,对所述HTTP响应信息的包头和包体进行混扰处理,包括:将预先定义的混扰内容添加至所述HTTP响应信息的包体中;将所述包头信息中的内容长度字段修改为增加了所述混扰内容之后的内容长度。Optionally, performing scrambling processing on the header and body of the HTTP response information includes: adding predefined scrambling content to the packet body of the HTTP response information; adding the content length in the header information to The field is modified to add the content length after the scrambled content.

可选地,所述混扰内容包括:隐藏属性信息、虚假超链接。Optionally, the confusing content includes: hidden attribute information and false hyperlinks.

可选地,所述方法还包括:将日志审计信息备份到基于内存数据库实现的消息队列中。Optionally, the method further includes: backing up the log audit information to a message queue implemented based on an in-memory database.

根据本发明的另一个方面,还提供了一种请求的响应装置,包括:According to another aspect of the present invention, a request response device is also provided, including:

转发模块,用于当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;获取模块,用于从所述目的服务器获取对应所述HTTP请求的HTTP响应信息;混扰处理模块,用于对所述HTTP响应信息进行混扰处理;发送模块,用于将经过混扰处理后的HTTP响应信息发送至所述攻击方。The forwarding module is used to forward the HTTP request to the destination server when receiving the HTTP request carrying the attack information sent by the attacker; the acquisition module is used to obtain the corresponding HTTP request from the destination server. HTTP response information; a scramble processing module, configured to scramble the HTTP response information; and a sending module, configured to send the scrambled HTTP response information to the attacker.

可选地,所述装置还包括:判断模块,用于判断所述HTTP请求是否处于混扰处理的作用域内,如果是,对所述HTTP响应信息进行混扰处理。Optionally, the device further includes: a judging module, configured to judge whether the HTTP request is within the scope of scrambling processing, and if so, perform scrambling processing on the HTTP response information.

可选地,所述混扰处理模块,用于对所述HTTP响应信息的包头和包体进行混扰处理。Optionally, the scrambling processing module is configured to scramble the header and body of the HTTP response information.

可选地,所述混扰处理模块,包括:添加单元,用于将预先定义的混扰内容添加至所述HTTP响应信息的包体中;修改单元,用于将所述包头信息中的内容长度字段修改为增加了所述混扰内容之后的内容长度。Optionally, the scrambling processing module includes: an adding unit, configured to add predefined scrambling content to the packet body of the HTTP response information; a modifying unit, configured to add the content in the header information The length field is modified to be the content length after adding the scrambled content.

通过本发明,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;将经过混扰处理后的HTTP响应信息发送至所述攻击方,采用上述技术方案,解决了相关技术中,防攻击手段总是在攻击发生之后才做出相应的补救措施的问题,进而能够在攻击者发起攻击时,就能够作出相应的补救措施。Through the present invention, when receiving the hypertext transfer protocol HTTP request carrying the attack information sent by the attacker, forward the HTTP request to the destination server; obtain the HTTP response information corresponding to the HTTP request from the destination server, and The HTTP response information is subjected to scrambling processing; the HTTP response information after scrambling processing is sent to the attacker, and the above technical solution is adopted to solve the problem that in related technologies, the anti-attack means are always made after the attack occurs. The problem of corresponding remedial measures, and then can make corresponding remedial measures when the attacker launches an attack.

附图说明Description of drawings

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention and constitute a part of the application. The schematic embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute improper limitations to the present invention. In the attached picture:

图1为根据本发明实施例的请求的响应方法的流程图;Fig. 1 is the flowchart of the request response method according to the embodiment of the present invention;

图2是根据本发明实施例的请求的响应装置的结构框图;Fig. 2 is a structural block diagram of a device for responding to a request according to an embodiment of the present invention;

图3是根据本发明实施例的请求的响应装置的另一结构框图;FIG. 3 is another structural block diagram of a device for responding to a request according to an embodiment of the present invention;

图4为根据本发明实施例的网络拓扑关系图;FIG. 4 is a network topology diagram according to an embodiment of the present invention;

图5为根据本发明实施例的安全网关执行流程图。Fig. 5 is a flow chart of the execution of the security gateway according to the embodiment of the present invention.

具体实施方式detailed description

下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

实施例1Example 1

在本发明实施例中,提供了一种请求的响应方法,图1为根据本发明实施例的请求的响应方法的流程图,如图1所示,包括以下步骤:In an embodiment of the present invention, a method for responding to a request is provided. FIG. 1 is a flowchart of a method for responding to a request according to an embodiment of the present invention. As shown in FIG. 1 , it includes the following steps:

步骤S102,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;Step S102, when receiving a Hypertext Transfer Protocol HTTP request carrying attack information sent by the attacker, forwarding the HTTP request to the destination server;

步骤S104,从目的服务器获取对应HTTP请求的HTTP响应信息,对HTTP响应信息进行混扰处理;Step S104, obtaining HTTP response information corresponding to the HTTP request from the destination server, and performing scramble processing on the HTTP response information;

步骤S106,将经过混扰处理后的HTTP响应信息发送至攻击方。Step S106, sending the HTTP response information after the obfuscation processing to the attacker.

通过上述各个步骤,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;将经过混扰处理后的HTTP响应信息发送至所述攻击方,采用上述技术方案,解决了相关技术中,防攻击手段总是在攻击发生之后才做出相应的补救措施的问题,进而能够在攻击者发起攻击时,就能够作出相应的补救措施,大大提升了WEB网页的可靠性。Through the above-mentioned steps, when receiving the hypertext transfer protocol HTTP request that the attacker sends and carries the attack information, forward the HTTP request to the destination server; obtain the HTTP response information corresponding to the HTTP request from the destination server, Perform scramble processing on the HTTP response information; send the scrambled HTTP response information to the attacker, and adopt the above technical solution to solve the problem that in related technologies, the anti-attack means are always performed after the attack occurs. Therefore, when the attacker launches an attack, corresponding remedial measures can be taken, which greatly improves the reliability of the WEB page.

在执行步骤S104之前,在本发明实施例中,还可以执行以下方案:判断HTTP请求是否处于混扰处理的作用域内,如果是,对HTTP响应信息进行混扰处理,实际上,混扰处理的作用域包含哪些是需要提前配置好的,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,就可以判断该HTTP请求是否位于作用域内。Before executing step S104, in the embodiment of the present invention, the following scheme can also be executed: determine whether the HTTP request is within the scope of scrambling processing, if so, perform scrambling processing on the HTTP response information, in fact, the scrambling processing What the scope includes needs to be configured in advance. When receiving a Hypertext Transfer Protocol HTTP request carrying attack information sent by the attacker, it can be judged whether the HTTP request is within the scope.

在一个可选实施例中,步骤S104的混扰处理可以通过以下方案实现:对HTTP响应信息的包头和包体进行混扰处理,具体地,将预先定义的混扰内容添加至HTTP响应信息的包体中;将包头信息中的内容长度字段修改为增加了混扰内容之后的内容长度,其中,混扰内容包括:隐藏属性信息、虚假超链接。In an optional embodiment, the scrambling processing in step S104 can be implemented through the following scheme: performing scrambling processing on the header and body of the HTTP response information, specifically, adding predefined scrambling content to the HTTP response information In the package body: modify the content length field in the header information to the content length after adding the scrambled content, wherein the scrambled content includes: hidden attribute information and false hyperlinks.

可选地,上述方法还包括:将日志审计信息备份到基于内存数据库实现的消息队列中。Optionally, the above method further includes: backing up log audit information to a message queue implemented based on a memory database.

通过本发明实施例的上述技术方案,即在攻击发生之前收集Web应用网站结构信息和敏感页面时给攻击者返回添加了混扰内容的信息;在攻击发生之后隐蔽地完成对攻击现场的异地备份。对攻击者进行诱导和迷惑,增加其攻击成本和时间,且有效地防止了服务器信息的泄露。Through the above-mentioned technical solution of the embodiment of the present invention, that is, when collecting the structure information of the Web application website and sensitive pages before the attack occurs, the attacker returns the information with added garbled content; after the attack occurs, the off-site backup of the attack site is covertly completed . Induce and confuse attackers, increase their attack cost and time, and effectively prevent the leakage of server information.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is Better implementation. Based on such an understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products are stored in a storage medium (such as ROM/RAM, disk, CD) contains several instructions to make a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) execute the method of each embodiment of the present invention.

实施例2Example 2

在本实施例中还提供了一种请求的响应装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”是可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, a device for responding to a request is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated here. As used below, the term "module" is a combination of software and/or hardware that can realize a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

图2是根据本发明实施例的请求的响应装置的结构框图,如图2所示,该装置包括:Fig. 2 is a structural block diagram of a device for responding to a request according to an embodiment of the present invention. As shown in Fig. 2, the device includes:

转发模块20,用于当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;The forwarding module 20 is used to forward the HTTP request to the destination server when receiving the Hypertext Transfer Protocol HTTP request that the attacker sends and carries the attack information;

获取模块22,用于从目的服务器获取对应HTTP请求的HTTP响应信息;An acquisition module 22, configured to acquire HTTP response information corresponding to the HTTP request from the destination server;

混扰处理模块24,用于对HTTP响应信息进行混扰处理;The scrambling processing module 24 is used to scramble the HTTP response information;

发送模块26,用于将经过混扰处理后的HTTP响应信息发送至攻击方。The sending module 26 is configured to send the HTTP response information after the scramble processing to the attacker.

通过上述各个模块的综合作用,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;将经过混扰处理后的HTTP响应信息发送至所述攻击方,采用上述技术方案,解决了相关技术中,防攻击手段总是在攻击发生之后才做出相应的补救措施的问题,进而能够在攻击者发起攻击时,就能够作出相应的补救措施,大大提升了WEB网页的可靠性。Through the comprehensive function of the above-mentioned various modules, when receiving the hypertext transfer protocol HTTP request that the attacker sends and carries the attack information, the HTTP request is forwarded to the destination server; the HTTP request corresponding to the HTTP request is obtained from the destination server. Response information, performing scrambling processing on the HTTP response information; sending the HTTP response information after scrambling processing to the attacking party, adopting the above technical solution, solving the problem that in related technologies, the anti-attack means are always in the event of an attack Afterwards, corresponding remedial measures are taken, and then when the attacker launches an attack, corresponding remedial measures can be taken, which greatly improves the reliability of the WEB page.

图3是根据本发明实施例的请求的响应装置的另一结构框图,如图3所示,该装置包括:Fig. 3 is another structural block diagram of a device for responding to a request according to an embodiment of the present invention. As shown in Fig. 3 , the device includes:

判断模块28,用于判断HTTP请求是否处于混扰处理的作用域内,如果是,对HTTP响应信息进行混扰处理。The judging module 28 is used to judge whether the HTTP request is within the scope of scrambling processing, and if so, perform scrambling processing on the HTTP response information.

可选地,混扰处理模块24,用于对HTTP响应信息的包头和包体进行混扰处理,如图3所示,混扰处理模块24,包括:添加单元240,用于将预先定义的混扰内容添加至HTTP响应信息的包体中;修改单元242,用于将包头信息中的内容长度字段修改为增加了混扰内容之后的内容长度。Optionally, the scrambling processing module 24 is configured to scramble the header and body of the HTTP response information. As shown in FIG. 3 , the scrambling processing module 24 includes: an adding unit 240, which The scrambled content is added to the packet body of the HTTP response information; the modifying unit 242 is configured to modify the content length field in the header information to the content length after adding the scrambled content.

需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。It should be noted that each of the above-mentioned modules can be implemented by software or hardware. For the latter, it can be implemented in the following manner, but not limited to this: the above-mentioned modules are all located in the same processor; or, the above-mentioned modules can be combined in any combination The forms of are located in different processors.

为了更好的理解上述请求的响应过程,以下结合优选实施例进行说明,但不用于限定本发明实施例。In order to better understand the response process of the above request, the following description will be made in conjunction with preferred embodiments, but not intended to limit the embodiments of the present invention.

本发明优选实施例的目的在于提供一种网页内容混扰和日志审计信息备份方法,能够对HTTP响应内容和Web服务器日志审计信息进行主动性的防御处理,主要包括以下步骤:The purpose of the preferred embodiments of the present invention is to provide a method for backing up webpage content confusion and log audit information, which can actively prevent HTTP response content and Web server log audit information, and mainly includes the following steps:

步骤1:在Web服务器与用户之间搭建一个反向代理服务器(如图4所示),该反向代理服务器基于Nginx实现;在反向代理服务器上实现消息转发和路由规则,之后用户和Web服务器之间的消息传递都经由反向代理服务器处理和转发,而对于用户和服务器来说反向代理服务器是透明不可见的;Step 1: set up a reverse proxy server (as shown in Figure 4) between Web server and user, this reverse proxy server realizes based on Nginx; Realize message forwarding and routing rule on reverse proxy server, user and Web afterwards Messages between servers are processed and forwarded by the reverse proxy server, and the reverse proxy server is transparent and invisible to users and servers;

步骤2:在反向代理服务器上配置基于Nginx的功能模块,包括HTTP响应内容混扰模块和服务器日志审计信息备份模块两个部分,这两个模块在微观上是串行执行的,即在HTTP响应内容混扰模块生效之后,服务器日志审计信息备份模块再对服务器日志审计信息进行处理,处理流程如附图2所示;修改配置文件,确定作用域(所有HTTP请求、所有Web服务器响应请求或者指定URI等)、功能模块及执行指令;完成编译安装;功能模块添加完成之后,重新启动反向代理服务器,让功能模块生效;Step 2: Configure Nginx-based functional modules on the reverse proxy server, including HTTP response content confusion module and server log audit information backup module. After the response content confusion module takes effect, the server log audit information backup module processes the server log audit information again, and the processing flow is shown in Figure 2; modify the configuration file to determine the scope (all HTTP requests, all Web server response requests or Specify URI, etc.), functional modules and execution instructions; complete the compilation and installation; after the functional modules are added, restart the reverse proxy server to make the functional modules take effect;

步骤3:攻击者向服务器发起请求或使用漏洞扫描工具进行嗅探或攻击,HTTP请求发送到反向代理服务器;反向代理服务器获取请求内容,将请求转发给上游服务器;上游服务器根据HTTP请求构造响应内容,包括响应包头和包体,发送给反向代理服务器;Step 3: The attacker initiates a request to the server or uses a vulnerability scanning tool to sniff or attack, and the HTTP request is sent to the reverse proxy server; the reverse proxy server obtains the content of the request and forwards the request to the upstream server; the upstream server constructs the request based on the HTTP request The response content, including the response header and body, is sent to the reverse proxy server;

步骤4:反向代理服务器上的网页内容混扰模块获取HTTP响应包内容,完成HTTP响应内容混扰,该步骤通过以下子步骤来实现:Step 4: The web page content scrambling module on the reverse proxy server obtains the content of the HTTP response packet, and completes the content scrambling of the HTTP response. This step is realized through the following sub-steps:

(4.1)查看服务器配置文件,确定此次请求是否在内容混扰模块作用域内,如果不在,跳到步骤6;(4.1) Check the server configuration file to determine whether the request is within the scope of the content disturbance module, if not, skip to step 6;

(4.2)如果此次请求在此模块作用域内,则启动内容混扰模块,将此请求交由此模块处理;(4.2) If the request is within the scope of this module, start the content scrambling module and hand over the request to this module for processing;

(4.3)内容混扰模块首先读取配置文件中的配置项,即指定的添加混扰内容的配置开关是否打开;然后检索并处理HTTP响应包头和包体,完成内容混扰功能,此步骤分为以下几个子步骤,如图5所示:(4.3) The content scrambling module first reads the configuration items in the configuration file, that is, whether the specified configuration switch for adding scrambled content is turned on; then retrieves and processes the HTTP response header and body to complete the content scrambling function. This step is divided into It is the following sub-steps, as shown in Figure 5:

需要说明的是,图5中的步骤描述仅用来解释说明一下步骤(4.3.1)至步骤6,但不用来限定本发明实施例,图5也可以理解为是对步骤S4.3中内容混扰功能的具体实现流程。It should be noted that the step description in Figure 5 is only used to explain step (4.3.1) to step 6, but not to limit the embodiment of the present invention, and Figure 5 can also be understood as the content of step S4.3 The specific implementation process of the confusion function.

(4.3.1)解析HTTP响应头部中的信息,判断Content Type是否为text/plain;如果是,将此模块上下文信息中的配置项ctx->add_prefix设为1;如果不是,则跳转到步骤5;此处只对网页HTML内容做处理,如果对其他格式的响应比如图片文件、CSS格式文件做处理,会导致图片和CSS格式文件无法被正常解析;(4.3.1) Analyze the information in the HTTP response header to determine whether the Content Type is text/plain; if yes, set the configuration item ctx->add_prefix in the context information of this module to 1; if not, jump to Step 5: Only the HTML content of the web page is processed here. If responses in other formats such as image files and CSS format files are processed, the image and CSS format files will not be parsed normally;

(4.3.2)修改HTTP响应头部信息中的content length字段,在原来的基础上加上混扰内容的长度,确保HTTP响应体完整;(4.3.2) Modify the content length field in the HTTP response header information, and add the length of the scrambled content on the original basis to ensure that the HTTP response body is complete;

(4.3.3)在HTTP包体处理过程中,完成添加混扰内容;此步骤包括以下几个子步骤:(4.3.3) During the processing of the HTTP packet body, the addition of garbled content is completed; this step includes the following sub-steps:

(4.3.3.1)定义要添加的混扰内容,混扰内容包括隐藏属性、若干虚假超链接,每个超链接又指向虚假的URL。添加隐藏属性是为了不影响正常用户浏览网站,虚假链接的访问响应内容依然会经过内容混扰处理,故Web扫描器将陷入虚假连接的死循环中,无法获取真实有效的网站结构和敏感页面信息。混扰内容简略如下所示:(4.3.3.1) Define the obfuscated content to be added, the obfuscated content includes hidden attributes, several false hyperlinks, and each hyperlink points to a false URL. The purpose of adding hidden attributes is to prevent normal users from browsing the website. The access response content of false links will still be processed by content scrambling, so the web scanner will fall into an infinite loop of false connections and cannot obtain real and effective website structure and sensitive page information. . The content of the confusion is briefly as follows:

static ngx_str_t filter_prefix=ngx_string("<div style='display:none;'><p>'Can you come to-morrow?'<a href='base.php?rub='>Traffic Analysisfor</a>unpardonable in me.'<a href='buy'>Your password is*Remember this forlater use</a>Elizabeth felt herself completely taken in.She had fullyproposed being<a href='view.php?b='>appSettings</a>upon yourself alone.'<ahref='freedownload.asp?bookid='>Warning:*am able*write**configuration file</a>attending it,and occasionally from some peevish allusions of her<a href='index2.php?p='>Most Submitted Forms and Scripts</a>very tender affectionfor Bingley.Having never even fancied herself<a href='config.php?_CCFG[_PKG_PATH_DBSE]='>This summary was generated by wwwstat</a>tears and lamentationsof regret,invectives against the villainous<a href='path.php?pre='>WebSTARMail-Please Log In</a>her,after his return from</p></div>");static ngx_str_t filter_prefix=ngx_string("<div style='display:none;'><p>'Can you come to-morrow?'<a href='base.php? rub='>Traffic Analysis for</a>unpardonable in me.'<a href='buy'>Your password is*Remember this for later use</a>Elizabeth felt herself completely taken in. She had fully proposed being<a href='view.php?b='>appSettings< /a>upon yourself alone.'<ahref='freedownload.asp?bookid='>Warning: *am able*write**configuration file</a>attending it, and occasionally from some peevish allusions of her<a href= 'index2.php?p='>Most Submitted Forms and Scripts</a>very tender affectionfor Bingley.Having never even fancied herself<a href='config.php?_CCFG[_PKG_PATH_DBSE]='>This summary was generated by wwwstat </a>tears and lamentations of regret, invectives against the villainous<a href='path.php?pre='>WebSTARMail-Please Log In</a>her, after his return from</p></div>" );

(4.3.3.2)查看上下文中的add_prefix是否为1,如果为1表示需要进行处理,否则跳到步骤5;(4.3.3.2) Check whether the add_prefix in the context is 1, if it is 1, it means that it needs to be processed, otherwise skip to step 5;

(4.3.3.3)将上下文信息中的add_prefix设为2,表明已经处理过,防止重复处理;(4.3.3.3) Set the add_prefix in the context information to 2, indicating that it has been processed to prevent repeated processing;

(4.3.3.4)从内存池中生成ngx_chain_t链表,将上一步定义的混扰内容添加到链表的头部,即添加到HTTP响应包体的头部;(4.3.3.4) Generate the ngx_chain_t linked list from the memory pool, and add the disturbing content defined in the previous step to the head of the linked list, that is, to the header of the HTTP response packet body;

步骤5:反向代理服务器上的日志审计信息备份模块将自定义格式的消息写入基于内存数据库redis实现的消息队列中并实现异地读取,完成日志审计信息异地备份读取,该步骤通过以下子步骤来实现:Step 5: The log audit information backup module on the reverse proxy server writes messages in a custom format into the message queue based on the memory database redis and realizes off-site reading, and completes off-site backup and reading of log audit information. This step is through the following steps Substeps to achieve:

(5.1)将redis嵌入Nginx模块中,安装redis和redis的C语言客户端到反向代理服务器;(5.1) Redis is embedded in the Nginx module, and the C language client of redis and redis is installed to the reverse proxy server;

(5.2)在日志审计信息备份模块完成redis连接初始化工作,通过PING心跳连接确保连接成功;如果连接不成功,进行出错处理,跳到步骤6;(5.2) Complete the redis connection initialization work in the log audit information backup module, and ensure that the connection is successful through the PING heartbeat connection; if the connection is unsuccessful, perform error handling and skip to step 6;

(5.3)创建消息队列,确定消息队列名称,不同的模块具有不同的消息队列,更方便读取时的分类和统计;(5.3) Create a message queue and determine the name of the message queue. Different modules have different message queues, which are more convenient for classification and statistics when reading;

(5.4)将需要存储的现场信息进行格式化,然后通过redisCommand命令写入到上一步创建的消息队列中,采用list的数据格式;(5.4) Format the on-site information that needs to be stored, and then write it into the message queue created in the previous step through the redisCommand command, using the data format of list;

(5.5)现场信息存储完毕之后关闭redis连接,按照HTTP框架中的顺序执行将HTTP响应包头和包体转发给下一个HTTP过滤模块;(5.5) Close the redis connection after the on-site information is stored, and forward the HTTP response packet header and packet body to the next HTTP filtering module according to the sequence in the HTTP frame;

(5.6)现场信息已经存入日志审计信息备份模块中的消息队列,接下来完成现场信息的读取。读取方式可以是多次读取和一次性消费,取决于消费方如邮件服务、短信服务、日志备份服务等不同的需求。此步骤分为以下几个子步骤:(5.6) The on-site information has been stored in the message queue in the log audit information backup module, and then the reading of the on-site information is completed. The reading method can be multiple reading or one-time consumption, depending on the different needs of consumers such as mail service, SMS service, and log backup service. This step is divided into the following substeps:

(5.6.1)在本地客户端的PHP中安装phpredis扩展,也可以根据本地服务器所采用的语言类型安装相应的redis扩展,例如Java、C#等等;(5.6.1) Install the phpredis extension in the PHP of the local client, or install the corresponding redis extension according to the language type used by the local server, such as Java, C#, etc.;

(5.6.2)初始化redis连接,主机地址为反向代理服务器所在的IP地址,使用PING命令确保连接成功;(5.6.2) Initialize the redis connection, the host address is the IP address where the reverse proxy server is located, and use the PING command to ensure that the connection is successful;

(5.6.3)指定需要读取的消息队列名称,即为步骤5.3中指定的队列名称,设定读取方式之后读取现场信息,可以单条读取也可设定读取区间进行批量读取,可以看到现场信息在反向代理服务器中也得到了完整的保存;(5.6.3) Specify the name of the message queue to be read, which is the name of the queue specified in step 5.3. After setting the reading method, read the field information. You can read a single message or set the reading interval for batch reading , it can be seen that the site information has also been completely saved in the reverse proxy server;

步骤6:将HTTP响应包头和响应包体发送给用户,客户端收到的是经过内容混扰和日志审计信息备份模块处理过的响应消息,从而实现内容混扰和日志审计信息备份,达到有效保护服务器信息的目的。Step 6: Send the HTTP response packet header and response packet body to the user, and the client receives the response message processed by the content scrambling and log audit information backup module, so as to realize content scrambling and log audit information backup, and achieve effective Purpose of protecting server information.

本发明实施例达到了以下技术效果:在攻击者扫描Web应用网站结构、敏感页面信息时实现返回信息混扰,混淆攻击者获取的有效信息,增加攻击者的探测扫描成本。在攻击者通过漏洞完成攻击之后,也可以通过日志审计信息备份对攻击者发起攻击的现场信息进行隐蔽性的异地备份,防止现场信息被破坏。本发明与传统Web安全防御相比,既可以在攻击发生之前混淆攻击者的视听,也可以在攻击完成之后保存攻击现场信息,而且可灵活配置,面向正常用户透明,具有良好的可扩展性、可移植性。The embodiment of the present invention achieves the following technical effects: when the attacker scans the structure of the Web application website and sensitive page information, the return information is confused, the effective information obtained by the attacker is confused, and the detection and scanning cost of the attacker is increased. After the attacker completes the attack through the vulnerability, the on-site information of the attacker's attack can also be hidden and off-site backup through log audit information backup to prevent the on-site information from being destroyed. Compared with the traditional Web security defense, the present invention can confuse the attacker's audiovisual before the attack occurs, and can also save the attack scene information after the attack is completed, and can be flexibly configured, transparent to normal users, and has good scalability, portability.

本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for performing the following steps:

S1,当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;S1, when receiving a hypertext transfer protocol HTTP request carrying attack information sent by the attacker, forward the HTTP request to the destination server;

S2,从目的服务器获取对应HTTP请求的HTTP响应信息,对HTTP响应信息进行混扰处理;S2, obtaining HTTP response information corresponding to the HTTP request from the destination server, and performing scramble processing on the HTTP response information;

S3,将经过混扰处理后的HTTP响应信息发送至攻击方。S3, sending the scrambled HTTP response information to the attacker.

可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk Various media that can store program codes such as discs or optical discs.

可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。Optionally, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementation manners, and details are not repeated in this embodiment.

显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Obviously, those skilled in the art should understand that each module or each step of the above-mentioned present invention can be realized by a general-purpose computing device, and they can be concentrated on a single computing device, or distributed in a network formed by multiple computing devices Alternatively, they may be implemented in program code executable by a computing device so that they may be stored in a storage device to be executed by a computing device, and in some cases, in an order different from that shown here The steps shown or described are carried out, or they are separately fabricated into individual integrated circuit modules, or multiple modules or steps among them are fabricated into a single integrated circuit module for implementation. As such, the present invention is not limited to any specific combination of hardware and software.

以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and changes. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.

Claims (10)

1.一种请求的响应方法,其特征在于,包括:1. A requesting response method, characterized in that, comprising: 当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;When receiving the Hypertext Transfer Protocol HTTP request carrying the attack information sent by the attacker, forward the HTTP request to the destination server; 从所述目的服务器获取对应所述HTTP请求的HTTP响应信息,对所述HTTP响应信息进行混扰处理;Obtaining HTTP response information corresponding to the HTTP request from the destination server, and performing scramble processing on the HTTP response information; 将经过混扰处理后的HTTP响应信息发送至所述攻击方。Send the HTTP response information after the scramble processing to the attacking party. 2.根据权利要求1所述的方法,其特征在于,对所述HTTP响应信息进行混扰处理之前,所述方法还包括:2. The method according to claim 1, wherein, before performing scramble processing on the HTTP response information, the method further comprises: 判断所述HTTP请求是否处于混扰处理的作用域内,如果是,对所述HTTP响应信息进行混扰处理。Judging whether the HTTP request is within the scope of scrambling processing, and if so, performing scrambling processing on the HTTP response information. 3.根据权利要求1所述的方法,其特征在于,对所述HTTP响应信息进行混扰处理,包括:3. The method according to claim 1, characterized in that scrambling the HTTP response information includes: 对所述HTTP响应信息的包头和包体进行混扰处理。Perform scrambling processing on the packet header and packet body of the HTTP response information. 4.根据权利要求3所述的方法,其特征在于,对所述HTTP响应信息的包头和包体进行混扰处理,包括:4. The method according to claim 3, characterized in that scrambling the header and the body of the HTTP response information includes: 将预先定义的混扰内容添加至所述HTTP响应信息的包体中;Adding predefined confusing content to the packet body of the HTTP response information; 将所述包头信息中的内容长度字段修改为增加了所述混扰内容之后的内容长度。Modifying the content length field in the header information to the content length after adding the scrambled content. 5.根据权利要求4所述的方法,其特征在于,所述混扰内容包括:隐藏属性信息、虚假超链接。5 . The method according to claim 4 , wherein the garbled content includes: hidden attribute information and false hyperlinks. 6.根据权利要求1所述的方法,其特征在于,所述方法还包括:6. The method according to claim 1, further comprising: 将日志审计信息备份到基于内存数据库实现的消息队列中。Back up the log audit information to the message queue implemented based on the memory database. 7.一种请求的响应装置,其特征在于,包括:7. A device for responding to a request, comprising: 转发模块,用于当接收到攻击方发送的携带有攻击信息的超文本传输协议HTTP请求时,将该HTTP请求转发至目的服务器;The forwarding module is used to forward the HTTP request to the destination server when receiving the Hypertext Transfer Protocol HTTP request carrying the attack information sent by the attacker; 获取模块,用于从所述目的服务器获取对应所述HTTP请求的HTTP响应信息;An acquisition module, configured to acquire HTTP response information corresponding to the HTTP request from the destination server; 混扰处理模块,用于对所述HTTP响应信息进行混扰处理;A scrambling processing module, configured to scramble the HTTP response information; 发送模块,用于将经过混扰处理后的HTTP响应信息发送至所述攻击方。A sending module, configured to send the scrambled HTTP response information to the attacker. 8.根据权利要求7所述的装置,其特征在于,所述装置还包括:8. The device according to claim 7, further comprising: 判断模块,用于判断所述HTTP请求是否处于混扰处理的作用域内,如果是,对所述HTTP响应信息进行混扰处理。A judging module, configured to judge whether the HTTP request is within the scope of scrambling processing, and if so, perform scrambling processing on the HTTP response information. 9.根据权利要求7所述的装置,其特征在于,所述混扰处理模块,用于对所述HTTP响应信息的包头和包体进行混扰处理。9. The device according to claim 7, wherein the scrambling processing module is configured to perform scrambling processing on the header and body of the HTTP response information. 10.根据权利要求9所述的装置,其特征在于,所述混扰处理模块,包括:10. The device according to claim 9, wherein the disturbance processing module comprises: 添加单元,用于将预先定义的混扰内容添加至所述HTTP响应信息的包体中;an adding unit, configured to add predefined garbled content to the packet body of the HTTP response information; 修改单元,用于将所述包头信息中的内容长度字段修改为增加了所述混扰内容之后的内容长度。A modifying unit, configured to modify the content length field in the header information to the content length after adding the scrambled content.
CN201610450731.5A 2016-06-21 2016-06-21 The response method and device of request Withdrawn CN107528811A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610450731.5A CN107528811A (en) 2016-06-21 2016-06-21 The response method and device of request
PCT/CN2017/079731 WO2017219733A1 (en) 2016-06-21 2017-04-07 Method and device for responding to request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610450731.5A CN107528811A (en) 2016-06-21 2016-06-21 The response method and device of request

Publications (1)

Publication Number Publication Date
CN107528811A true CN107528811A (en) 2017-12-29

Family

ID=60735032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610450731.5A Withdrawn CN107528811A (en) 2016-06-21 2016-06-21 The response method and device of request

Country Status (2)

Country Link
CN (1) CN107528811A (en)
WO (1) WO2017219733A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109672744A (en) * 2018-12-28 2019-04-23 中电福富信息科技有限公司 A kind of image fort machine method and system of user's unaware
CN109756501A (en) * 2019-01-02 2019-05-14 中国科学院信息工程研究所 A method and system for a high-secrecy network proxy based on HTTP protocol
CN111083066A (en) * 2018-10-19 2020-04-28 北京奇虎科技有限公司 Internet of things system, device message flow method and device
CN113542302A (en) * 2021-08-02 2021-10-22 北京知道创宇信息技术股份有限公司 Attack interference method, device, gateway and readable storage medium
CN119360161A (en) * 2024-10-24 2025-01-24 重庆邮电大学 A black-box adversarial robustness evaluation method based on image classification model

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878472A (en) * 2017-04-20 2017-06-20 广东马良行科技发展有限公司 A kind of distributed type assemblies data service method and system
CN112153001B (en) * 2020-08-21 2023-06-23 杭州安恒信息技术股份有限公司 WAF-based network communication method, system, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304418A (en) * 2007-05-09 2008-11-12 赛门铁克公司 Client side protection against drive-by pharming via referrer checking
US20110138453A1 (en) * 2009-12-03 2011-06-09 Samsung Electronics Co., Ltd. Single sign-on in mixed http and sip environments
US9055100B2 (en) * 2013-04-06 2015-06-09 Citrix Systems, Inc. Systems and methods for HTTP-Body DoS attack prevention with adaptive timeout
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN105354269A (en) * 2015-10-27 2016-02-24 中通服公众信息产业股份有限公司 Reverse proxy and content filtering based Web application language localization method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE540515T1 (en) * 2006-04-13 2012-01-15 Art Of Defence Gmbh METHOD FOR PROVIDING WEB APPLICATION SECURITY
CN104135507B (en) * 2014-06-30 2018-01-16 北京奇艺世纪科技有限公司 A kind of method and apparatus of door chain
CN104378363B (en) * 2014-10-30 2017-09-15 中国科学院信息工程研究所 A kind of dynamic application address conversion method and its gateway system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304418A (en) * 2007-05-09 2008-11-12 赛门铁克公司 Client side protection against drive-by pharming via referrer checking
US20110138453A1 (en) * 2009-12-03 2011-06-09 Samsung Electronics Co., Ltd. Single sign-on in mixed http and sip environments
US9055100B2 (en) * 2013-04-06 2015-06-09 Citrix Systems, Inc. Systems and methods for HTTP-Body DoS attack prevention with adaptive timeout
CN104994104A (en) * 2015-07-06 2015-10-21 浙江大学 Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
CN105354269A (en) * 2015-10-27 2016-02-24 中通服公众信息产业股份有限公司 Reverse proxy and content filtering based Web application language localization method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083066A (en) * 2018-10-19 2020-04-28 北京奇虎科技有限公司 Internet of things system, device message flow method and device
CN109672744A (en) * 2018-12-28 2019-04-23 中电福富信息科技有限公司 A kind of image fort machine method and system of user's unaware
CN109756501A (en) * 2019-01-02 2019-05-14 中国科学院信息工程研究所 A method and system for a high-secrecy network proxy based on HTTP protocol
CN113542302A (en) * 2021-08-02 2021-10-22 北京知道创宇信息技术股份有限公司 Attack interference method, device, gateway and readable storage medium
CN113542302B (en) * 2021-08-02 2023-05-02 北京知道创宇信息技术股份有限公司 Attack interference method, device, gateway and readable storage medium
CN119360161A (en) * 2024-10-24 2025-01-24 重庆邮电大学 A black-box adversarial robustness evaluation method based on image classification model

Also Published As

Publication number Publication date
WO2017219733A1 (en) 2017-12-28

Similar Documents

Publication Publication Date Title
Senol et al. Leaky forms: A study of email and password exfiltration before form submission
CN107528811A (en) The response method and device of request
Bujlow et al. A survey on web tracking: Mechanisms, implications, and defenses
ES2679286T3 (en) Distinguish valid users of robots, OCR and third-party solvers when CAPTCHA is presented
Starov et al. Are you sure you want to contact us? quantifying the leakage of pii via website contact forms
JP5801437B2 (en) Phishing notification service
ES2728292T3 (en) Server and method to provide secure access to network-based services
US20180183749A1 (en) Automated message security scanner detection system
US20180084003A1 (en) Method and system for injecting javascript into a web page
CN102158493B (en) A kind of Cookie analytic method, device and a kind of client
CN104994104B (en) Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateways
Bujlow et al. Web tracking: Mechanisms, implications, and defenses
US11503072B2 (en) Identifying, reporting and mitigating unauthorized use of web code
WO2012047432A2 (en) Cross-site scripting prevention in dynamic content
Chaudhary et al. Auditing defense against XSS worms in online social network-based web applications
US20190222587A1 (en) System and method for detection of attacks in a computer network using deception elements
Focardi et al. Security threats and solutions for two-dimensional barcodes: a comparative study
US20130160132A1 (en) Cross-site request forgery protection
CN102780682B (en) Website behavior model modeling method based on HTML (Hyper Text Markup Language)
CN103023869B (en) Malicious attack prevention method and browser
Choudhary et al. Comparative analysis of mobile phishing detection and prevention approaches
CN105550596A (en) Access processing method and apparatus
CN102932353B (en) A kind of method and apparatus preventing malicious attack
Wedman et al. An analytical study of web application session management mechanisms and HTTP session hijacking attacks
CN117040804A (en) Network attack detection method, device, equipment, medium and program product for website

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20171229

WW01 Invention patent application withdrawn after publication