CN102111267A - Website safety protection method based on digital signature and system adopting same - Google Patents

Website safety protection method based on digital signature and system adopting same Download PDF

Info

Publication number
CN102111267A
CN102111267A CN2009102442513A CN200910244251A CN102111267A CN 102111267 A CN102111267 A CN 102111267A CN 2009102442513 A CN2009102442513 A CN 2009102442513A CN 200910244251 A CN200910244251 A CN 200910244251A CN 102111267 A CN102111267 A CN 102111267A
Authority
CN
China
Prior art keywords
webpage
web
page
web page
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009102442513A
Other languages
Chinese (zh)
Inventor
赵晨
辛阳
杜晓峰
包一兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING SAFE-CODE TECHNOLOGY Co Ltd
Original Assignee
BEIJING SAFE-CODE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING SAFE-CODE TECHNOLOGY Co Ltd filed Critical BEIJING SAFE-CODE TECHNOLOGY Co Ltd
Priority to CN2009102442513A priority Critical patent/CN102111267A/en
Publication of CN102111267A publication Critical patent/CN102111267A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a website safety protection method based on digital signature. The method comprises the steps as follows: staticizing a dynamic Web page in a website; inserting a hidden digital signature into the Web page; and detecting the digital signature through a set mechanism to identify whether the Web page is maliciously falsified or deleted, so as to further conduct safe operation. The invention solves the problems in the prior art that the initiative defense capability of the website is not strong enough, and the Web page downloaded to the other environment has no signature protection function. The invention discloses a system for protecting website safety at the same time.

Description

A kind of web portal security guard method and system based on digital signature
Technical field
The present invention relates to network security technology, particularly a kind of method and system of protecting web portal security.
Background technology
Web page contents is illegally distorted by means such as SQL injection, cross-site scripting attack invasion WEB server in the hacker website, influences the expansion of enterprises and institutions' regular traffic, infringement enterprises and institutions reputation; Or the implantation malicious code, make domestic consumer when access websites, be implanted wooden horse and virus automatically, and then cause system crash or confidential information to be stolen by the attacker.
Existing WEB website security precautions technology is mainly reflected in strengthening system defense function aspect.The installation system patch is changed more high-intensity password and password; And often risk assessment is carried out in the website, in time find the various leaks on the webpage.
A kind of method relatively more commonly used at present is to use WEB application safety scanning system.Its workflow as shown in Figure 1.It uses the leak feature database with the Web that sets up based on the 10 big vulnerability classification of OWASP is foundation, and topology traversal and web page code analysis are carried out in the Web website, finds out the type and the flag data that may become target of attack in the page.And be associated with the leak feature database, obtain the relevant vulnerability type, take this as a foundation then and construct attack test message targetedly, the enforcement analog detection is attacked, find out the security breaches that exist in application development code and the Web operational system, for developer's code optimization, gerentocratic security configuration and security expert's safety analysis provides report.
Yet this technology belongs to the Passive Defence technology, focuses on searching the website leak, strengthens the defense function of network, and for the attack detecting of having invaded can't real-time high-efficiency discovery and take corresponding mean of defense.
Also some website uses digital signature to differentiate whether webpage is distorted, and confirms whether the website is under attack.As shown in Figure 2.For the webpage that needs protection, uploading when being distributed to extraneous INTERNET, be that it generates the digital signature E that encrypts KRs(h).These digital signature are organized as chained list with the form of two tuples deposit in the internal memory place of safety, the keeper at every turn more new web page recomputate digital signature and upgrade chained list.When the user applies accession page, monitoring program is according to webpage F WebpageId enquiring digital signature chained list, with the digital signature information E of this webpage KRs(h) deciphering, the real summary info of the page that obtains is compared with the summary info that accessed file carries out after HASH calculates, and judges whether webpage is original, and the discovery webpage is distorted measures such as then taking warning, log record, blocking-up, recovery.
The digital signature that this technique computes goes out is kept in the internal memory, more the digital signature chained list need be upgraded in new capital at every turn, if the user is not by containing digital signature in the webpage of browser downloads, copying other environment to then can't detect, and if the page that the long-time not application of user visit is distorted can not find timely that then the website is under attack.
In sum; the method of present protection web portal security belongs to Passive Defence more; for some methods that can use digital signature initiatively to defend; monitoring mechanism is imperfection also; can't guarantee the attack finding timely and effectively and stop the website to be subjected to; and, then can break away from the protection of digital signature if webpage is downloaded to other environment.
Summary of the invention
A kind of method and system of protecting web portal security provided by the invention are with solving the problem that can not guarantee to carry out active defence timely and effectively that exists in the prior art.
A kind of web portal security guard method based on digital signature comprises:
With dynamic web page staticize in the website, will be packaged as a hiding TAG through the length information behind the encrypted private key, timestamp and digital digest simultaneously, embed in the former web page code as digital signature;
By setting machine-processed web page monitored, detect digital signature, judge whether webpage is distorted, deleted, and whether the website is attacked, and then implement safety operation;
The mechanism of web page monitored is: set a plurality of webpage monitoring warning ranks; By assay intervals time monitoring webpage, find that webpage is maliciously tampered under the normal condition, illustrate that then the website is attacked, immediate record is on record, sends warning, and regenerates this page automatically from web database; When recovering webpage, the warning rank promotes, and the assay intervals time shortens, if detecting attack activity does not stop as yet, continues to promote the warning rank, shortens detection time, until real-time detection; Do not find once more in a period of time that webpage is distorted, then progressively reduce and detect the warning rank, recover former assay intervals;
Judge that the method whether webpage is distorted, deleted is: detect webpage one by one according to webpage ID, do not exist if find the webpage of a certain ID, the deletion of webpage victim is described, the website is attacked; Extract and hide TAG in the webpage, the deciphering that uses public-key obtains former web length information, timestamp and digital digest; Calculate existing network page length degree, with former web length contrast, the explanation webpage is distorted when inequality, compares the next item down when identical; Extract existing network page or leaf timestamp, with former webpage timestamp contrast, the explanation webpage is distorted when inequality, compares the next item down when identical; Use identical function calculation existing network number of pages word summary, with former webpage digital digest contrast, the explanation webpage is distorted when inequality, and the explanation safe web page detects next webpage when identical.
A kind of web portal security protection system based on digital signature comprises:
Web database is used to preserve various info webs;
Maintenance terminal carries out updating maintenance for the enterprises staff to web site contents;
The dynamic web page server is used to generate dynamic page;
The snapshots of web pages server is used for dynamic page is converted into static page, simultaneously to wherein embedding digital signature;
The static Web page server is used for externally issuing static page;
The webpage monitoring server, whether the webpage that is used for monitoring the static Web page server is distorted deletion;
The workflow of each device comprises in the system:
The working service terminal is upgraded site information, and the content of network upgrade deposits web database in, and the dynamic web page server extracts data from database, shows for enterprises provides real-time dynamic web page;
The snapshots of web pages server extracts more new data from database, use webpage buffer memory snapshot program simultaneously, regularly generate snapshots of web pages, the dynamic webpage that produces of scripts such as PHP, form with the HTML static page is fixed up, and the id information of each static page is kept in the web database;
The snapshots of web pages server has embedded implicit digital signature simultaneously in web page code, the static Web page that contains digital signature uploads to static server and is published to extranets;
Monitoring server detects static Web page by the mechanism of setting, in case find that webpage is distorted, immediate record is on record, sends warning, and regenerates this page automatically from web database.
The embodiment of the invention can find timely and effectively that by the monitoring mechanism to digital signature the code victim malice of which webpage is distorted, and makes the security response measure at once.And embodiment of the invention employing is the method for issuing again after the webpage staticize, not only be convenient to the embedding of digital signature, and can significantly alleviate the website load, and give full play to the advantage of local cache, proxy caching, therefore can also effectively promote the dynamic website performance.And the digital signature of corresponding web page is not certain the piece zone that is stored in the server, but is directly embedded in the static Web page, though the change system, or copy webpage to other environment, still can check the fail safe of webpage.
Description of drawings
Fig. 1 is the method flow schematic diagram of prior art WEB application safety scanning system;
The method flow schematic diagram whether Fig. 2 is distorted for prior art Applied Digital signature detection webpage;
Fig. 3 is an embodiment of the invention system and device framework map;
Fig. 4 embeds the digital signature schematic flow sheet in the embodiment of the invention static Web page;
Fig. 5 is the webpage testing process schematic diagram of embodiment of the invention band digital signature;
Fig. 6 is an embodiment of the invention static Web page method for supervising schematic flow sheet.
Embodiment
At prior art exist can not be timely and effectively for web portal security carry out the initiatively problem of defence, the embodiment of the invention is in the website in the dynamic web page staticize, to wherein having embedded hiding digital signature; By the webpage in the predefined monitoring mechanism detection of the present invention website, whether can judge webpage is illegally distorted, is deleted, be whether the website is attacked, if the website is attacked, then place on record at once, send warning, and from web database, regenerate respective page automatically, thereby solved the problems referred to above.
As shown in Figure 3, the web portal security protection system that the embodiment of the invention provides comprises: maintenance terminal, web database, dynamic web page server, snapshots of web pages server, static Web page server and webpage monitoring server.
Server in the native system, database all refer to logical server, can be physical machine, virtual machine or program module.
Maintenance terminal, web database, dynamic web page server, snapshots of web pages server and webpage monitoring server all are in the intranet, take quarantine measures, avoid victim directly to visit, with plan safety.
Maintenance terminal carries out updating maintenance for the enterprises staff to web site contents.
Web database is used to preserve various info webs.As network upgrade information, static Web page ID etc.
The dynamic web page server is used to generate dynamic page.
The snapshots of web pages server is used for dynamic page is converted into static page, simultaneously to wherein embedding information such as digital signature.
The static Web page server is used for externally issuing static page.
The webpage monitoring server is used for monitoring the webpage of static Web page server and whether is distorted deletion.
Web portal security protection system workflow comprises:
The in-house network maintenance process, enterprises staff's working service terminal is upgraded site information, the content of network upgrade deposits in the web database, the dynamic web page server extracts data from database, for providing real-time dynamic web page, the enterprises personnel show, to make things convenient for the keeper to revise and to check.
The static Web page monitor procedure, the snapshots of web pages server extracts more new data from database, use corresponding webpage buffer memory snapshot program simultaneously, mode by regular generation snapshots of web pages, the dynamic webpage that produces of scripts such as PHP, form with the HTML static page is fixed up, and has embedded implicit digital signature in web page code.This digital signature is all relevant with web page files content, size, update time.Perhaps, the assailant can find leak to distort webpage, but can't forge digital signature.Monitoring server detects static Web page by certain mechanism, in case find that webpage is distorted, immediate record is on record, sends warning, and regenerates this page automatically from web database.
As shown in Figure 4, the method step to enciphered messages such as static Web page embedding digital signature comprises in the embodiment of the invention:
Step 401, snapshots of web pages server extract information in the database, and dynamic web page files such as translation, parsing PHP deposit the result who generates in the static html file in, and the file that order generates is Fweb.Concrete webpage staticize process belongs to known technology, no longer narration.
Step 402, select for use a certain HASH function to carry out computing, generate unique digital digest h, i.e. h=H (Fweb) the html file that generates.Calculate the length of webpage, obtain the length information L of Fweb, extract the webpage time stamp T simultaneously.
Step 403, length information L and the time stamp T of digital digest h, Fweb are used encrypted private key respectively, the digital signature E (h) after obtaining encrypting, E (L), E (T).Digital signature is encrypted and is belonged to known technology, no longer describes in detail.
Step 404, digital signature E (h), E (L), E (T) packing is embedded among the static Web page Fweb as a Tag, obtains the static Web page SignFweb with digital signature, digital signature is hiding Info among the webpage SignFweb.
Step 405, the static Web page SignFweb that will have a digital signature upload to static server for issue, preserve the ID record of SignFweb simultaneously in web database, so that detect the webpage disappearance.
Wherein, in the step 402, at the concrete condition of website, as the webpage size, server operation ability etc. are determined concrete HASH algorithm.Such as, on the basis of taking all factors into consideration summary figure place, algorithm security, arithmetic speed etc., the following webpage of 10M adopts the SHA-1 algorithm, and the above webpage of 10M adopts the MD5 algorithm, keeps an equilibrium in speed and fail safe.
After the step 403, will be sent in the webpage monitoring server by secure way with the corresponding PKI of private key with encryption.
Web length E (L) after supposing to encrypt is 84672366, timestamp information E (T) after the encryption is 65275046947032, and the digital signature E after the encryption (h) is 02a7c58b1ebd22a96554879694b091e60411cc4dea8652bb807234fa 06bbfb20e71ecf525f29df58e28f3d9bf541f7ebcef62b89fde4d8e7 ba1e6cc9ea24850478c11742f5cfa1d23fe22fe8bfbab5e.Then after former static Web page HTML code, add following covered code:
<!--
<sign>
<length>84672366</length>
<uptime>65275046947032</uptime>
<digital>02a7c58b1ebd22a96554879694b091e60411cc4dea8652bb807234fa06bbfb20e71ecf525f29df58e28f3d9bf541f7ebcef62b89fde4d8e7ba1e6cc9ea24850478c11742f5cfa1d23fe22fe8bfbab5e</digital>
</sign>
-->
Obtain the static Web page of similar following form:
<html>
<head〉<title〉the static Web page title</title〉</head 〉
<body>
Web page contents
</body></html>
<!--
<sign>
<length>84672366</length>
<uptime>65275046947032</uptime>
<digital>02a7c58b1ebd22a96554879694b091e60411cc4dea8652bb807234fa06bbfb20e71ecf525f29df58e28f3d9bf541f7ebcef62b89fde4d8e7ba1e6cc9ea24850478c11742f5cfa1d23fe22fe8bfbab5e</digital>
</sign>
-->
In monitor procedure, then take corresponding program basis<sign〉extract corresponding of web length, timestamp after the content of label will be encrypted with digital digest information.
Whether as shown in Figure 5, detect static Web page in the embodiment of the invention is that the method step of former webpage comprises:
Step 501, detect the html file SignFweb ' of user's request, the hiding Tag of the embedding in the file is separated, obtain static html file Fweb ' and digital signature.
The encryption TAG deciphering of the PKI of step 502, reception safe in utilization to extracting obtains digital digest h originally, original web page length L, original web page time stamp T.
The size of step 503, calculating html file Fweb ' obtains file size L '.Relatively L and L ' if both are equal, then continue relatively the next item down; If both do not wait, then abandon this webpage, regenerate secure page table.
The time stamp T of step 504, extraction html file Fweb ' ', compare with the time stamp T among the hiding Tag, if both equate that then the next item down is compared in continuation; If both do not wait, then abandon this webpage, regenerate secure page table.
Step 505, to the static html file Fweb ' that obtains carry out with upload procedure in identical HASH computing, obtain new digital digest h '=H (Fweb ').
Whether step 506, detection h equate with h '.If h=h ' illustrates that webpage still is the original web page that snapshot server generates, there is not victim malice to distort, can be distributed to the user safely.If h ≠ h ' illustrates that then webpage is modified, contain unsafe content in the code, horse back abandons this webpage and places on record, and the rank that enforces vigilance regenerates this webpage simultaneously.
As shown in Figure 6, the idiographic flow of webpage monitoring server web page monitored is in the embodiment of the invention:
Under the normal condition, monitoring server detected a webpage according to the webpage ID record of storage every 5 minutes.In case find that webpage is distorted, immediate record is on record, sends warning, and regenerates this page automatically from web database.Do not exist if find the webpage of corresponding ID, the deletion of webpage victim then is described, write down equally and report to the police, regenerate the page;
When recovering webpage, the warning rank of monitoring server can promote, and assay intervals shortened to 1 minute from 5 minutes.And in case discovery is arranged again, show that attack activity does not stop as yet, the warning rank can progressively promote, assay intervals shortens to 30 seconds, 10 seconds, until in real time, thereby can recover webpage rapidly;
If do not find once more in a period of time that webpage is distorted, can recover last warning rank automatically again, assay intervals also is extended for the previous stage assay intervals, and assay intervals progressively increases, and under the situation that attack activity stops, finally returning to 5 minutes interval.
Wherein, the alert level of monitoring and monitoring period can set up on their own according to actual conditions at interval.
Illustrate several possible attack scenes:
Scene 1, assailant distort web page contents, and the static Web page trace routine is calculated existing network number of pages word summary, compare with the digital digest of former webpage.Digital digest is all relevant with size, the content of webpage, and the hashed value that the HASH function generates has uniqueness, even only changed character in the page, the hashed value of generation is also inequality.
If scene 2 assailants separate the digital signature in the webpage, generate digital digest with identical HASH function and embed file camouflage digital signature, also be unsuccessful.Because the assailant does not encrypt the private key of usefulness to digital signature, under the asymmetric situation of private key PKI, the digital digest that decrypts can be not identical with the digital digest of camouflage yet, illustrates that equally webpage is distorted like this.So perhaps the assailant can find leak to distort webpage, but can't forge digital signature.
Scene 3, assailant directly delete webpage.Because the static Web page of each generation has all kept a corresponding ID in monitoring server in the process that uploads to the static Web page server, if monitoring server can not find the webpage corresponding with this ID, the deletion of its victim then is described, place on record equally, improve warning and regenerate this page.

Claims (2)

1. web portal security guard method based on digital signature is characterized in that this method comprises:
With dynamic web page staticize in the website, will be packaged as a hiding TAG through the length information behind the encrypted private key, timestamp and digital digest simultaneously, embed in the former web page code as digital signature;
By setting machine-processed web page monitored, detect digital signature, judge whether webpage is distorted, deleted, and whether the website is attacked, and then implement safety operation;
The mechanism of web page monitored is: set a plurality of webpage monitoring warning ranks; By assay intervals time monitoring webpage, find that webpage is maliciously tampered under the normal condition, illustrate that then the website is attacked, immediate record is on record, sends warning, and regenerates this page automatically from web database; When recovering webpage, the warning rank promotes, and the assay intervals time shortens, if detecting attack activity does not stop as yet, continues to promote the warning rank, shortens detection time, until real-time detection; Do not find once more in a period of time that webpage is distorted, then progressively reduce and detect the warning rank, recover former assay intervals;
Judge that the method whether webpage is distorted, deleted is: detect webpage one by one according to webpage ID, do not exist if find the webpage of a certain ID, the deletion of webpage victim is described, the website is attacked; Extract and hide TAG in the webpage, the deciphering that uses public-key obtains former web length information, timestamp and digital digest; Calculate existing network page length degree, with former web length contrast, the explanation webpage is distorted when inequality, compares the next item down when identical; Extract existing network page or leaf timestamp, with former webpage timestamp contrast, the explanation webpage is distorted when inequality, compares the next item down when identical; Use identical function calculation existing network number of pages word summary, with former webpage digital digest contrast, the explanation webpage is distorted when inequality, and the explanation safe web page detects next webpage when identical.
2. web portal security protection system based on digital signature is characterized in that this system comprises:
Web database is used to preserve various info webs;
Maintenance terminal carries out updating maintenance for the enterprises staff to web site contents;
The dynamic web page server is used to generate dynamic page;
The snapshots of web pages server is used for dynamic page is converted into static page, simultaneously to wherein embedding digital signature;
The static Web page server is used for externally issuing static page;
The webpage monitoring server, whether the webpage that is used for monitoring the static Web page server is distorted deletion;
The workflow of each device comprises in the system:
The working service terminal is upgraded site information, and the content of network upgrade deposits web database in, and the dynamic web page server extracts data from database, shows for enterprises provides real-time dynamic web page;
The snapshots of web pages server extracts more new data from database, use webpage buffer memory snapshot program simultaneously, regularly generate snapshots of web pages, the dynamic webpage that produces of scripts such as PHP, form with the HTML static page is fixed up, and the id information of each static page is kept in the web database;
The snapshots of web pages server has embedded implicit digital signature simultaneously in web page code, the static Web page that contains digital signature uploads to static server and is published to extranets;
Monitoring server detects static Web page by the mechanism of setting, in case find that webpage is distorted, immediate record is on record, sends warning, and regenerates this page automatically from web database.
CN2009102442513A 2009-12-28 2009-12-28 Website safety protection method based on digital signature and system adopting same Pending CN102111267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102442513A CN102111267A (en) 2009-12-28 2009-12-28 Website safety protection method based on digital signature and system adopting same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102442513A CN102111267A (en) 2009-12-28 2009-12-28 Website safety protection method based on digital signature and system adopting same

Publications (1)

Publication Number Publication Date
CN102111267A true CN102111267A (en) 2011-06-29

Family

ID=44175303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102442513A Pending CN102111267A (en) 2009-12-28 2009-12-28 Website safety protection method based on digital signature and system adopting same

Country Status (1)

Country Link
CN (1) CN102111267A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685108A (en) * 2012-03-31 2012-09-19 奇智软件(北京)有限公司 Method and device for adding and deciphering webpage enciphered data
CN102801698A (en) * 2011-12-20 2012-11-28 北京安天电子设备有限公司 Uniform resource locator (URL) request time sequence-based detection method and system for malicious codes
CN102819580A (en) * 2012-07-25 2012-12-12 广州翼锋信息科技有限公司 Monitoring method and system of advertisements of internet third-part media website
CN102915363A (en) * 2012-10-18 2013-02-06 北京奇虎科技有限公司 Website storing method and system
CN102938041A (en) * 2012-10-30 2013-02-20 北京神州绿盟信息安全科技股份有限公司 Comprehensive detection method and system for page tampering
CN103200179A (en) * 2013-02-23 2013-07-10 杨筑平 Website certification, deployment and identification method
CN103310160A (en) * 2013-06-20 2013-09-18 北京神州绿盟信息安全科技股份有限公司 Method, system and device for preventing webpage from being tampered with
CN103400063A (en) * 2013-08-06 2013-11-20 深信服网络科技(深圳)有限公司 Method and device for executing script file
CN103414735A (en) * 2012-10-12 2013-11-27 深圳市利谱信息技术有限公司 Website content classified inspection system
CN103888465A (en) * 2014-03-28 2014-06-25 新浪网技术(中国)有限公司 Method and device for detecting webpage hijacking
CN105138907A (en) * 2015-07-22 2015-12-09 国家计算机网络与信息安全管理中心 Method and system for actively detecting attacked website
CN106330817A (en) * 2015-06-17 2017-01-11 腾讯科技(深圳)有限公司 Webpage access method, device and terminal
CN107025247A (en) * 2016-02-02 2017-08-08 广州市动景计算机科技有限公司 Method, equipment, browser and the electronic equipment handled web data
CN107124430A (en) * 2017-06-08 2017-09-01 腾讯科技(深圳)有限公司 Pagejack monitoring method, device, system and storage medium
CN107239699A (en) * 2017-04-13 2017-10-10 太仓鸿策创达广告策划有限公司 Web monitor system
CN107547524A (en) * 2017-08-09 2018-01-05 百度在线网络技术(北京)有限公司 A kind of page detection method, device and equipment
CN107958060A (en) * 2017-12-01 2018-04-24 广州奥梵信息科技有限公司 A kind of website maintenance system based on internet
CN108171082A (en) * 2017-12-06 2018-06-15 新华三信息安全技术有限公司 A kind of webpage detection method and device
CN108319850A (en) * 2017-01-16 2018-07-24 华为技术有限公司 Method, sandbox system and the sandbox equipment of sandbox detection
CN108462749A (en) * 2018-03-22 2018-08-28 中国人民解放军战略支援部队信息工程大学 A kind of Web application processing methods, apparatus and system
CN108540466A (en) * 2018-03-31 2018-09-14 甘肃万维信息技术有限责任公司 Based on webpage tamper monitoring and alarming system
CN109729100A (en) * 2019-03-12 2019-05-07 Oppo广东移动通信有限公司 A kind of web data kidnaps monitoring method, device and computer readable storage medium
CN109788019A (en) * 2017-11-13 2019-05-21 重庆华龙艾迪信息技术有限公司 A kind of data processing method and proxy server
CN110572355A (en) * 2019-07-23 2019-12-13 平安科技(深圳)有限公司 Webpage data monitoring method and device, computer equipment and storage medium
CN113709148A (en) * 2021-08-26 2021-11-26 天元大数据信用管理有限公司 Website monitoring method, equipment and medium
CN114189331A (en) * 2021-12-13 2022-03-15 中国农业银行股份有限公司 Key storage and reading method, device, equipment and storage medium
CN115208677A (en) * 2022-07-19 2022-10-18 光大科技有限公司 Malicious website identification method and device
CN115373950A (en) * 2022-10-26 2022-11-22 北京芯可鉴科技有限公司 Industrial personal computer and data monitoring system

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801698B (en) * 2011-12-20 2015-01-07 北京安天电子设备有限公司 Uniform resource locator (URL) request time sequence-based detection method and system for malicious codes
CN102801698A (en) * 2011-12-20 2012-11-28 北京安天电子设备有限公司 Uniform resource locator (URL) request time sequence-based detection method and system for malicious codes
CN102685108A (en) * 2012-03-31 2012-09-19 奇智软件(北京)有限公司 Method and device for adding and deciphering webpage enciphered data
CN102685108B (en) * 2012-03-31 2015-11-11 北京奇虎科技有限公司 The interpolation of encrypting web data, decryption method and device
CN102819580A (en) * 2012-07-25 2012-12-12 广州翼锋信息科技有限公司 Monitoring method and system of advertisements of internet third-part media website
CN102819580B (en) * 2012-07-25 2016-09-21 广州翼锋信息科技有限公司 Internet third party online media sites broadcast monitoring method and system
CN103414735B (en) * 2012-10-12 2016-08-03 深圳市利谱信息技术有限公司 A kind of web site contents Secret-related Inspecting System
CN103414735A (en) * 2012-10-12 2013-11-27 深圳市利谱信息技术有限公司 Website content classified inspection system
CN102915363B (en) * 2012-10-18 2015-12-09 北京奇虎科技有限公司 Web site collection method and system
CN102915363A (en) * 2012-10-18 2013-02-06 北京奇虎科技有限公司 Website storing method and system
CN102938041A (en) * 2012-10-30 2013-02-20 北京神州绿盟信息安全科技股份有限公司 Comprehensive detection method and system for page tampering
CN102938041B (en) * 2012-10-30 2015-04-15 北京神州绿盟信息安全科技股份有限公司 Comprehensive detection method and system for page tampering
CN103200179A (en) * 2013-02-23 2013-07-10 杨筑平 Website certification, deployment and identification method
CN103310160B (en) * 2013-06-20 2016-08-10 北京神州绿盟信息安全科技股份有限公司 A kind of method, system and device preventing webpage to be tampered
CN103310160A (en) * 2013-06-20 2013-09-18 北京神州绿盟信息安全科技股份有限公司 Method, system and device for preventing webpage from being tampered with
CN103400063A (en) * 2013-08-06 2013-11-20 深信服网络科技(深圳)有限公司 Method and device for executing script file
CN103888465A (en) * 2014-03-28 2014-06-25 新浪网技术(中国)有限公司 Method and device for detecting webpage hijacking
CN106330817A (en) * 2015-06-17 2017-01-11 腾讯科技(深圳)有限公司 Webpage access method, device and terminal
CN105138907A (en) * 2015-07-22 2015-12-09 国家计算机网络与信息安全管理中心 Method and system for actively detecting attacked website
CN107025247A (en) * 2016-02-02 2017-08-08 广州市动景计算机科技有限公司 Method, equipment, browser and the electronic equipment handled web data
CN108319850A (en) * 2017-01-16 2018-07-24 华为技术有限公司 Method, sandbox system and the sandbox equipment of sandbox detection
CN107239699A (en) * 2017-04-13 2017-10-10 太仓鸿策创达广告策划有限公司 Web monitor system
CN107124430A (en) * 2017-06-08 2017-09-01 腾讯科技(深圳)有限公司 Pagejack monitoring method, device, system and storage medium
CN107124430B (en) * 2017-06-08 2021-07-06 腾讯科技(深圳)有限公司 Page hijacking monitoring method, device, system and storage medium
CN107547524A (en) * 2017-08-09 2018-01-05 百度在线网络技术(北京)有限公司 A kind of page detection method, device and equipment
CN109788019A (en) * 2017-11-13 2019-05-21 重庆华龙艾迪信息技术有限公司 A kind of data processing method and proxy server
CN107958060A (en) * 2017-12-01 2018-04-24 广州奥梵信息科技有限公司 A kind of website maintenance system based on internet
CN108171082A (en) * 2017-12-06 2018-06-15 新华三信息安全技术有限公司 A kind of webpage detection method and device
CN108171082B (en) * 2017-12-06 2021-04-30 新华三信息安全技术有限公司 Webpage detection method and device
CN108462749B (en) * 2018-03-22 2021-04-16 中国人民解放军战略支援部队信息工程大学 Web application processing method, device and system
CN108462749A (en) * 2018-03-22 2018-08-28 中国人民解放军战略支援部队信息工程大学 A kind of Web application processing methods, apparatus and system
CN108540466A (en) * 2018-03-31 2018-09-14 甘肃万维信息技术有限责任公司 Based on webpage tamper monitoring and alarming system
CN109729100B (en) * 2019-03-12 2021-04-13 Oppo广东移动通信有限公司 Webpage data hijacking monitoring method and device and computer readable storage medium
CN109729100A (en) * 2019-03-12 2019-05-07 Oppo广东移动通信有限公司 A kind of web data kidnaps monitoring method, device and computer readable storage medium
CN110572355A (en) * 2019-07-23 2019-12-13 平安科技(深圳)有限公司 Webpage data monitoring method and device, computer equipment and storage medium
CN113709148A (en) * 2021-08-26 2021-11-26 天元大数据信用管理有限公司 Website monitoring method, equipment and medium
CN114189331A (en) * 2021-12-13 2022-03-15 中国农业银行股份有限公司 Key storage and reading method, device, equipment and storage medium
CN115208677A (en) * 2022-07-19 2022-10-18 光大科技有限公司 Malicious website identification method and device
CN115208677B (en) * 2022-07-19 2024-01-30 光大科技有限公司 Malicious website identification method and device
CN115373950A (en) * 2022-10-26 2022-11-22 北京芯可鉴科技有限公司 Industrial personal computer and data monitoring system
CN115373950B (en) * 2022-10-26 2023-01-24 北京芯可鉴科技有限公司 Industrial personal computer and data monitoring system

Similar Documents

Publication Publication Date Title
CN102111267A (en) Website safety protection method based on digital signature and system adopting same
CN102110198B (en) Anti-counterfeiting method for web page
Wazid et al. BSFR-SH: Blockchain-enabled security framework against ransomware attacks for smart healthcare
US10348756B2 (en) System and method for assessing vulnerability of a mobile device
JP2019082989A5 (en)
WO2018156800A1 (en) System and method to prevent, detect, thwart and recover automatically from ransomware cyber attacks
CN111756702B (en) Data security protection method, device, equipment and storage medium
WO2015001535A1 (en) System and method for web application security
US10033761B2 (en) System and method for monitoring falsification of content after detection of unauthorized access
KR100912794B1 (en) Web hacking management system and manegement method thereof for real time web server hacking analysis and homepage hacking search
CN101482887A (en) Anti-tamper verification method for key data in database
CN110647744A (en) Identifying and extracting key hazard forensic indicators using object-specific file system views
US20120096565A1 (en) Device, method and system to prevent tampering with network content
KR101080953B1 (en) System and method for detecting and protecting webshell in real-time
CN104765883A (en) Detection method used for Webshell
CN110008392A (en) A kind of webpage tamper detection method based on web crawlers technology
CN110022305A (en) Web portal security guard system and method
CN102184371B (en) Detecting method and system for database operation authority of SQL (Structured Query Language)
KR101372906B1 (en) Method and system to prevent malware code
KR102159399B1 (en) Device for monitoring web server and analysing malicious code
Verma et al. An exploration analysis of social media security
Pirker et al. Behavioural comparison of systems for anomaly detection
KR102211846B1 (en) Ransomware detection system and operating method thereof
Huayu et al. Research on fog computing based active anti-theft technology
CN114024740A (en) Threat trapping method based on secret tag bait

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100082, building 1, building 32, 612 North Main Street, Haidian District, Beijing, Xizhimen

Applicant after: Beijing Safe-Code Technology Co., Ltd.

Address before: 100876 No. 34 South College Road, Beijing, Haidian District

Applicant before: Beijing Safe-Code Technology Co., Ltd.

C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Zhao Chen

Inventor after: Xu Qin

Inventor after: Du Xiaofeng

Inventor after: Bao Yibing

Inventor before: Zhao Chen

Inventor before: Xin Yang

Inventor before: Du Xiaofeng

Inventor before: Bao Yibing

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: ZHAO CHEN XIN YANG DU XIAOFENG BAO YIBING TO: ZHAO CHEN XU QIN DU XIAOFENGBAO YIBING

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110629