CN104301304A - Vulnerability detection system based on large ISP interconnection port and method thereof - Google Patents

Vulnerability detection system based on large ISP interconnection port and method thereof Download PDF

Info

Publication number
CN104301304A
CN104301304A CN201410471641.5A CN201410471641A CN104301304A CN 104301304 A CN104301304 A CN 104301304A CN 201410471641 A CN201410471641 A CN 201410471641A CN 104301304 A CN104301304 A CN 104301304A
Authority
CN
China
Prior art keywords
url
data
leak
server
network data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410471641.5A
Other languages
Chinese (zh)
Inventor
黄友俊
李星
吴建平
曲永丽
王飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CERNET Corp
Original Assignee
CERNET Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CERNET Corp filed Critical CERNET Corp
Priority to CN201410471641.5A priority Critical patent/CN104301304A/en
Publication of CN104301304A publication Critical patent/CN104301304A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a vulnerability detection system based on a large ISP interconnection port and a method thereof. The method comprises the steps that a URL collecting system collects network data when getting access to URLs on the internet, obtains and transmits the URL network data to a data preprocessing server in a timing mode; the data preprocessing server filters out the URL network data with URL suffix names conforming to .action or .do, and stores the data to a data storage server; the data storage server stores the URL network data; a struts 2 vulnerability detection system tests whether vulnerability exists in a website corresponding to each URL item by item and stores the data to a database server; the database server stores and detects URL records with vulnerability; a display system reads and displays the URL records with the vulnerability The vulnerability detection system can provide web vulnerability information for all the websites in an education network, the vulnerability can be restored conveniently in time, and serious loss is avoided.

Description

Based on leakage location and the method thereof of large-scale ISP interconnection port
Technical field
The present invention relates to computer network security field, more specifically, relate to a kind of apache struts2 leakage location based on large-scale ISP interconnection port and method thereof, for providing web vulnerability information for each website in education network.
Background technology
In recent years, along with China Internet industry high speed development, information network has become the important guarantee of social development.Having in network data is much sensitive information, or even state secret, therefore can cause from artificial attack all over the world unavoidably.Struts2 is an open source projects of Apache foundation Jakarta project team, current Struts2 is widely used in the Web Hostings such as Large-Scale Interconnected net enterprise, government, financial institution, and use as the bottom template of Website development, be one of most widely used Web application framework.But Struts2 exists the open redirected leak during redirection parameter prefix using abbreviation, cause hacker can obtain the highest weight limit of Website server, illegally obtain sensitive information.
The situation of Struts2 describes specific as follows:
The core of Struts2 uses webwork framework, and processed the parameter of http during process action by the getter/setter method calling bottom, each http parameter declaration is an ONGL statement by it.Server object is distorted in order to take precautions against; the i.e. ParametersInterceptor of XWork; do not allow to occur " # " character in parameter name; if but employ Java unicode string representation u0023; assailant just can walk around protection, completes attack by the mode of splicing java code in URL.
Apache team directly issues leak principle after finding leak on website.Cause website not upgraded in time, and some automations, the fool instrument that utilizes start to occur, insert address and directly can perform server command, read data even directly operation such as shutdown grade.
Summary of the invention
For solving above-mentioned problems of the prior art, the present invention proposes a kind of apache struts2 leakage location based on large-scale ISP interconnection port and method.By carrying out URL collection, Hole Detection and leak report in ISP interconnection port, website orientation problem can be assisted fast.
A kind of 1, a kind of struts2 Hole Detection based on large-scale ISP interconnection port disclosed by the invention and state automatic update system, it comprises:
URL acquisition system, it is for network data during Real-time Collection end-user access network address on the internet, therefrom obtains URL network data, and the URL network data timed sending of acquisition is processed to data prediction server;
Data prediction server, meets the URL network data of .action or .do, and is stored into data storage server for filtering out network address suffix name;
Data storage server, for storing the URL network data obtained after data prediction server filters;
Struts2 leakage location, it obtains URL network data from described data storage server, then tests website corresponding to each URL one by one and whether there is leak, and the URL that there is leak is stored into database server;
For storing, database server, detects that the URL that may there is leak forms leak URL record;
Display systems, records for reading leak URL from database server and is presented in interactive interface.
The invention also discloses a kind of struts2 Hole Detection based on large-scale ISP interconnection port and state automatic update method, it comprises:
Network data during URL acquisition system Real-time Collection end-user access network address on the internet, therefrom obtains URL network data, and the URL network data timed sending of acquisition is processed to data prediction server;
Data prediction server filters out the URL network data that network address suffix name meets .action or .do, and is stored into data storage server;
Data storage server stores the URL network data obtained after data prediction server filters;
Struts2 leakage location obtains URL network data from described data storage server, then tests website corresponding to each URL one by one and whether there is leak, and the URL that there is leak is stored into database server;
Database server storage detects that the URL that may there is leak forms leak URL record;
Display systems reads leak URL and records and be presented in interactive interface from database server.
The such scheme that the present invention proposes is by combining URL collection, structs2 Hole Detection, W3SP system, data storage server and database server module, realize locating websites leak function in real time, efficiently and exactly, there is provided vulnerability information in time for website each in education network, solve potential safety hazard in time.
Accompanying drawing explanation
Fig. 1 is based on the apache struts2 Hole Detection of large-scale ISP interconnection port and the Organization Chart of state automatic update system in the present invention;
The overall architecture schematic diagram that Fig. 2 (a) is display systems in the present invention;
The class figure framework design diagram that Fig. 2 (b) is display systems in the present invention;
Fig. 3 is the method realization flow figure of URL acquisition subsystem Real-time Collection URL network data in the present invention;
Fig. 4 is the method realization flow figure that in the present invention, struts2 leakage location carries out Hole Detection;
Fig. 5 is that in the present invention, display systems reads the URL that there is leak and records and the method realization flow figure shown.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in more detail.According to embodiments of the invention journey, can Hole Detection under this invention of clear displaying and state automatically updating function.
A kind of apache struts2 leakage location based on large-scale ISP interconnection port disclosed by the invention, it comprises:
URL acquisition system, it is for network data during Real-time Collection end-user access network address on the internet, then resolve network packet head successively, thus obtain URL network data, and gathered URL network data timed sending is processed to data prediction server;
Data prediction server, meets the URL network data of .action or .do, and is stored into data storage server for filtering out network address suffix name.
Data storage server, for storing the URL network data obtained after data prediction server filters.
Struts2 leakage location, it obtains URL network data recording from described data storage server, then test website corresponding to each URL one by one and whether there is leak, the URL record that there is leak is stored in database server and forms leak URL record;
Database server, for storing the URL record detecting and may there is leak.
Display systems is used for from database server, read leak URL and records and be presented in interactive interface.
The said system that the present invention proposes, on the one hand based on url data collection, parsing and memory technology, does not stop to obtain the original URL resource on network; On the other hand based on struts2 Hole Detection technology, detect the website that may there is leak in real time; The URL that may there is struts2 leak eventually through display systems carries out classification, and shows with web page.
Introduce the detail of each system and server below in detail.
URL acquisition system
Described URL acquisition system, specifically obtains the IP message on router, and resolves IP (v4/v6) and report first information, resolves TCP/UDP and reports first information, retains the message that object or source port are 80 or 8080, then parses http header information.The first parsing of IPv4 report must follow RFC791, and first parsing of IPv6 report must follow RFC2460, and first parsing of TCP report must follow RFC793, and first parsing of UDP report must follow RFC768.The first parsing of HTTP report must observe RFC2068.The concurrency of system wants high, will have enough crushing resistances, for the situation that data volume is little, can not occupy unnecessary system resource for mass data.Alternatively, the running environment of URL acquisition system can be the class UNIX operating system following POSIX standard.
Alternatively, according to pipelining thinking, module is resolved in message crawl, protocol analysis, data storage, every generic module can concurrence performance, to improve the concurrency of system.
Alternatively, the advantage of operator Network Based, described URL acquisition system can be deployed in large-scale ISP interconnection port, so just can collect mass data, for Hole Detection provides sufficient url data amount.
Alternatively, described URL acquisition system comprises multiple high-performance blade server.Preferably, can gather URL network data by 16 high-performance blade servers, each blade server independent acquisition URL network data, can avoid the mutual interference of system exception between blade server like this, improve stability and the fail safe of acquisition system.The URL network data of 16 blade server collections is finally aggregated on data prediction server, the URL network data collected is processed by data prediction server is unified, and then filtration obtains the URL record that suffix is called .action or .do, and be stored on data storage server.The network interface card of wherein said blade server and data prediction server is at least PCI-Express, to improve message transmission rate and treatment effeciency.
Alternatively, above-mentioned URL acquisition system is in local area network (LAN).
Struts2 leakage location
Struts2 framework has two core configuration file: struts.xml and struts.properties.Wherein struts.properties defines a large amount of attribute of struts2 framework.In struts.properties configuration file, generally all can struts.action.extension=do be set, action.The network address suffix of the website of building based on struts2 framework is like this generally .action or .do.Therefore, struts2 leakage location only needs to detect the URL that suffix is called .action and .do.
Alternatively, described struts2 leakage location employing is single-threaded reads url data from data storage server, then adopt multi-thread concurrent to detect URL record and whether there is leak, and will detect that the URL record of leak is inserted in linked queue, be then responsible for the URL that there is leak to record to deposit in database server by single-threaded.
Detect that the website of leak has likely just been repaired later, in order to ensure the validity of data-base recording, struts2 leakage location can with predetermined period as reading state from database server at each weekend, for there is the URL record of leak and then detecting one time one by one, and be deleted and has wherein been repaired the URL record of leak.
Display systems
Described display systems is web station system safety service platform system, and adopt hierarchical design, functional module high cohesion, intermodule loose coupling, is convenient to the easily extensible of systemic-function.Each module is relatively independent, and separate modular can be multiplexed into other system, and respectively the most basic database operation method is inherited by same class, is easy to multiplexing.
Fig. 2 (a) shows the overall architecture schematic diagram of display systems in the present invention.As shown in Figure 3, described display systems comprises:
Client terminal, it provides system interaction interface for user, and inquires about which website for user and may there is struts2 leak, and shows Query Result to user;
The webserver, it mainly provides the preposition access of server end, can carry out the operations such as overall access control and load balancing;
Database, for the data of store database data and some other document format.
Alternatively, namely described web station system safety service platform system shows can based on the J2EE architecture design of n layer, specifically comprise following which floor:
Client layer: staff;
Network layer: user can access this system by Internet, Intranet and wireless network;
Web layer: the preposition access mainly providing server end, can carry out the operations such as overall access control and load balancing;
Application layer: application layer is exactly the entrance processing various leak, and we mainly discuss and process web leak in the present system.
Data Layer: the data Layer of domain name registration system rear end is the information data place of system, and it comprises the data of database data and some other document format.
Preferably, described display systems adopts the integrated framework of Struts2+Spring+Hibernate, and the class figure architecture design of system mainly comprises key-course (Action class), Business Logic (Service class), data access layer (Dao class) and data model (Model class).As shown in Fig. 2 (b).
According to a further aspect of the invention, it also proposed a kind of method that apache struts2 Hole Detection based on large-scale ISP interconnection port and state upgrade automatically.The method that the method has merged url data collection, struts2 Hole Detection and Vuln Status web show, thus effectively realize the detection of leak, state updating showing with web interface close friend, be convenient to management.
The invention also discloses a kind of method that apache struts2 Hole Detection based on large-scale ISP interconnection port and state upgrade automatically.The method comprises:
Step 1, URL acquisition subsystem Real-time Collection url data in ISP interconnection port, and these data timings are sent to data prediction server;
Fig. 3 illustrates the method realization flow figure of URL acquisition subsystem Real-time Collection URL network data in the present invention, and as shown in Figure 3, the method comprises:
S1: message handling module packet_capture realizes the encapsulation to the storehouse libpcap that increases income, and calls libpcap interface and carries out network packet capturing.Because packet capturing speed is very fast, single-threaded packet capturing therefore can be adopted to be stored in queue NetWork Packet.The mode arranging employing configuration file of packet capturing parameter, if the port numbers arranging packet capturing is 80, the length of packet capturing is 1470.The flexibility of system can be improved like this.
S2: protocol resolution module Http_resolve opens multithreading reads network packet from queue NetWork Packet, carries out protocal analysis, filters out HTTP message.Wherein, queue NetWork Packet must lock, because the protocol resolution module Http_resolve of packet capturing module packet_capture and multithreading needs the access queue NetWork Packet of mutual exclusion, the mode that locks then adopts classical Read-Write Locks technology, like this can concurrent reading queue NetWork Packet between multiple Http_resolve module, to improve handling property.Http packet storage after parsing is in linked queue.
S3: for improving concurrency, opens multiple protocal analysis thread and parse URL then stored in data prediction server from the HTTP message that filtration obtains.
Step 2, struts2 leakage location obtain URL record from data storage server, then test website corresponding to each URL one by one and whether there is leak, concrete detection method mainly contains two kinds of modes: long-distance support order and remoting redirection, as: http: // 192.168.1.1/helloworld.action? redirect:http: //www.***.com.If network address http: // 192.168.1.1/helloworld.action exists leak, above-mentioned network address will be redirected to the homepage of Baidu.
Fig. 4 illustrates the method realization flow figure that struts2 leakage location in the present invention carries out Hole Detection, and as shown in Figure 4, it comprises:
S1: single-threaded Read_URL reads the url data that suffix is called .action or .do from data storage server, then inserts in linked queue LQ_URL, first adds LQ_URL before insertion and write lock, then data inserting, inserted release and write lock.
S2:URL_detect module is opened multithreading and read url data from queue LQ_URL, and first read lock before reading, reads successfully and discharge read lock.Each thread carries out struts2 Hole Detection for the URL record read, if there is leak be just inserted into LQ_flaw in queue, otherwise abandons this url data.
Then S3: single-threaded URL_insert reads the URL record that may there is leak from queue LQ_flaw is inserted in database.
Step 3, display systems read the URL that there is leak and record and be presented in interface from database server.
Fig. 5 illustrates display systems in the present invention and reads the URL that there is leak and record and the method realization flow figure shown, and as shown in Figure 5, it comprises:
S1:WebLeakDao module realizes the interface of accessing database.
S2:WebLeakManager module in charge calls above-mentioned interface and obtains vulnerability information list from database.
S3:WebLeakAction generic module is responsible for the displaying to web vulnerability information, when showing according to URL carry out classifying can quick position to the website of certain node, certain region and some school.And show whether the state of current leak repairs.
Above-described specific embodiment journey; object of the present invention, technical scheme and beneficial effect are further described; be understood that; the foregoing is only specific embodiments of the invention journey; be not limited to the present invention; all within the neoteric spirit of this leak and principle, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1., based on a leakage location for large-scale ISP interconnection port, it comprises:
URL acquisition system, it is for network data during Real-time Collection end-user access network address on the internet, therefrom obtains URL network data, and the URL network data timed sending of acquisition is processed to data prediction server;
Data prediction server, meets the URL network data of .action or .do, and is stored into data storage server for filtering out network address suffix name;
Data storage server, for storing the URL network data obtained after data prediction server filters;
Struts2 leakage location, it obtains URL network data from described data storage server, then tests website corresponding to each URL one by one and whether there is leak, and the URL that there is leak is stored into database server;
For storing, database server, detects that the URL that may there is leak forms leak URL record;
Display systems, records for reading leak URL from database server and is presented in interactive interface.
2. the system as claimed in claim 1, wherein, described URL acquisition system obtains IP message especially by from router, and report first information and TCP/UDP to report first information by resolving IP, reservation object or source are the message of 80 or 8080, and then parse the URL network data in http header information.
3. the system as claimed in claim 1, wherein, described URL acquisition system is deployed in ISP interconnection port, and it comprises the blade server of multiple parallel running.
4. the system as claimed in claim 1, wherein, described struts2 leakage location reads leak URL with predetermined period and records and then detect one time one by one from database server, and deletes the URL record wherein having repaired leak.
5. the system as claimed in claim 1, wherein, described display systems comprises:
Client terminal, it provides system interaction interface for user, and inquires about which website for user and may there is leak, shows Query Result to user;
The webserver, it is for providing the preposition access of server end;
Database, for the data of store database data and some other document format.
6., based on a leak detection method for large-scale ISP interconnection port, it comprises:
Network data during URL acquisition system Real-time Collection end-user access network address on the internet, therefrom obtains URL network data, and the URL network data timed sending of acquisition is processed to data prediction server;
Data prediction server filters out the URL network data that network address suffix name meets .action or .do, and is stored into data storage server;
Data storage server stores the URL network data obtained after data prediction server filters;
Struts2 leakage location obtains URL network data from described data storage server, then tests website corresponding to each URL one by one and whether there is leak, and the URL that there is leak is stored into database server;
Database server storage detects that the URL that may there is leak forms leak URL record;
Display systems reads leak URL and records and be presented in interactive interface from database server.
7. method as claimed in claim 6, wherein, the step of described URL acquisition system Real-time Collection specifically comprises:
Packet capturing interface is utilized to carry out network packet capturing;
Utilize the network packet that multi-threading parallel process captures, and filter out HTTP message wherein;
Employing multi-threaded parallel resolves the URL network data in described HTTP message, and is sent to data prediction server.
8. method as claimed in claim 6, wherein, the step that struts2 leakage location carries out Hole Detection specifically comprises:
From data storage server, read the URL network data that suffix is called .action or .do, then insert in the first linked queue; Wherein, before described update starts, lock is write to described first linked queue, unlock after update completes;
Utilize multithreading to read URL network data from described first linked queue is parallel, each thread carries out struts2 Hole Detection for the URL network data read, and is just inserted in the second linked queue, otherwise abandons this URL network data if there is leak;
From the second linked queue, read described URL network data and be stored in database server.
9. method as claimed in claim 8, wherein, whether the website that described struts2 leakage location adopts long-distance support order and remoting redirection to detect URL network data corresponding exists leak.
CN201410471641.5A 2014-09-16 2014-09-16 Vulnerability detection system based on large ISP interconnection port and method thereof Pending CN104301304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410471641.5A CN104301304A (en) 2014-09-16 2014-09-16 Vulnerability detection system based on large ISP interconnection port and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410471641.5A CN104301304A (en) 2014-09-16 2014-09-16 Vulnerability detection system based on large ISP interconnection port and method thereof

Publications (1)

Publication Number Publication Date
CN104301304A true CN104301304A (en) 2015-01-21

Family

ID=52320872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410471641.5A Pending CN104301304A (en) 2014-09-16 2014-09-16 Vulnerability detection system based on large ISP interconnection port and method thereof

Country Status (1)

Country Link
CN (1) CN104301304A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767653A (en) * 2015-01-29 2015-07-08 小米科技有限责任公司 Method and device for monitoring network interfaces
CN105471676A (en) * 2015-12-01 2016-04-06 赛尔网络有限公司 Port scanning IP address activity degree statistical system and method
CN106453239A (en) * 2016-08-22 2017-02-22 赛尔网络有限公司 Safety loophole acquiring, monitoring and distribution processing system and method based on social networking platform
CN107070882A (en) * 2017-02-27 2017-08-18 北京指掌易科技有限公司 A kind of method of WIFI wireless datas real time parsing
CN107347076A (en) * 2017-08-23 2017-11-14 杭州安恒信息技术有限公司 The detection method and device of SSRF leaks
CN108737213A (en) * 2018-05-22 2018-11-02 中国电子科技集团公司第四十研究所 A kind of parallel big handling capacity Permeation Test System of height based on FPGA and method
CN109861875A (en) * 2018-12-29 2019-06-07 顺丰科技有限公司 The test method and device of application program
WO2020057523A1 (en) * 2018-09-18 2020-03-26 华为技术有限公司 Method and device for triggering vulnerability detection
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN112671781A (en) * 2020-12-24 2021-04-16 北京华顺信安信息技术有限公司 RASP-based firewall system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
US8321661B1 (en) * 2008-05-30 2012-11-27 Trend Micro Incorporated Input data security processing systems and methods therefor
CN103685258A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for fast scanning website loopholes
CN103685290A (en) * 2013-12-19 2014-03-26 南京理工大学连云港研究院 Vulnerability scanning system based on GHDB

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321661B1 (en) * 2008-05-30 2012-11-27 Trend Micro Incorporated Input data security processing systems and methods therefor
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN103685258A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for fast scanning website loopholes
CN103685290A (en) * 2013-12-19 2014-03-26 南京理工大学连云港研究院 Vulnerability scanning system based on GHDB

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李刚: "《Struts2权威指南》", 30 September 2007 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767653B (en) * 2015-01-29 2018-09-04 小米科技有限责任公司 A kind of method and apparatus of network interface monitoring
CN104767653A (en) * 2015-01-29 2015-07-08 小米科技有限责任公司 Method and device for monitoring network interfaces
CN105471676B (en) * 2015-12-01 2019-01-25 赛尔网络有限公司 A kind of port scan IP network location liveness statistical system and method
CN105471676A (en) * 2015-12-01 2016-04-06 赛尔网络有限公司 Port scanning IP address activity degree statistical system and method
CN106453239A (en) * 2016-08-22 2017-02-22 赛尔网络有限公司 Safety loophole acquiring, monitoring and distribution processing system and method based on social networking platform
CN107070882A (en) * 2017-02-27 2017-08-18 北京指掌易科技有限公司 A kind of method of WIFI wireless datas real time parsing
CN107347076A (en) * 2017-08-23 2017-11-14 杭州安恒信息技术有限公司 The detection method and device of SSRF leaks
CN108737213A (en) * 2018-05-22 2018-11-02 中国电子科技集团公司第四十研究所 A kind of parallel big handling capacity Permeation Test System of height based on FPGA and method
CN108737213B (en) * 2018-05-22 2020-06-09 中国电子科技集团公司第四十一研究所 High-parallelism and high-throughput penetration test system and method based on FPGA
WO2020057523A1 (en) * 2018-09-18 2020-03-26 华为技术有限公司 Method and device for triggering vulnerability detection
CN109861875A (en) * 2018-12-29 2019-06-07 顺丰科技有限公司 The test method and device of application program
CN111447224A (en) * 2020-03-26 2020-07-24 江苏亨通工控安全研究院有限公司 Web vulnerability scanning method and vulnerability scanner
CN112671781A (en) * 2020-12-24 2021-04-16 北京华顺信安信息技术有限公司 RASP-based firewall system

Similar Documents

Publication Publication Date Title
CN104301304A (en) Vulnerability detection system based on large ISP interconnection port and method thereof
Raghavan Digital forensic research: current state of the art
CN103023710B (en) A kind of safety test system and method
CN104348803B (en) Link kidnaps detection method, device, user equipment, Analysis server and system
CN103888490B (en) A kind of man-machine knowledge method for distinguishing of full automatic WEB client side
US9305055B2 (en) Method and apparatus for analysing data packets
CN101651707B (en) Method for automatically acquiring user behavior log of network
CN110650128B (en) System and method for detecting digital currency stealing attack of Etheng
CN103384242B (en) Intrusion detection method based on Nginx proxy server and system
CN102394885B (en) Information classification protection automatic verification method based on data stream
CN103118007B (en) A kind of acquisition methods of user access activity and system
CN110119469A (en) A kind of data collection and transmission and method towards darknet
CN108011752A (en) Fault locating analysis method and device, computer-readable recording medium
CN103970788A (en) Webpage-crawling-based crawler technology
CN103577482B (en) A kind of webpage collection method, device and browser
CN106095979A (en) URL merging treatment method and apparatus
CN104144142A (en) Web vulnerability discovery method and system
CN109376133A (en) File access method and file access system
CN105512044A (en) Method and system for updating object base used for keyword drive test
CN106209431A (en) A kind of Approaches of Alarm Correlation and network management system
CN108632219A (en) A kind of website vulnerability detection method, detection service device and system
CN103166966A (en) Method and device for distinguishing illegal access request to website
CN110489676A (en) Webpage evidence collecting method, device, storage medium and server based on block chain
US20160110455A1 (en) Identifying client states
CN105302801A (en) Resource caching method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150121