Movatterモバイル変換


[0]ホーム

URL:


CN109361692B - Web protection method based on asset type identification and self-discovery vulnerability - Google Patents

Web protection method based on asset type identification and self-discovery vulnerability
Download PDF

Info

Publication number
CN109361692B
CN109361692BCN201811381710.8ACN201811381710ACN109361692BCN 109361692 BCN109361692 BCN 109361692BCN 201811381710 ACN201811381710 ACN 201811381710ACN 109361692 BCN109361692 BCN 109361692B
Authority
CN
China
Prior art keywords
asset
web
vulnerability
http request
vulnerabilities
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811381710.8A
Other languages
Chinese (zh)
Other versions
CN109361692A (en
Inventor
刘天翔
陈四强
程明海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Webray Beijing Network Safety Technology Co ltd
Original Assignee
Webray Beijing Network Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Webray Beijing Network Safety Technology Co ltdfiledCriticalWebray Beijing Network Safety Technology Co ltd
Priority to CN201811381710.8ApriorityCriticalpatent/CN109361692B/en
Publication of CN109361692ApublicationCriticalpatent/CN109361692A/en
Application grantedgrantedCritical
Publication of CN109361692BpublicationCriticalpatent/CN109361692B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention provides a web protection method based on asset type identification and self-discovery vulnerability, which comprises the following steps: step S1, obtaining HTTP request through Web application firewall, judging whether the type of the asset is known, if yes, executing step S5, otherwise, performing asset learning, judging the service type of the asset identified according to the HTTP request head information and response head information flow of the Web application firewall, and forming an asset list; step S2, according to the asset list, Web vulnerability scanning is carried out on assets of different types by adopting a Web scanning technology so as to find existing vulnerabilities; step S3, generating a virtual patch according to the bug scanning result; step S4, automatically generating a Web protection strategy according to the asset type and the virtual patch; and step S5, executing asset protection detection, judging whether the existing virtual vulnerability policy is met, if so, intercepting the HTTP request, otherwise, allowing the HTTP request to normally access. The invention improves the protection effect, reduces the problems of false alarm and missing report, and improves the protection performance.

Description

Web protection method based on asset type identification and self-discovery vulnerability
Technical Field
The invention relates to the technical field of network security, in particular to a web protection method based on asset type identification and vulnerability self-discovery.
Background
In the prior art, the method for web protection includes:
1. the rule-based protection may provide security rules for various Web applications, and the WAF manufacturer may maintain and update this rule base from time to time.
The disadvantages of the scheme are as follows: the abnormal flow is identified through the attack rule base, so that under the condition that a service system is complex, certain mistaken killing can be caused, normal functions are intercepted by a firewall, and normal service is influenced.
2. Establishing model protection based on legal application data: and establishing a URL model through Web access to the assets, and judging the abnormality of the application data according to the URL model.
The disadvantages of the scheme are as follows: it is very difficult to do this in reality, requiring a very thorough knowledge of the user's asset application.
Disclosure of Invention
The object of the present invention is to solve at least one of the technical drawbacks mentioned.
Therefore, the invention aims to provide a web protection method based on asset type identification and self-discovery vulnerability.
In order to achieve the above object, an embodiment of the present invention provides a web protection method based on asset type identification and vulnerability discovery, including the following steps:
step S1, obtaining HTTP request through Web application firewall, judging whether the type of the asset is known, if yes, executing step S5, otherwise, performing asset learning, judging the service type of the asset identified according to the HTTP request head information and response head information flow of the Web application firewall, and forming an asset list;
step S2, according to the asset list, Web vulnerability scanning is carried out on assets of different types by adopting a Web scanning technology so as to find existing vulnerabilities;
step S3, generating a virtual patch according to the bug scanning result;
step S4, automatically generating a Web protection strategy according to the asset type and the virtual patch;
and step S5, executing asset protection detection, judging whether the existing virtual vulnerability policy is met, if so, intercepting the HTTP request, otherwise, allowing the HTTP request to normally access.
Further, in step S1, the resource address of the network backend server is automatically learned according to the host attribute of the HTTP request passing through the Web application firewall, and the service type of the asset is identified by the HTTP response information returned by the server, so as to form the asset list.
Further, the service type of the asset includes one or more of: nginx, apache, iis.
Further, in the step S2, the existing vulnerabilities include one or more of: sql injection vulnerabilities, xss vulnerabilities, upload vulnerabilities.
According to the web protection method based on asset type identification and vulnerability self-discovery, the problems of effective management and protection of assets in a network by an administrator are solved through asset learning. The method has pertinence to the protection of different types of assets, improves the protection effect, reduces the problems of false alarm and missed alarm, and improves the protection performance.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram of a method of web defense based on identifying asset types and self-discovering vulnerabilities in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of a web defense method based on identifying asset types and self-discovering vulnerabilities according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
As shown in fig. 1 and fig. 2, the method for web protection based on asset type identification and vulnerability discovery in the embodiment of the present invention includes the following steps:
and step S1, acquiring the HTTP request passing through the Web application firewall, judging whether the type of the asset is known, if so, executing step S5, otherwise, performing asset learning, judging the service type of the asset identified according to the HTTP request header information and the response header information flow of the Web application firewall, and forming an asset list.
In one embodiment of the invention, when deploying a Web application defense system, the service types of the assets include one or more of: nginx, apache, iis, etc. It should be noted that the service type of the asset is not limited to the above example, and may also include other types of assets, which are not described herein again.
In step S1, the resource address of the Web backend server is automatically learned based on the host attribute of the HTTP request through the Web application firewall, and the service type of the asset is identified by the HTTP response information returned by the server, forming an asset list.
And step S2, according to the asset list, adopting Web scanning technology to perform Web vulnerability scanning on different types of assets so as to find existing vulnerabilities.
In one embodiment of the invention, when the Web application protection system is deployed, existing vulnerabilities include one or more of the following: sql injection vulnerabilities, xss vulnerabilities, upload vulnerabilities, and the like. It should be noted that the types of existing holes are not limited to the above examples, and may also include other types of holes, which are not described in detail.
And step S3, generating a virtual patch according to the vulnerability scanning result.
It should be noted that, different virtual patches of different services relatively generate different protection templates.
And step S4, automatically generating a Web protection strategy according to the asset type and the virtual patch.
In this step, a more targeted Web protection policy is generated by combining the virtual Web vulnerability patch and the asset type.
And step S5, executing asset protection detection, judging whether the existing virtual vulnerability policy is met, if so, intercepting the HTTP request, otherwise, allowing the HTTP request to normally access.
According to the web protection method based on asset type identification and vulnerability self-discovery, the problems of effective management and protection of assets in a network by an administrator are solved through asset learning. The method has pertinence to the protection of different types of assets, improves the protection effect, reduces the problems of false alarm and missed alarm, and improves the protection performance.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (3)

CN201811381710.8A2018-11-202018-11-20Web protection method based on asset type identification and self-discovery vulnerabilityActiveCN109361692B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811381710.8ACN109361692B (en)2018-11-202018-11-20Web protection method based on asset type identification and self-discovery vulnerability

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811381710.8ACN109361692B (en)2018-11-202018-11-20Web protection method based on asset type identification and self-discovery vulnerability

Publications (2)

Publication NumberPublication Date
CN109361692A CN109361692A (en)2019-02-19
CN109361692Btrue CN109361692B (en)2020-12-04

Family

ID=65332397

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811381710.8AActiveCN109361692B (en)2018-11-202018-11-20Web protection method based on asset type identification and self-discovery vulnerability

Country Status (1)

CountryLink
CN (1)CN109361692B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112235248B (en)*2020-09-172023-04-21杭州安恒信息技术股份有限公司 A Web application firewall protection site collection method, device and electronic device
CN112671609A (en)*2020-12-212021-04-16哈尔滨工大天创电子有限公司Asset census and safety detection method and device and terminal equipment
CN113238536B (en)*2021-06-042022-03-25西安热工研究院有限公司 An industrial control system network vulnerability identification method, device and related equipment
CN116089987A (en)*2023-04-072023-05-09北京元数智联技术有限公司Data leakage protection method, device and equipment
CN120223440B (en)*2025-05-272025-09-16紫光恒越技术有限公司 Linkage method, equipment, medium and program product of security protection system

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20050081881A (en)*2005-05-062005-08-19(주)모니터랩Security system through internet for web application service and providing method the same on internet
CN102932370A (en)*2012-11-202013-02-13华为技术有限公司Safety scanning method, equipment and system
CN103905265A (en)*2012-12-272014-07-02中国移动通信集团公司Method and apparatus for detecting new device in network
CN107426191A (en)*2017-06-292017-12-01上海凯岸信息科技有限公司A kind of leak early warning and emergency response automatic warning system
CN108322446A (en)*2018-01-052018-07-24深圳壹账通智能科技有限公司Intranet assets leak detection method, device, computer equipment and storage medium
CN108737425A (en)*2018-05-242018-11-02北京凌云信安科技有限公司Fragility based on multi engine vulnerability scanning association analysis manages system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
HK1079879A1 (en)*2002-06-182006-04-13Computer Associates Think, Inc.Methods and systems for managing enterprise assets

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20050081881A (en)*2005-05-062005-08-19(주)모니터랩Security system through internet for web application service and providing method the same on internet
CN102932370A (en)*2012-11-202013-02-13华为技术有限公司Safety scanning method, equipment and system
CN103905265A (en)*2012-12-272014-07-02中国移动通信集团公司Method and apparatus for detecting new device in network
CN107426191A (en)*2017-06-292017-12-01上海凯岸信息科技有限公司A kind of leak early warning and emergency response automatic warning system
CN108322446A (en)*2018-01-052018-07-24深圳壹账通智能科技有限公司Intranet assets leak detection method, device, computer equipment and storage medium
CN108737425A (en)*2018-05-242018-11-02北京凌云信安科技有限公司Fragility based on multi engine vulnerability scanning association analysis manages system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
海量数据下分布式IT资产安全监测系统;王红凯,郑生军,郭龙华,刘昀;《信息网络安全》;20160210(第02期);全文*

Also Published As

Publication numberPublication date
CN109361692A (en)2019-02-19

Similar Documents

PublicationPublication DateTitle
CN109361692B (en)Web protection method based on asset type identification and self-discovery vulnerability
US12149555B2 (en)Systems and methods for vulnerability assessment for cloud assets using imaging methods
US12299133B2 (en)Systems and methods for prioritizing security findings using machine learning models
US12166786B1 (en)Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US11936666B1 (en)Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk
CA3018022C (en)Systems and methods for automatic device detection
US8839442B2 (en)System and method for enabling remote registry service security audits
US7526806B2 (en)Method and system for addressing intrusion attacks on a computer system
Valdes et al.Probabilistic alert correlation
US12321456B2 (en)Automatic generation of malware detection traps
Ficco et al.Intrusion detection in cloud computing
US20140214938A1 (en)Identifying participants for collaboration in a threat exchange community
US20050154733A1 (en)Real-time change detection for network systems
US20210320945A1 (en)Method for verifying configurations of security technologies deployed on a computer network
US11979426B2 (en)Predictive vulnerability management analytics, orchestration, automation and remediation platform for computer systems. networks and devices
CN113504971B (en)Security interception method and system based on container
US8661102B1 (en)System, method and computer program product for detecting patterns among information from a distributed honey pot system
US20250278491A1 (en)Methods Systems & Functionally Associated Machine Executable Code for Monitoring Heterogeneous Computing Networks
HK1257354B (en)System and methods for automatic device detection

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp