Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway

A sensitive information and security gateway technology, applied in the field of computer network security, can solve problems such as lack of active response methods and powerlessness, and achieve the effects of good scalability, leakage prevention, and flexible configuration

Active Publication Date: 2015-10-21
ZHEJIANG UNIV +1
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of new attack methods that continue to emerge, traditional passive defense methods are becoming more and more powerless, lacking a proactive response method, often responding only after the system is attacked, and such defenses are always launched after the attack occurs. Make remedial measures; just like this, the mimic security gateway is a new type of security gateway proposed based on this situation, in order to obtain a favorable defense posture from initiative, variability and randomness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway
  • Server fingerprint mimicry and sensitive information mimicry method based on WEB security gateway

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] Hereinafter, the present invention will be described in detail based on the drawings, and the purpose and effects of the present invention will become more apparent.

[0037] The present invention is a method for server fingerprint mimicry and sensitive information mimicry based on WEB security gateway, including the following steps:

[0038] Step 1: Set up a reverse proxy server between the real web server and the user. The reverse proxy server is implemented based on Nginx. Realize the setting of forwarding and routing rules on the reverse proxy server, and then the message transfer between the user and the web server is processed and forwarded by the reverse proxy server, and the reverse proxy server is transparent to the user and the server; network topology Picture attached figure 1 ;

[0039] Step 2: Configure the mimic security gateway module on the reverse proxy server, including the fingerprint information mimic module of the Web server and the sensitive information mim

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a server fingerprint mimicry and sensitive information mimicry method based on a WEB security gateway. The method comprises the following steps: returning information mimicry when an attacker scans Web server fingerprint information and bug information to confuse effective information acquired by the attacker; and after the attacker finishes the attacking through the bug, performing mimicry substitution on the sensitive information acquired by the attacker through the sensitive information mimicry to prevent the sensitive information from being leaked. Compared with the traditional Web security gateway, the method disclosed by the invention can confuse the seeing and hearing of the attacker before the attacking, and can interfere the acquisition of the sensitive information after the attacking is finished; the security gateway can be flexibly configured and is transparent facing to the normal user, and has good expandability and portability.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products