Linux Server Network Security: Real-time Detection and Response of Web Interface Attacks
Abstract:
With the popularity and development of Web applications, Web interface attacks have also Increasingly rampant. In order to protect the network security of the server, this article introduces a real-time detection and response method for web interface attacks on Linux servers. By analyzing request traffic, a rule-based detection engine is used to detect web interface attacks in real time, and an implementation solution based on Nginx and ModSecurity is introduced with code examples.
Rule 1: Detect SQL injection attacks
Matching pattern: 'OR '1'='1
Action: Intercept the request and record the IP address
Rule 2: Detect XSS attacks
Match pattern: <script>alert('XSS')</script>
Action: Intercept the request and record the IP address
Rule 3: Detect CSRF attacks
Matching pattern:
Action: Intercept the request and record the IP address
Sample code 1: Nginx configuration file
server { listen 80; server_name example.com; location / { ModSecurityEnabled on; ModSecurityConfig modsecurity.conf; proxy_pass http://backend; } }
Sample code 2: ModSecurity configuration file (modsecurity.conf)
SecRuleEngine On SecRule REQUEST_FILENAME "@rx /login.php" "id:1,rev:1,phase:2,deny,status:403,msg:'SQL Injection attack detected'" SecRule REQUEST_FILENAME "@rx /index.php" "id:2,rev:1,phase:2,deny,status:403,msg:'XSS attack detected'" SecRule REQUEST_FILENAME "@rx /logout.php" "id:3,rev:1,phase:2,deny,status:403,msg:'CSRF attack detected'"
In the above example, the ModSecurity module is enabled in the Nginx configuration file and the ModSecurity configuration file is specified. Three rules are defined in the ModSecurity configuration file to detect SQL injection attacks, XSS attacks and CSRF attacks respectively.
The above is the detailed content of Linux Server Network Security: Real-time Detection and Response to Web Interface Attacks.. For more information, please follow other related articles on the PHP Chinese website!