[go: up one dir, main page]

CN106657074A - URL camouflage and hidden parameter transmission method and system - Google Patents

URL camouflage and hidden parameter transmission method and system Download PDF

Info

Publication number
CN106657074A
CN106657074A CN201611217510.XA CN201611217510A CN106657074A CN 106657074 A CN106657074 A CN 106657074A CN 201611217510 A CN201611217510 A CN 201611217510A CN 106657074 A CN106657074 A CN 106657074A
Authority
CN
China
Prior art keywords
parameter
url
list
module
camouflages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611217510.XA
Other languages
Chinese (zh)
Inventor
江液
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201611217510.XA priority Critical patent/CN106657074A/en
Publication of CN106657074A publication Critical patent/CN106657074A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a URL camouflage and hidden parameter transmission method and system. The method disclosed by the invention comprises four steps of parameter transmission, filter response, parameter acquisition and parameter display, and the system disclosed by the invention comprises the following four modules: a form generation module, a filtering module, a storage module and a redirection display module. According to the URL camouflage and hidden parameter transmission method and system disclosed by the invention, an URL address is analyzed from the angle of security so as to hide all kinds of sensitive information as much as possible, and a URL address without specific meaning is even provided, so that a malicious attacker cannot easily acquire key information from the URL.

Description

A kind of URL camouflages and parameter hide the method and system of transmission
Technical field
The present invention relates to technical field of network security, more particularly to a kind of URL camouflages and parameter hide transmission method and System.
Background technology
URL is an important information, existing browser often Transfer Parameters between each page, and these are joined Several titles and value all can come out in URL address fields, or even occur with plaintext, and sometimes the title of parameter may be just It is the title of certain field in database, it is so very dangerous, some key messages of web applications are easily exposed, this ground Location exposes the sensitive informations such as user name and password, is easily invaded by malicious attacker camouflage URL, is subject under fire.
Specific example is such as:
【https://www.xxxx.com/loginUser=admin&passwd=123345&role=121&ie= Utf-8&rsv_idx=1&lang=cn&rs_src=0】, this address exposes the sensitive informations such as user name and password.
【http://www.chinawebanalytics.cn/P=917】This is the address of the new blog of Sidney, can Very long a period of time is runed to analyze this blog, No. ID is all discharged to 917.
【http://adsclick.qq.com/adsclickOid=1112901&loc=QQ_SX_JY_Test6&url =http://www.52-abc.com/】This is the right side advertisement link of QQ homepages, and the abundant parameter in the inside has told that we are right The name definition of these advertisement positions, and the destination address for redirecting.
【http://www.soso.com/qSp=S&sc=web&cid=w.q.in.sb.web&ty=1&bn=&op =entry&kw=&w=WA】This is that " WA " result page is searched by Tengxun, teaches that search keyword parameter is to use W variables. Also perhaps some other parameters, fail to understand quickly, if necessary can test of many times research again, it is possible to it is determined that.
Can be seen that these parameters are easily utilized by malicious attacker by these examples, camouflage URL is invaded, and is subject to Under fire.
One kind as disclosed in the Chinese invention patent of Publication No. CN102801810A is hidden in content distributing network The method of URL, user's players carry out Base64 encryptions to the video file path in request URL in advance, after then encrypting Request URL ask available CDN node to CDN dispatch servers;The CDN dispatch servers are carried out to the request URL After Base64 decryption, according to scheduling strategy, an available CDN node is selected;The CDN dispatch servers will be described available The address of CDN node returns to the user's players;The available CDN node address is received in the user's players Afterwards, Base64 encryptions are carried out to the video file path in request URL, then by the request URL after encryption to described available CDN node sends video data request;The available CDN node is received after the request of the video data after the encryption, to it Carry out Base64 decryption and the video data asked is sent into the user's players.But, the method is not suitable for net Page Transfer Parameters, and overall step is excessively loaded down with trivial details.
The content of the invention
For the above-mentioned deficiency of prior art, the invention provides a kind of URL camouflages and parameter hide the method for transmission and System.
To reach above-mentioned purpose, the present invention is adopted the following technical scheme that:
A kind of method that URL camouflages and parameter hide transmission, it is comprised the following steps:
Step one, parameter transmission arranges list and simultaneously is set to hide by the list, by the list by parameter and meeting The sequence number storage that words are produced when setting up, when the page triggers list event, the parameter is transferred to filter by the list.
Step 2, filter response, the filter judged the list content by rule configuration information, and The legal parameter is collected, then the filter is carried out according to corresponding purpose URL in the rule configuration information Redirect.
Step 3, parameter acquiring, purpose URL obtains correspondence parameter according to condition by the filter.
Step 4, parameter shows that real URL address is redirected, and the parameter is shown in into client.
As preferred, the parameter mode that list described in described step one is transmitted to the filter of the present invention For message transmission.
Used as the preferred of the present invention, described rule configuration information is as follows:
<rule>
<from>…</from>
<to>…</to>
</rule>
Wherein<from>…</from>Comprising the URL addresses for being presented directly to user and being pretended,<to>…</to>Bag Containing the URL addresses being truly redirected.
Used as the preferred of the present invention, described rule configuration information is described using regular expression.
As the preferred of the present invention, the sequence number that condition described in the step 3 is randomly generated when being session establishment.
Used as the preferred of the present invention, the filter is stored by key-value databases to the URL contents.
As the preferred of the present invention, from the key-value data after real URL address is redirected in the step 4 Storehouse client is taken out and be shown in the parameter.
The invention also discloses the system that a kind of URL camouflages and parameter hide transmission, it is included such as lower module:
List production module, filtering module, memory module and redirection display module, details are as follows for each module:
Described list production module is used to generate hiding list, and the sequence number produced during by parameter and session establishment It is stored in the list;
Described filtering module is used to be screened the data for receiving by rule configuration information to include meeting rule The parameter then, and redirected according to corresponding purpose URL in the rule configuration information;
Described memory module is used to store the parameter and purpose URL;
Described redirection display module is used to redirect real URL address, takes out described from the memory module Parameter, and the parameter is shown in into client.
Used as the preferred of the present invention, described list is produced between module and the filtering module by message transmission mode Carry out data communication.
Used as the preferred of the present invention, described memory module is arranged in the filtering module.
The invention has the advantages that:
Present invention reduces network application is subjected to the probability of malicious attack, while increased corresponding intrusion scene, lifted Internet security.
Description of the drawings
Fig. 1 is the workflow schematic diagram of the present invention;
Fig. 2 is the system block diagram of the present invention;
Filter is used for the data structure diagram of recording parameters in the present invention of Fig. 3 positions;
In diagram, 1- lists production module;2- filtering modules;3- memory modules;4- redirects display module.
Specific embodiment
The following is the specific embodiment of the present invention and combine accompanying drawing, technical scheme is further described, But the present invention is not limited to these embodiments.
The present invention is analyzed for URL addresses from security standpoint, it is therefore an objective to hide all kinds of sensitive informations as far as possible, very To a kind of URL addresses without concrete meaning are provided, allow malicious attacker easily key message can not be obtained from URL and attacked Hit.
As shown in figure 1, URL is divided for regular section and argument section, a concrete such as URL in the inventive method
【http://www.aspxfans.com:8080/news/index.aspBoardID=5&ID=24618& Page=1#name】, wherein, protocol section, domain name part, port section, virtual directory part, file names portion and anchor portion Divide the content that can be expressed all without the information for revealing user, the content expressed by them is some regular contents, so, will Those parts all put regular section under, and
The content of " boardID=5&ID=24618&page=1#name " then relate to include name, ID, current page etc. Particular content, these contents have all referred to user profile, and the information leakage of user, institute can be caused if being intercepted and captured by attacker All to put the part part relevant with design parameter under argument section.
The main purpose of the present invention is both to protect the argument section not to be trapped in data transfer, the inventive method Specific embodiment is comprised the following steps:
Step one, parameter transmission
List is set and is set to list to hide, the sequence number randomly generated during by list by parameter and session establishment is deposited Storage, sequence number form therein as shown in figure 3, be both the content of sequence No. parts, parameter is corresponding relation with sequence number, It is both next to take out parameter while storing the corresponding sequence number for producing of the parameter and this facilitate that when parameter is stored by list, when During page triggering list event, parameter is transferred in the way of message transmission list filter, and the present embodiment is passed using message Passing (POST) mode and be advantageous in that can avoid parameter from malfunctioning, in actual browser use, in may containing in parameter Text and cause some browsers to malfunction, inventor find in the browser of the similar kernel such as red fox browser, mainly use Middle get modes enter line parameter transmission, and it is to malfunction that this result is exactly Chinese parameter, this reduces Consumer's Experience.
Step 2, filter response
The present embodiment mainly filters all requests of user by the preferential answering mechanism of filter, and filter passes through Rule configuration information is judged the list content for receiving, and collects legal parameter, and these parameters are deposited Storage.
Parameter storage organization schematic diagram as shown in figure 3, and then filter according to corresponding real in rule configuration information Purpose URL is redirected, and in implementation procedure in this step, parameter is worn camouflage well, what attacker can intercept and capture Only it is merely the URL of camouflage, improves security.
Step 3, parameter acquiring
Purpose URL obtains correspondence parameter according to condition by filter, and the condition mentioned in it is exactly sequence number, in Fig. 3 In be expressed as sep1~sepN, filter obtains correspondence parameter from parameter storage organization, is both and the parameter corresponding to sequence number Part, the content for being included by Parameters description parts in figure 3.
The parameter storage organization of the present embodiment to URL contents using key-value database realizings as shown in figure 3, deposited Storage.
Step 4, parameter shows
After real URL address is redirected, will ginseng from parameter storage organization (key-value databases) after being redirected Number takes out and is simultaneously shown in client, wherein, the Request parts of the parameter of display from parameter storage organization are taken out.
The present embodiment is directed to URL addresses from having carried out pretending and having hidden from security standpoint, will include all kinds of sensitive informations Argument section is hidden, it is possible to self-defined to provide a kind of URL addresses without concrete meaning, is both the URL addresses of camouflage, and The pass through mechanism of the present invention causes attacker to intercept and capture the URL of camouflage, and the URL is writing, so will not expose appointing What user profile and actual valuable parameter, such attacker just cannot obtain valuable thing from the URL, while will Valuable parameter is hidden transmission, until client shows that link just shows that this just significantly improves security.
Simultaneously the inventive method embodiment also helps the crawl of search engine, because the search engine pair of currently the majority The crawl of dynamic page is also weaker, and they prefer to capture some static pages.And the inventive method is in fact by dynamic The part (being both argument section) of display become the static page (being both the URL of camouflage), so advantageously draw in search The crawl held up.
And for a user, originally excessively loaded down with trivial details URL's was readable very poor, and the present embodiment allows user to be easier Understand, because the address of the page for being concerned about website is gone at rarely useful family, but readability is strengthened still to general big-and-middle-sized website It is necessary.Can so allow website more perfect.
The camouflage URL that the present embodiment rewrites allows the present embodiment very easily to reuse, and improves the transplantability of website.When If backstage method is changed, it is ensured that the page address portions on foreground are without changing.Which improves the transplantability of website.
Rule configuration information in the inventive method embodiment is described using regular expression, and canonical can be more rapidly Complete work.
Additionally, there is the ability in capture character string, canonical can also well complete work, such as intercept the domain of URL Name or other content etc., during for being described to the rule configuration information of the present embodiment, can avoid occurring due to Mistake caused by character-string problem, while operating efficiency can also be improved.
Specific rule configuration information is in method of the present invention embodiment:
Wherein,<from>…</from>Comprising the URL addresses for being presented directly to user and being pretended,<to>…</to>Bag Containing the URL addresses being truly redirected, for example:
Wherein,<from>/action/login/login_([0-9]+)</from>It is presented only to user/action/ Login/login_ ([0-9]+) part, be both to show login account be 0~9 numeral constitute, and
<to>/action/login/login.doUser=$ username&password=$ pwd&id=$ 1</to> Part is then actual parameter, and content includes user name, password and ID.
As shown in Fig. 2 the system embodiment of the present invention is included such as lower module:
List production module 1, filtering module 2, memory module 3 and redirection display module 4, the particular content of each module Details are as follows:
List production module 1 is used to generate hiding list, and the sequence number storage produced during by parameter and session establishment In list;
Filtering module 2 is used to be screened the data for receiving by rule configuration information to include legal ginseng Number, and redirected according to corresponding purpose URL in rule configuration information;
Memory module 3 is used to store parameter and purpose URL;
Redirecting display module 4 is used to redirect real URL address, takes out parameter from memory module 3, and by parameter It is shown in client.
List production module 1 is connected with filtering module 2, and carries out data communication, memory module 3 by message transmission mode It is arranged in filtering module 2, redirects display module 4 and be connected with filtering module 2, and data is taken out from memory module 3.
And the implementation of filtering module 2 is as follows:
First, a newly-built Web Project, when creating, " Add JSTL libraries to are chosen in selection WEB-INF/lib folder ", then import to URLrewrite-2.6.0.jar under project Bulid Path paths, most again After add struts frameworks;
Then, web.xml files are configured, configuration code is added in web.xml configuration files;
Moreover, increase URLrewrite.xml files newly, finally the newly-built one regular configuration file under WEB-INF catalogues.
Rule is URL rewriting rules in regular configuration file, and from is the address for showing, to is the reality of mapping Address, 1 is overwrite parameter, and its value is to correspond with the regular expression in from, can be multiple, and it is matching that () is inner Regular expression, in the start of string of regular expression ^ designated characters, de>$de>To specify end.
The system of the present invention can be by URL addresses from having carried out pretending and having hidden, by the parameter comprising all kinds of sensitive informations Part is hidden, and is both the URL addresses of camouflage by the self-defining URL addresses without concrete meaning, is shown.
Additionally, present system coordinates the pass through mechanism of the inventive method so that attacker can only intercept and capture the URL of camouflage, and The URL was written over, so any user profile and actual valuable parameter will not be exposed, such attacker is with regard to nothing Method obtains valuable thing from the URL, while valuable parameter is hidden into transmission, until client shows link Just show, this undoubtedly significantly improves security.
The implementation of present system is simple, is not related to the setting up procedure of complexity, and simply simple configuration can be completed.
Present invention reduces network application is subjected to the probability of malicious attack, while increased corresponding intrusion scene, lifted Internet security.
Embodiment described above is only that the preferred embodiment of the present invention is described, not to the design of the present invention It is defined with scope.On the premise of without departing from design concept of the present invention, technical side of this area ordinary person to the present invention Various modifications and improvement that case is made, all should drop into protection scope of the present invention, the technology contents that the present invention is claimed, Jing is all recorded in detail in the claims.

Claims (10)

1. a kind of method that URL camouflages and parameter hide transmission, it is characterised in that:Comprise the following steps,
Step one, arranges list and is set to hide by the list, will be produced when parameter and session establishment by the list Sequence number storage, when the page trigger list event when the list parameter is transferred into filter;
Step 2, the filter is judged the list content by rule configuration information, and collects legal The parameter, the filter is redirected according to corresponding purpose URL in the rule configuration information;
Step 3, purpose URL obtains correspondence parameter according to condition by the filter.
Step 4, real URL address is redirected, and the parameter is shown in into client.
2. the method that a kind of URL camouflages according to claim 1 and parameter hide transmission, it is characterised in that:In step one, The list to the parameter mode that the filter is transmitted is message transmission.
3. the method that a kind of URL camouflages according to claim 1 and parameter hide transmission, it is characterised in that:Described rule Then configuration information is:
Wherein,<from>…</from>Comprising the URL addresses for being presented directly to user and being pretended,<to>…</to>Comprising true The URL addresses being redirected in fact.
4. the method that a kind of URL camouflages according to claim 1 and parameter hide transmission, it is characterised in that:Described rule Then configuration information is described using regular expression.
5. the method that a kind of URL camouflages according to claim 1 and parameter hide transmission, it is characterised in that:In step 3, The sequence number that the condition is randomly generated when being session establishment.
6. the method that a kind of URL camouflages according to claim 1 and parameter hide transmission, it is characterised in that:The filtration Device is stored by key-value databases to the URL contents.
7. the method that a kind of URL camouflages according to claim 6 and parameter hide transmission, it is characterised in that:In step 4, Client is taken out and be shown in the parameter from the key-value databases after being redirected in real URL address.
8. the system that a kind of URL camouflages and parameter hide transmission, it is characterised in that:Including list production module (1), filtering module (2), memory module (3) and redirection display module (4);
Described list produces module (1) for generating hiding list, and the sequence number produced during by parameter and session establishment It is stored in the list;
Described filtering module (2) is for being screened the data for receiving by rule configuration information to include meeting rule The parameter, and redirected according to corresponding purpose URL in the rule configuration information;
Described memory module (3) is for storing the parameter and purpose URL;
Described redirection display module (4) takes out institute for real URL address to be redirected, from the memory module (3) Parameter is stated, and the parameter is shown in into client.
9. the system that a kind of URL camouflages according to claim 8 and parameter hide transmission, it is characterised in that:Described table Data communication is carried out by message transmission mode between single production module (1) and the filtering module (2).
10. the system that a kind of URL camouflages according to claim 8 and parameter hide transmission, it is characterised in that:Described deposits Storage module (3) is arranged in the filtering module (2).
CN201611217510.XA 2016-12-26 2016-12-26 URL camouflage and hidden parameter transmission method and system Pending CN106657074A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611217510.XA CN106657074A (en) 2016-12-26 2016-12-26 URL camouflage and hidden parameter transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611217510.XA CN106657074A (en) 2016-12-26 2016-12-26 URL camouflage and hidden parameter transmission method and system

Publications (1)

Publication Number Publication Date
CN106657074A true CN106657074A (en) 2017-05-10

Family

ID=58828410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611217510.XA Pending CN106657074A (en) 2016-12-26 2016-12-26 URL camouflage and hidden parameter transmission method and system

Country Status (1)

Country Link
CN (1) CN106657074A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088884A (en) * 2018-09-26 2018-12-25 平安医疗健康管理股份有限公司 Network address access method, device, server and the storage medium of identity-based verifying
CN110365676A (en) * 2019-07-12 2019-10-22 浙江智贝信息科技有限公司 Guard method and system are obscured in a kind of encryption of website static page
CN111104697A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Single sign-on control method and device and terminal
CN114401115A (en) * 2021-12-20 2022-04-26 浙江乾冠信息安全研究院有限公司 Method, system, apparatus and medium for detecting anti-detection webpage tampering

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163161A (en) * 2007-11-07 2008-04-16 福建星网锐捷网络有限公司 United resource localizer address filtering method and intermediate transmission equipment
CN101662464A (en) * 2008-08-26 2010-03-03 阿里巴巴集团控股有限公司 System for realizing HTTP request service and method thereof
CN102801810A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Method for hiding URL (Uniform Resource Locator) in content delivery network
CN103501304A (en) * 2013-10-12 2014-01-08 深信服网络科技(深圳)有限公司 Method and device for controlling unauthorized access of web system
CN104158799A (en) * 2014-07-17 2014-11-19 天津大学 HTTP DDOS defense method based on URL dynamic mapping

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163161A (en) * 2007-11-07 2008-04-16 福建星网锐捷网络有限公司 United resource localizer address filtering method and intermediate transmission equipment
CN101662464A (en) * 2008-08-26 2010-03-03 阿里巴巴集团控股有限公司 System for realizing HTTP request service and method thereof
CN102801810A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Method for hiding URL (Uniform Resource Locator) in content delivery network
CN103501304A (en) * 2013-10-12 2014-01-08 深信服网络科技(深圳)有限公司 Method and device for controlling unauthorized access of web system
CN104158799A (en) * 2014-07-17 2014-11-19 天津大学 HTTP DDOS defense method based on URL dynamic mapping

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
(美)SUBRAHMANYAM ALLAMARAJU等著,闻到工作室译: "《J2EE服务器端高级编程》", 31 December 2001, 北京:机械工业出版社 *
875675418: "url隐藏的几种方法", 《百度文库》 *
FOLLOW ME BABY: "伪静态_URLRewrite实例解析", 《百度文库》 *
QIAOXUESHI: "Url Rewrite Filter 3.2.0稳定版手册", 《百度文库》 *
王姝: "《PHP+MySQL WEB开发技术教程》", 31 December 2014, 西安:西北大学出版社 *
许礼捷,周立峰: "URL重写技术实现网站伪静态", 《沙洲职业工学院学报》 *
陈磊等: "《JSP设计与开发》", 31 July 2016, 北京:北京理工大学出版社 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088884A (en) * 2018-09-26 2018-12-25 平安医疗健康管理股份有限公司 Network address access method, device, server and the storage medium of identity-based verifying
CN109088884B (en) * 2018-09-26 2022-02-01 平安医疗健康管理股份有限公司 Website access method, device, server and storage medium based on identity authentication
CN111104697A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Single sign-on control method and device and terminal
CN111104697B (en) * 2018-10-26 2022-03-01 珠海格力电器股份有限公司 Single sign-on control method and device and terminal
CN110365676A (en) * 2019-07-12 2019-10-22 浙江智贝信息科技有限公司 Guard method and system are obscured in a kind of encryption of website static page
CN114401115A (en) * 2021-12-20 2022-04-26 浙江乾冠信息安全研究院有限公司 Method, system, apparatus and medium for detecting anti-detection webpage tampering
CN114401115B (en) * 2021-12-20 2024-04-05 浙江乾冠信息安全研究院有限公司 Method, system, device and medium for detecting tamper of anti-detected webpage

Similar Documents

Publication Publication Date Title
Javed et al. A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions
Ince A Dictionary of the Internet
CA2683600C (en) A system and method for creating a list of shared information on a peer-to-peer network
US7962756B2 (en) Method and apparatus for providing automatic generation of webpages
US7958227B2 (en) Attributes of captured objects in a capture system
CN102158493B (en) A kind of Cookie analytic method, device and a kind of client
CN106656922A (en) Flow analysis based protective method and device against network attack
US20120011590A1 (en) Systems, methods and devices for providing situational awareness, mitigation, risk analysis of assets, applications and infrastructure in the internet and cloud
WO2015149062A1 (en) System and method for predicting impending cyber security events using multi channel behavioral analysis in a distributed computing environment
CN106657074A (en) URL camouflage and hidden parameter transmission method and system
US20020038431A1 (en) Internet privacy system
Srinivasan et al. Understanding cross-channel abuse with sms-spam support infrastructure attribution
CN116346430A (en) Network threat management system based on high-interactivity honeypot
Wang et al. Towards comprehensive analysis of tor hidden service access behavior identification under obfs4 scenario
Blakely Cyberprints: identifying cyber attackers by feature analysis
Alotaibi et al. Computer forensics: dark net forensic framework and tools used for digital evidence detection
Randall et al. The challenges of blockchain-based naming systems for malware defenders
Takahashi et al. Retrieving knowledge from auditing log‐files for computer and network forensics and accountability
Mbah A phishing e-mail detection approach using machine learning techniques
Nair et al. A tool to extract onion links from Tor hidden services and identify illegal activities
Ghiani et al. Security in migratory interactive web applications
Wang et al. An empirical study: automated subdomain takeover threat detection
Ibrahim et al. Modelling based approach for reconstructing evidence of VoIP malicious attacks
Ramakrishnan et al. Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
Dutta et al. Introduction to digital forensics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510