Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for tracking attackers based on url

A technology of attackers and secret marks, applied in the field of network security, can solve the problems of being unable to judge attackers based on this, and whether different intrusion events belong to the same attacking organization, etc.

Active Publication Date: 2019-09-27
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the invaded government and enterprise can obtain the screen information recorded in these screenshots and photos afterwards, it is impossible to determine who the attacker is, and it is also impossible to determine whether different intrusion events belong to the same attacking organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for tracking attackers based on url
  • A method and system for tracking attackers based on url
  • A method and system for tracking attackers based on url

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0051] The present invention also provides Embodiment 2 of a method for tracing attackers based on URL secrets, such as figure 2 shown, including:

[0052]S201 obtains the identity information of the visitor, and forms a secret based on the identity information;

[0053] S202 adds the secret note to the visited URL;

[0054] S203 captures the screen information disclosed by the attacker;

[0055] S204 extracts the URL in the screen information, and obtains the identity information of the attacker based on the secret memory in the URL;

[0056] S205 traces the source of the attacker or associates the attacking organization based on the identity information of the attacker.

[0057] Preferably, the webpage information tampered with by the attacker is repaired, so as to restore the normal access service of the website.

[0058] Preferably, obtaining the identity information of the visitor and forming a secret based on the identity information, specifically:

[0059] If the ...

Embodiment 1

[0063] The present invention secondly provides a system embodiment 1 of an attacker based on URL secret traceback, such as image 3 shown, including:

[0064] The secret generation module 301 is used to obtain the identity information of the visitor, and form a secret based on the identity information;

[0065] A secret adding module 302, for adding the secret to the visited URL;

[0066] The information capture module 303 is used to capture the screen information disclosed by the attacker;

[0067] The identity recognition module 304 is configured to extract the URL in the screen information, and obtain the identity information of the attacker based on the secret in the URL.

[0068] Preferably, the secret generation module is specifically used for:

[0069] If the website server receives the visitor's access request, it acquires the visitor's identity information, and encodes the identity information to form a secret note.

[0070] Preferably, the secret addition module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for tracing an attacker based on a URL secret mark. The method comprises the steps of acquiring identity information of a visitor, and forming the secret mark based on the identity information; adding the secret mark into a visited URL; capturing screen information disclosed by the attacker; and extracting the URL in the screen information, and acquiring the identity information of the attacker based on the secret mark in the URL, wherein the identity information includes but not limited to an IP, the type and version of an operating system, a browser version, a screen resolution or time. According to the technical scheme of the method and the system provided by the invention, the secret mark is hidden in the URL of the screen information disclosed by the attacker by using a method of adding the secret mark into the URL of a page to be skipped in website development, and the identity information of the attacker is learned by acquiring and analyzing the secret mark, thus assisting to position the attacker or associate an attack organization.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for tracing the source of attackers based on URL secrets. Background technique [0002] For political or commercial purposes, some attackers tamper with website pages many times after invading government and corporate websites, such as leaving reactionary slogans or slandering the information of the compromised website. In order to prove their intrusion results, show off to others, or achieve their political and commercial purposes, attackers often take screenshots, photos, etc. of the tampered page (including the URL pointing to the page in the browser address bar) to record screen information. And share such screenshots and photos through social networks. [0003] Although the invaded government and enterprise can obtain the screen information recorded in these screenshots and photos afterwards, they cannot determine who the attacker is or whether ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/955
Inventor 李柏松
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD