Unlock instant, AI-driven research and patent intelligence for your innovation.
A method and system for tracking attackers based on url
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of attackers and secret marks, applied in the field of network security, can solve the problems of being unable to judge attackers based on this, and whether different intrusion events belong to the same attacking organization, etc.
Active Publication Date: 2019-09-27
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] Although the invaded government and enterprise can obtain the screen information recorded in these screenshots and photos afterwards, it is impossible to determine who the attacker is, and it is also impossible to determine whether different intrusion events belong to the same attacking organization
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 2
[0051] The present invention also provides Embodiment 2 of a method for tracing attackers based on URL secrets, such as figure 2 shown, including:
[0052]S201 obtains the identity information of the visitor, and forms a secret based on the identity information;
[0053] S202 adds the secret note to the visited URL;
[0054] S203 captures the screen information disclosed by the attacker;
[0055] S204 extracts the URL in the screen information, and obtains the identity information of the attacker based on the secret memory in the URL;
[0056] S205 traces the source of the attacker or associates the attacking organization based on the identity information of the attacker.
[0057] Preferably, the webpage information tampered with by the attacker is repaired, so as to restore the normal access service of the website.
[0058] Preferably, obtaining the identity information of the visitor and forming a secret based on the identity information, specifically:
[0059] If the ...
Embodiment 1
[0063] The present invention secondly provides a system embodiment 1 of an attacker based on URL secret traceback, such as image 3 shown, including:
[0064] The secret generation module 301 is used to obtain the identity information of the visitor, and form a secret based on the identity information;
[0065] A secret adding module 302, for adding the secret to the visited URL;
[0066] The information capture module 303 is used to capture the screen information disclosed by the attacker;
[0067] The identity recognition module 304 is configured to extract the URL in the screen information, and obtain the identity information of the attacker based on the secret in the URL.
[0068] Preferably, the secret generation module is specifically used for:
[0069] If the website server receives the visitor's access request, it acquires the visitor's identity information, and encodes the identity information to form a secret note.
[0070] Preferably, the secret addition module ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method and a system for tracing an attacker based on a URL secret mark. The method comprises the steps of acquiring identity information of a visitor, and forming the secret mark based on the identity information; adding the secret mark into a visited URL; capturing screen information disclosed by the attacker; and extracting the URL in the screen information, and acquiring the identity information of the attacker based on the secret mark in the URL, wherein the identity information includes but not limited to an IP, the type and version of an operating system, a browser version, a screen resolution or time. According to the technical scheme of the method and the system provided by the invention, the secret mark is hidden in the URL of the screen information disclosed by the attacker by using a method of adding the secret mark into the URL of a page to be skipped in website development, and the identity information of the attacker is learned by acquiring and analyzing the secret mark, thus assisting to position the attacker or associate an attack organization.
Description
technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for tracing the source of attackers based on URL secrets. Background technique [0002] For political or commercial purposes, some attackers tamper with website pages many times after invading government and corporate websites, such as leaving reactionary slogans or slandering the information of the compromised website. In order to prove their intrusion results, show off to others, or achieve their political and commercial purposes, attackers often take screenshots, photos, etc. of the tampered page (including the URL pointing to the page in the browser address bar) to record screen information. And share such screenshots and photos through social networks. [0003] Although the invaded government and enterprise can obtain the screen information recorded in these screenshots and photos afterwards, they cannot determine who the attacker is or whether ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.