Unlock instant, AI-driven research and patent intelligence for your innovation.

Man-in-the-middle attack detection method and device, computer equipment and storage medium

An attack detection and man-in-the-middle technology, applied in the computer field, can solve the problem that the detection success rate is not high enough, and achieve the effect of improving the detection success rate

Active Publication Date: 2021-09-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the traditional method of detecting man-in-the-middle attacks, usually only through the terminal to perform security detection on the certificate of the obtained website link, this method may still be attacked by the man-in-the-middle but cannot be detected, and the detection success rate is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-in-the-middle attack detection method and device, computer equipment and storage medium
  • Man-in-the-middle attack detection method and device, computer equipment and storage medium
  • Man-in-the-middle attack detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0040] The man-in-the-middle attack detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the target server 104 and the man-in-the-middle attack detection server 106 respectively through the network. When the terminal 102 obtains the attack detection instruction, after sending a webpage access request to the target server 104 based on the attack detection instruction, the response result is generated according to whether the target server returns a redirection link...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a man-in-the-middle attack detection method and device, computer equipment and a storage medium, and the method comprises the steps: receiving a response result fed back by a terminal based on an attack detection instruction, wherein the response result is generated, after the terminal sends a webpage access request to a target server based on the attack detection instruction, according to whether a redirection link returned by the target server is received or not; receiving to-be-detected certificates of each list website obtained and uploaded by the terminal based on the attack detection instruction, and performing security detection on each to-be-detected certificate to obtain a certificate security detection result; and determining an attack detection result according to the response result and the certificate security detection result, and sending the attack detection result to the terminal. According to the method, whether the terminal is subjected to the man-in-the-middle attack or not is detected by the man-in-the-middle attack detection server in two modes, more situations that the terminal accesses the webpage server can be covered, and the detection success rate of the man-in-the-middle attack is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a man-in-the-middle attack detection method, device, computer equipment and storage medium. Background technique [0002] Man-in-the-Middle Attack ("MITM attack" for short) is an "indirect" intrusion attack. The request sent by the client to the server is intercepted by the middleman, and then the middleman pretends to be the client to communicate with the server; The server returns the data to the intermediary; the intermediary may tamper with the data and then return it to the client; in this process, compared to the terminal, the intermediary pretends to be the server, and compared to the server, the intermediary pretends to be the terminal, so that the intermediary can steal the user's sensitive information. Information; common MITM attacks include ARP (Address Resolution Protocol, Address Resolution Protocol) spoofing (ARP spoofing), DNS (Domain Name Server, doma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1408H04L63/1416
Inventor 江沛合
Owner TENCENT TECH (SHENZHEN) CO LTD