CN108510007A - A kind of webpage tamper detection method, device, electronic equipment and storage medium - Google Patents

A kind of webpage tamper detection method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN108510007A
CN108510007A CN201810309228.7A CN201810309228A CN108510007A CN 108510007 A CN108510007 A CN 108510007A CN 201810309228 A CN201810309228 A CN 201810309228A CN 108510007 A CN108510007 A CN 108510007A
Authority
CN
China
Prior art keywords
detected
snapshots
web pages
pictorial element
collocation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810309228.7A
Other languages
Chinese (zh)
Inventor
杨旭
柴斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201810309228.7A priority Critical patent/CN108510007A/en
Publication of CN108510007A publication Critical patent/CN108510007A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of webpage tamper detection method, device, electronic equipment and storage mediums, belong to technical field of network security.This method is applied to server, the method includes:It determines in the case of reaching preset detection cycle, extracts the pictorial element in snapshots of web pages to be detected, obtain pictorial element collection;Each pictorial element in described image element set is inputted to the image detection model pre-established respectively, identifies the image type that the snapshots of web pages to be detected is included;Whether reasonably the described image type that will identify that inputs the sorter model pre-established, obtain about described image type collocation collocation result;Determine whether the snapshots of web pages to be detected is tampered based on the collocation result.The design realization that this method understands the webpage that is monitored without user can carry out a large amount of webpages to distort monitoring, greatly improve monitoring ease for use, reduce the workload of user.

Description

A kind of webpage tamper detection method, device, electronic equipment and storage medium
Technical field
The invention belongs to technical field of network security, and in particular to a kind of webpage tamper detection method, device, electronic equipment And storage medium.
Background technology
Webpage tamper refers to attacker by already present web page portions or is all modified to hostile content or in Website Building Simultaneously hostile content is written in new webpage.Webpage tamper not only affects the normal operation of website, but also can be a large amount of to public propagation Invalid information, harm are huge.
It is directed to webpage tamper at present, current popular technical solution is carried out for webpage control using detection device The content of some button or picture in monitoring, such as setting web page monitored, is alerted when content changes.The application Applicant found during studying the application, this technology existing defects, for example, it is desired to the user of monitoring device The design of the monitored webpage of solution realizes that, when there is a large amount of webpages to need monitoring, the workload of configuration is very big, once and webpage Design changes, and monitoring rules will also change therewith, and ease for use is poor.
Invention content
In consideration of it, the purpose of the present invention is to provide a kind of webpage tamper detection method, device, electronic equipment and storages to be situated between Matter, to effectively improve the above problem.
What the embodiment of the present invention was realized in:
In a first aspect, an embodiment of the present invention provides a kind of webpage tamper detection method, it is applied to server, the method Including:It determines in the case of reaching preset detection cycle, extracts the pictorial element in snapshots of web pages to be detected, obtain image primitive Element collection;Each pictorial element in described image element set is inputted to the image detection model pre-established respectively, identifies institute State the image type that snapshots of web pages to be detected is included;The described image type that will identify that inputs the grader mould pre-established Type, obtain about described image type collocation whether reasonably collocation result;It is determined based on the collocation result described to be detected Whether snapshots of web pages is tampered.
Second aspect, the embodiment of the present invention additionally provide a kind of webpage tamper detection device, are applied to server, the dress Set including:Extraction module, identification module, collocation result obtain module and determining module.Extraction module is preset for determining to reach Detection cycle in the case of, extract the pictorial element in snapshots of web pages to be detected, obtain pictorial element collection;Identification module is used In each pictorial element in described image element set to be inputted to the image detection model pre-established respectively, described wait for is identified The image type that detection snapshots of web pages is included;Result of arranging in pairs or groups obtains module, the described image type input for will identify that The sorter model pre-established, obtain about described image type collocation whether reasonably collocation result;Determining module is used for Determine whether the snapshots of web pages to be detected is tampered based on the collocation result.
The third aspect, the embodiment of the present invention additionally provide a kind of electronic equipment, including:Memory and processor, it is described to deposit Reservoir is connected to the processor;The memory is for storing program;The processor is stored in the storage for calling Program in device, the method to execute the offer of first aspect embodiment.
Fourth aspect, the embodiment of the present invention additionally provide a kind of storage medium, and the storage medium is stored with processor can For the program code of execution in computer, the storage medium includes a plurality of instruction, and a plurality of instruction is configured to make described Processor executes the method that first aspect embodiment provides.
Webpage tamper detection method provided in an embodiment of the present invention is applied to server, the method includes:It determines and reaches In the case of preset detection cycle, the pictorial element in snapshots of web pages to be detected is extracted, obtains pictorial element collection;By the figure Each pictorial element that pixel element is concentrated inputs the image detection model pre-established respectively, identifies that the webpage to be detected is fast According to the image type for being included;The described image type that will identify that inputs the sorter model pre-established, obtains about institute State image type collocation whether reasonably collocation result;Based on the collocation result determine the snapshots of web pages to be detected whether by It distorts.Then this method is inputted the pictorial element extracted advance by extracting the pictorial element in snapshots of web pages to be detected The image detection model of foundation, identifies the type of the pictorial element, then recycles sorter model, judges the image type Whether arrange in pairs or groups rationally, if collocation is reasonable, illustrates that the webpage is not tampered with, such as arrange in pairs or groups unreasonable, then show that the webpage is tampered , this method is realized without the design of the monitored webpage of user's understanding and can carry out distorting monitoring to a large amount of webpages, greatly carries High monitoring ease for use, reduces the workload of user.
Other features and advantages of the present invention will be illustrated in subsequent specification, also, partly be become from specification It is clear that being understood by implementing the embodiment of the present invention.The purpose of the present invention and other advantages can be by being write Specifically noted structure is realized and is obtained in specification, claims and attached drawing.
Description of the drawings
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.Shown in attached drawing, above and other purpose of the invention, feature and advantage will be more clear.In whole Identical reference numeral indicates identical part in attached drawing.Actual size equal proportion scaling is not pressed deliberately draws attached drawing, emphasis It is that the purport of the present invention is shown.
Fig. 1 shows a kind of interaction schematic diagram of network system provided in an embodiment of the present invention.
Fig. 2 shows the structural schematic diagrams of a kind of electronic equipment provided in an embodiment of the present invention.
Fig. 3 shows a kind of flow chart of webpage tamper detection method provided in an embodiment of the present invention.
Fig. 4 shows a kind of functional module schematic diagram of webpage tamper detection device provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, below the detailed description of the embodiment of the present invention to providing in the accompanying drawings be not intended to limit it is claimed The scope of the present invention, but be merely representative of the present invention selected embodiment.Based on the embodiments of the present invention, this field is common The every other embodiment that technical staff is obtained without creative efforts belongs to the model that the present invention protects It encloses.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
In the description of the present invention, it should be noted that term " first ", " second ", " third " etc. are only used for distinguishing and retouch It states, is not understood to indicate or imply relative importance.
Referring to Fig. 1, Fig. 1 is a kind of interaction schematic diagram of network system 100 provided in an embodiment of the present invention.The network system System 100 includes:Client terminal 120 and server 110, client terminal 120 carry out data interaction by network and server 110. For example, when determining that snapshots of web pages to be detected is tampered, default prompt message is sent to and the server for server 110 The client terminal 120 of 110 communications.
Wherein, in embodiments of the present invention, the server 110 may be, but not limited to, network server, database clothes Business device, cloud server etc..The client terminal 120 may be, but not limited to, PC (Personal computer, PC), smart mobile phone, tablet computer, mobile internet surfing equipment (Mobile Internet Device, MID), personal digital assistant Electronic equipments such as (Personal Digital Assistant, PDA).
As shown in Fig. 2, Fig. 2 shows the structure diagrams of a kind of electronic equipment 200 provided in an embodiment of the present invention.The electricity Sub- equipment 200 includes:Webpage tamper detection device 210, memory 220, storage control 230 and processor 240.Wherein, should Electronic equipment 200 can be above-mentioned server.
The memory 220, storage control 230,240 each element of processor directly or indirectly electrically connect between each other It connects, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or signal between each other Line, which is realized, to be electrically connected.The webpage tamper detection device 210 include it is at least one can be with software or firmware (firmware) Form be stored in the memory 220 or be solidificated in the electronic equipment 200 operating system (operating system, OS the software function module in).The processor 240 is used to execute the executable module stored in memory 220, such as described The software function module or computer program that webpage tamper detection device 210 includes.
Wherein, memory 220 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read- Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 220 is for storing program, and the processor 240 is after receiving and executing instruction, described in execution Program, the method performed by the electronic equipment 200 for the flow definition that aftermentioned any embodiment of the embodiment of the present invention discloses can answer It is realized in processor 240, or by processor 240.
Processor 240 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor can be General processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made programmable gate array Arrange (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.It may be implemented Or disclosed each method, step and logic diagram in the execution embodiment of the present invention.General processor can be microprocessor Or the processor can also be any conventional processor etc..
Referring to Fig. 3, be a kind of demodulation method applied to above-mentioned electronic equipment 200 provided in an embodiment of the present invention, under Face will in conjunction with Fig. 3 to its institute comprising the step of illustrate.
Step S101:It determines in the case of reaching preset detection cycle, extracts the image primitive in snapshots of web pages to be detected Element obtains pictorial element collection.
When reaching preset detection cycle, the pictorial element in snapshots of web pages to be detected is extracted, obtains pictorial element collection. Wherein, which is the picture of current webpage to be detected, can by periodically obtaining web page contents to be detected, and It is saved as picture.
Wherein, above-mentioned preset detection cycle can be set according to the significance level of webpage to be detected, for example, important Degree it is high the detection cycle can be set it is shorter, significance level it is low the detection cycle can be set it is more relatively long.
Wherein, it should be noted that when hacker shows its technical strength by distorting web page contents or lets off steam When, it will usually by homepage modification at the content with larger visual impact.Such as lofty hacker team logo, pornographic or Probably picture etc. cruelly, and has powerful contrast in webpage other parts.So by detecting the pictorial element in webpage, it can be with Detect such tampering.
Step S102:Each pictorial element in described image element set is inputted to the image detection mould pre-established respectively Type identifies the image type that the snapshots of web pages to be detected is included.
After acquiring pictorial element collection, each pictorial element in described image element set is inputted respectively and is built in advance Vertical image detection model identifies the image type that the snapshots of web pages to be detected is included, for example, building, personage are (e.g., Man, female), plant (e.g., set, flower, grass) etc..Wherein, which can be based on the first default rule Can be common object identification model in current field of image recognition, as a kind of embodiment party then with first sample structure Formula, the image detection model pre-established can be that original deep layer network is generated according to experiment text training, i.e., will be original Deep layer network is trained generation according to the similar webpage sample with webpage to be detected.For example, with Faster-RCNN models For illustrate, i.e., use MSCOCO data sets first, pre-training carried out to model, make it have the basic object category of identification Ability;Secondly, neural network is finely adjusted using normal website picture is crawled from internet;Then, using existing quilt Black webpage sample is finely adjusted neural network so that it can identify hacker logo;Again, using pornographic and sudden and violent probably sample to god It is finely adjusted through network so that it can identify corresponding pornographic and sudden and violent probably object features.Image detection model training is completed in this way, It can identify normal object category, hacker's marker, pornographic and fear object category cruelly.
Step S103:The described image type that will identify that inputs the sorter model pre-established, obtains about described Image type collocation whether reasonably collocation result.
After identifying image type included in current snapshots of web pages to be detected, the described image type that will identify that The sorter model pre-established is inputted, obtains whether reasonably (collocation is reasonable for collocation result about the collocation of described image type Or unreasonable).Wherein, which can be built based on the second preset rules and the second sample, The classification in the application is built for example, referring to the modeling method similar to the neural network language model in Language Processing field Device model.Due to, whether in object combination reasonable this problem, with language whether reasonable collocations problem be closely similar, because This, is referred to the method similar with the neural network language model in Language Processing field and is modeled.Wherein, model Training data is made of positive and negative two classes sample.Wherein positive sample is that the object classification of normal website is combined;Negative sample is to be hacked net The object classification combination stood.It, can be by that will carry hacker logo, pornographic and fear cruelly since negative sample quantity is much smaller than positive sample The classification of object is artificially added in the object classification of positive sample, negative sample is constructed manually, to optimize training effect.
In addition, the sorter model pre-established can also be logistic regression LR graders, support vector machines classification Device or convolutional neural networks CNN graders.
Step S104:Determine whether the snapshots of web pages to be detected is tampered based on the collocation result.
After obtaining about the collocation of described image type whether reasonably collocation result, institute is determined based on the collocation result State whether snapshots of web pages to be detected is tampered.Further, if the collocation result is unreasonable, it is determined that the survey grid to be checked Page snapshot is tampered;If the collocation result is reasonable, it is determined that the snapshots of web pages to be detected is not tampered with.
In addition, as an alternative embodiment, this method further includes:Described in being determined based on the collocation result When snapshots of web pages to be detected is tampered, default prompt message is sent to the client terminal with the server communication, to remind Currently webpage to be detected is tampered relevant persons in charge, to adopt remedial measures in time, avoids influencing to expand or deteriorating.
In addition, as an alternative embodiment, this method further includes:Between step S101 and S102, increase inspection The step of whether pictorial element surveyed in the snapshots of web pages to be detected is all extracted, to improve the accuracy of testing result, It avoids because certain pictorial elements are not extracted to, and the situation of result inaccuracy is caused to occur.As a kind of optional reality Mode is applied, it can be by carrying out repeatedly extraction pictorial element to the pictorial element in snapshots of web pages to be detected, to determine that this is to be checked Whether the pictorial element surveyed in snapshots of web pages is all extracted.The pictorial element even repeatedly extracted is consistent, then shows It is all extracted, if inconsistent, is subject to more.
The embodiment of the present invention additionally provides webpage tamper detection device 210, as shown in figure 4, the webpage tamper detection device 210 include:Extraction module 211, identification module 212, collocation result obtain module 213 and determining module 214.
Extraction module 211 extracts in the case of determining the preset detection cycle of arrival in snapshots of web pages to be detected Pictorial element obtains pictorial element collection.
Identification module 212, for each pictorial element in described image element set to be inputted the figure pre-established respectively As detection model, the image type that the snapshots of web pages to be detected is included is identified.
Result of arranging in pairs or groups obtains module 213, and the described image type for will identify that inputs the grader mould pre-established Type, obtain about described image type collocation whether reasonably collocation result.
Determining module 214, for determining whether the snapshots of web pages to be detected is tampered based on the collocation result.
In addition, the webpage tamper detection device 210 can also include:Detection module and/or modeling module (are to show in figure Go out).
Wherein, whether detection module, the pictorial element for detecting in the snapshots of web pages to be detected are all extracted.
Modeling module builds described image detection model for being based on the first preset rules and first sample, and is based on Second preset rules and the second sample build the sorter model.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other.
The technique effect of the webpage tamper detection device 210 that the embodiment of the present invention is provided, realization principle and generation and Preceding method embodiment is identical, and to briefly describe, device embodiment part does not refer to place, can refer in preceding method embodiment Corresponding contents.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, the flow chart in attached drawing and block diagram Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part for the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be to be different from The sequence marked in attached drawing occurs.For example, two continuous boxes can essentially be basically executed in parallel, they are sometimes It can execute in the opposite order, this is depended on the functions involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use function or the dedicated base of action as defined in executing It realizes, or can be realized using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, laptop, server or network equipment etc.) execute the whole of each embodiment the method for the present invention Or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.It should be noted that herein, relational terms such as first and second and the like are used merely to one A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or setting Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of webpage tamper detection method, which is characterized in that it is applied to server, the method includes:
It determines in the case of reaching preset detection cycle, extracts the pictorial element in snapshots of web pages to be detected, obtain image primitive Element collection;
Each pictorial element in described image element set is inputted to the image detection model pre-established respectively, is identified described The image type that snapshots of web pages to be detected is included;
The described image type that will identify that inputs the sorter model pre-established, and obtaining arranging in pairs or groups about described image type is No rational collocation result;
Determine whether the snapshots of web pages to be detected is tampered based on the collocation result.
2. according to the method described in claim 1, it is characterized in that, determining that the webpage to be detected is fast based on the collocation result According to after whether being tampered, further include:
When determining that the snapshots of web pages to be detected is tampered based on the collocation result, by default prompt message be sent to The client terminal of the server communication.
3. according to the method described in claim 1, it is characterized in that, extract the pictorial element in snapshots of web pages to be detected, obtain After pictorial element collection, further include:
Detect whether the pictorial element in the snapshots of web pages to be detected is all extracted;
When pictorial element in the snapshots of web pages to be detected is all extracted, step is executed:It will be in described image element set Each pictorial element input the image detection model pre-established respectively, identify that the snapshots of web pages to be detected is included Image type.
4. according to claim 1-3 any one of them methods, which is characterized in that extract the image in snapshots of web pages to be detected Element further includes before obtaining pictorial element collection:
Described image detection model is built based on the first preset rules and first sample, and is based on the second preset rules and second Sample builds the sorter model.
5. a kind of webpage tamper detection device, which is characterized in that be applied to server, described device includes:
Extraction module extracts the image primitive in snapshots of web pages to be detected in the case of determining the preset detection cycle of arrival Element obtains pictorial element collection;
Identification module, for each pictorial element in described image element set to be inputted the image detection mould pre-established respectively Type identifies the image type that the snapshots of web pages to be detected is included;
Result of arranging in pairs or groups obtains module, and the described image type for will identify that inputs the sorter model pre-established, obtains About described image type collocation whether reasonably collocation result;
Determining module, for determining whether the snapshots of web pages to be detected is tampered based on the collocation result.
6. device according to claim 5, which is characterized in that further include:Sending module, for being tied based on the collocation When fruit determines that the snapshots of web pages to be detected is tampered, default prompt message is sent to the client with the server communication Terminal.
7. device according to claim 5, which is characterized in that further include:Detection module, for detecting the survey grid to be checked Whether the pictorial element in page snapshot is all extracted.
8. according to claim 5-7 any one of them devices, which is characterized in that further include:Modeling module, for based on the One preset rules and first sample build described image detection model, and build institute based on the second preset rules and the second sample State sorter model.
9. a kind of electronic equipment, which is characterized in that including:Memory and processor, the memory are connected to the processor;
The memory is for storing program;
The processor is for calling the program being stored in the memory, to execute as described in claim any one of 1-4 Method.
10. a kind of storage medium, which is characterized in that the storage medium is stored with the executable program code of processor in calculating In machine, the storage medium includes a plurality of instruction, and a plurality of instruction is configured to that the processor is made to execute such as claim 1-4 any one of them methods.
CN201810309228.7A 2018-04-08 2018-04-08 A kind of webpage tamper detection method, device, electronic equipment and storage medium Pending CN108510007A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810309228.7A CN108510007A (en) 2018-04-08 2018-04-08 A kind of webpage tamper detection method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810309228.7A CN108510007A (en) 2018-04-08 2018-04-08 A kind of webpage tamper detection method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108510007A true CN108510007A (en) 2018-09-07

Family

ID=63380770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810309228.7A Pending CN108510007A (en) 2018-04-08 2018-04-08 A kind of webpage tamper detection method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108510007A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583514A (en) * 2018-12-19 2019-04-05 成都西纬科技有限公司 A kind of image processing method, device and computer storage medium
CN111506852A (en) * 2020-04-20 2020-08-07 承德石油高等专科学校 Intelligent web page data monitoring device and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350011A (en) * 2007-07-18 2009-01-21 中国科学院自动化研究所 Method for detecting search engine cheat based on small sample set
CN102169533A (en) * 2011-05-11 2011-08-31 华南理工大学 Commercial webpage malicious tampering detection method
US20120194916A1 (en) * 2011-01-28 2012-08-02 Crane & Co., Inc. laser marked device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350011A (en) * 2007-07-18 2009-01-21 中国科学院自动化研究所 Method for detecting search engine cheat based on small sample set
US20120194916A1 (en) * 2011-01-28 2012-08-02 Crane & Co., Inc. laser marked device
CN102169533A (en) * 2011-05-11 2011-08-31 华南理工大学 Commercial webpage malicious tampering detection method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583514A (en) * 2018-12-19 2019-04-05 成都西纬科技有限公司 A kind of image processing method, device and computer storage medium
CN111506852A (en) * 2020-04-20 2020-08-07 承德石油高等专科学校 Intelligent web page data monitoring device and method

Similar Documents

Publication Publication Date Title
CN108665297B (en) Method and device for detecting abnormal access behavior, electronic equipment and storage medium
CN107168854B (en) Internet advertisement abnormal click detection method, device, equipment and readable storage medium
CN105224606B (en) A kind of processing method and processing device of user identifier
US11036615B2 (en) Automatically performing and evaluating pilot testing of software
US20210035126A1 (en) Data processing method, system and computer device based on electronic payment behaviors
CN111708938B (en) Method, apparatus, electronic device, and storage medium for information processing
JP2018516421A (en) Network access operation identification method, server, and storage medium
CN112863683B (en) Medical record quality control method and device based on artificial intelligence, computer equipment and storage medium
CN109325179A (en) A kind of method and device that content is promoted
CN108021651A (en) Network public opinion risk assessment method and device
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium
CN111090807A (en) Knowledge graph-based user identification method and device
CN107612908A (en) webpage tamper monitoring method and device
CN108986125A (en) Object edge extracting method, device and electronic equipment
CN109313541A (en) For showing and the user interface of comparison attacks telemetering resource
Selay et al. Adaptive random testing for image comparison in regression web testing
CN115545103A (en) Abnormal data identification method, label identification method and abnormal data identification device
CN103544150A (en) Method and system for providing recommendation information for mobile terminal browser
CN112328869A (en) User loan willingness prediction method and device and computer system
CN108510007A (en) A kind of webpage tamper detection method, device, electronic equipment and storage medium
CN112839047B (en) Asset vulnerability scanning method, device, equipment and medium on cloud platform
CN110197375A (en) A kind of similar users recognition methods, device, similar users identification equipment and medium
CN103049629A (en) Method and device for detecting noise data
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium
CN104991920A (en) Label generation method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd.

Address before: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180907

RJ01 Rejection of invention patent application after publication