CN111064827A - Agent detection method, device, equipment and medium based on domain name generic resolution - Google Patents
Agent detection method, device, equipment and medium based on domain name generic resolution Download PDFInfo
- Publication number
- CN111064827A CN111064827A CN202010189470.2A CN202010189470A CN111064827A CN 111064827 A CN111064827 A CN 111064827A CN 202010189470 A CN202010189470 A CN 202010189470A CN 111064827 A CN111064827 A CN 111064827A
- Authority
- CN
- China
- Prior art keywords
- domain name
- resolution
- dns
- proxy
- access request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a proxy detection method based on domain name generic resolution, relates to the technical field of internet, and aims to judge whether an access request aiming at a generic domain name is proxy access or not by collecting DNS local resolution time of the generic domain name at the front end, so that the judgment time of proxy detection is shortened and the judgment accuracy is improved. The method comprises the following steps: receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution; collecting DNS local resolution time of the random domain name through a front end; and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access. The invention also discloses a proxy detection device based on domain name flooding analysis, electronic equipment and a computer storage medium.
Description
Technical Field
The invention relates to the technical field of internet, in particular to a proxy detection method, a device, equipment and a medium based on domain name flooding analysis.
Background
In internet access, there are a large number of accesses performed using a proxy server. A proxy server is a server that sits between a client application (e.g., an internet Web browser) and a real internet content server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Currently, the following detection methods are mainly used: the method comprises the steps of carrying out proxy detection by a reverse detection technology For detecting whether an IP source is opened at an 80 or 8080 port, realizing proxy detection by detecting X-Forward-For information in HTTP header information of an access source, realizing proxy detection by detecting Keep-alive message information and realizing proxy detection by detecting the opening condition of the IP port of the access source. However, these proxy detection methods have problems of being able to falsify detection results, having high delay and low accuracy to different degrees, for example, it takes more than several minutes to scan the port opening condition of the source IP of the access request, and also have problems of network delay and excessive access, so that it is impossible to determine the access mode in real time, and the proxy detection methods have poor timeliness and high time cost and labor cost. When the information in the request header is detected, the information of the request header is easy to forge, the detection result is interfered, and the detection result has a high false alarm rate, so that the authenticity of the detection result is low.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the purposes of the present invention is to provide a proxy detection method based on domain name flooding resolution, which aims to judge whether DNS local resolution is performed or not by collecting time-consuming information of DNS local resolution at a front end, so as to judge whether the DNS local resolution is a proxy access or not, and has the advantages of fast response time, low cost and strong authenticity.
One of the purposes of the invention is realized by adopting the following technical scheme:
a proxy detection method based on domain name broad resolution comprises the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Further, acquiring, by the front end, the DNS local resolution time of the random domain name specifically includes: calling a WEBAPI interface to acquire DNS local resolution time of the random domain name, wherein the WEB API interface is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming.
Further, the performing of difference determination on the DNS resolution time specifically includes: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
And further, generating a label value of the device fingerprint IP image according to the difference value.
Further, the random domain name after the extensive resolution is encrypted by Token and random characters.
Further, the front end is a browser, and the access request is an access request initiated by the client to the broadly-resolved random domain name.
Further, the random domain name after the extensive resolution is preset, and the random domain name after the extensive resolution resolves to the same IP.
The second purpose of the present invention is to provide a proxy detection device based on domain name broad-resolution, through which a user can call a front end to collect time-consuming information of DNS local resolution, and determine whether to access a proxy according to the time-consuming information, and the device has the advantages of fast response speed, low cost and strong authenticity. .
The second purpose of the invention is realized by adopting the following technical scheme:
a request receiving module, configured to receive an access request, where the access request includes a universally resolved random domain name;
the DNS analysis time-consuming acquisition module is used for acquiring DNS local analysis time of the random domain name through a front end;
and the judging module is used for judging the difference of the DNS resolution time, and if the DNS difference is equal to 0, the access request is proxy access.
It is a further object of the present invention to provide an electronic device for performing one of the above objects, comprising a processor, a storage medium, and a computer program, wherein the computer program is stored in the storage medium, and when being executed by the processor, the computer program implements the above proxy detection method based on domain name flooding.
It is a fourth object of the present invention to provide a computer-readable storage medium storing one of the objects of the invention, on which a computer program is stored, which, when being executed by a processor, implements the above-mentioned proxy detection method based on domain name flooding.
Compared with the prior art, the invention has the beneficial effects that:
by collecting the DNS local analysis time of the access request at the front end and judging whether the access request is proxy access according to the collected DNS local analysis time, the judgment time of proxy detection is shortened, the accuracy is improved, and the collection result can be used for supplementing the device fingerprint and IP portrait and is beneficial to enhancing the protection detection of the access device.
Drawings
FIG. 1 is a flow chart of a proxy detection method based on domain name flooding resolution of the present invention;
fig. 2 is a block diagram showing the structure of a proxy detection apparatus according to embodiment 2, which is based on domain name broad-resolution;
fig. 3 is a block diagram of the electronic apparatus of embodiment 3.
Detailed Description
The present invention will now be described in more detail with reference to the accompanying drawings, in which the description of the invention is given by way of illustration and not of limitation. The various embodiments may be combined with each other to form other embodiments not shown in the following description.
Example 1
The embodiment provides a proxy detection method based on domain name flooding resolution, which is based on the principle that proxy access does not perform local DNS resolution, but performs DNS resolution in a proxy server, and judges whether an access request uses a proxy according to whether DNS local resolution is performed in front-end access or not. When the resource access is carried out by using the agent, the time consumption of DNS local resolution is the millisecond number of long type other than 0, and when the resource access is carried out by using the agent, the time consumption of DND local resolution is always equal to 0, because when the resource access is carried out by using the agent, the relevant domain name information is packaged in the agent flow and sent to the agent client, the DNS resolution is carried out at the far end, and the DNS resolution is not carried out locally, so that whether the access request is the agent access or not can be judged according to the time consumption of the DNS local resolution.
However, when the time consumption of DNS local resolution is equal to 0, the corresponding access request is not necessarily accessed using a proxy, and there are cases where DNS local resolution is not used:
1. browser resource access using long connections
2. The IP corresponding to the domain name exists in the DNS local cache, and the corresponding IP is searched from the DNS local cache
3. Accessing local resources
The proxy detection method provided by the embodiment is applied to scenes such as equipment fingerprints and IP portraits, and the network environments are all internet environments, so that the communication judgment is carried out on the first access request, and the situations of long connection access and local resource access do not exist. Therefore, the embodiment mainly solves the problem of how to detect the proxy according to the time-consuming information of the DNS local resolution under the condition that the DNS local resolution is not used due to the DNS local cache. Based on the principle that DNS local cache cannot be executed when an access request is initiated to a new link, the domain name of a specific link is subjected to extensive resolution setting, so that each access request is initiated to a random domain name and is a new link when the access request is initiated to the domain name of the specific link, and therefore the DNS local cache cannot be used. In conclusion, when the acquired local resolution time of the DNS is 0, the relevant access request can be judged to be proxy access, the response time of proxy detection is prolonged, the cost is reduced, the accuracy is improved, and the compatibility of the SDK version is improved.
According to the above principle, a proxy detection method based on domain name broad-resolution is introduced, as shown in fig. 1, the proxy detection method based on domain name broad-resolution specifically includes the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Preferably, the random domain name after the extensive resolution is preset, and the random domain name after the extensive resolution resolves to the same IP.
The random domain name after the extensive resolution is obtained by carrying out the extensive resolution operation on the domain name by a developer, and the random domain name after the extensive resolution simultaneously supports HTTP and HTTPS access. After the domain name is subjected to the domain name extensive resolution, any sub domain name (secondary domain name) is added before the original domain name (primary domain name), namely, after the random domain name subjected to the domain resolution is formed, the WEB address pointed by the original domain name can be accessed through HTTP or HTTPS, and the same IP is resolved through the domain name, namely, all the random domain names set under the domain name #.com are resolved to the same IP.
In practical application, when a specific domain name is accessed, an access request is actually initiated to the domain name (new link) after the domain name is subjected to the extensive resolution, a DNS local cache is not used, the condition that the domain name resolution is carried out through the DNS local cache but the DNS local resolution is not used is eliminated, the subsequent collected DNS local resolution time is ensured, and the access request can be used for judging whether the access request is proxy access or not.
Preferably, the acquiring, by the front end, the DNS local resolution time of the random domain name specifically includes: calling a WEB API (application program interface) to acquire DNS (domain name system) local resolution time of the random domain name, wherein the WEB API is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming.
The performanceitiniming interface and the performanceitinlookuppend interface of the performanceirming interface are unsigned long numerical values, the numerical values are generally millisecond numbers and are respectively used for representing UNIX timestamps of the beginning and the end of local domain name resolution, so that the performanceitinuous lookuppest interface is called, and the time point of initiating DNS local resolution by a front end (browser) is returned, so that the query starting time is obtained; and returning to a time point when the front end (browser) finishes DNS local resolution by calling a Performancetiming. If the result of the domain name query is stored in a local cache of the DNS or is accessed to local resources based on long connection access, proxy access and the like, the corresponding access request has no DNS query process; therefore, the upper performantetiming. domain lookupstart takes the value of the return performantetiming. fetchstart as the query start time, and the performantetiming. domain lookupstart also takes the return performantetiming. fetchstart as the query end time.
The application scene of the invention eliminates the condition that long connection accesses and local resources are accessed, and eliminates the condition that the domain name query result is stored in a local cache of the DNS through the extensive domain name resolution operation.
Therefore, in this embodiment, when the proxy access resource is not used, the time consumed for the local resolution of the DNS should be the difference (difference) between the return value of the performance timing.
When the agent is used for resource access, after the performanceirming.
Therefore, by collecting the local resolution time of the DNS of the random domain name at the front end, whether the access request initiated aiming at the random domain name after the extensive resolution is proxy access or not can be judged, namely whether the access request received by the server is initiated based on the proxy IP or not.
Preferably, the performing of the difference determination on the DNS resolution time specifically includes: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
It should be noted that the access request is initiated by a source client and received by a server, where the server deploys a device fingerprint product, an IP representation product, and the like, and the source client is a client used by a user or a proxy client (proxy server).
Preferably, the front end is a browser, the access request is an access request initiated by a client to the broadly analyzed random domain name, and the broadly analyzed random domain name is analyzed to a server IP.
Preferably, the difference values are stored as tag values of the device fingerprint and/or the IP portrait, which is helpful for increasing the data diversity of the device fingerprint or the IP portrait, increasing the dimension of the IP portrait drawing and eliminating the risk behavior.
Preferably, the randomly domain name after the extensive resolution is encrypted through Token and random characters, and whether the randomly domain name is cracked or not can be judged through performing back-end verification on the randomly domain name after the extensive resolution, so that the countermeasure protection detection of the WEB product is facilitated.
Example 2
The present embodiment discloses a device corresponding to the proxy detection method based on domain name generic resolution in embodiment 1, which is a virtual structure device, and in this embodiment, as shown in fig. 2, the method includes:
a request receiving module 210, configured to receive an access request, where the access request includes a universally resolved random domain name;
a DNS resolution time-consuming acquisition module 220, configured to acquire, by a front end, DNS local resolution time of the random domain name;
a determining module 230, configured to perform difference determination on the DNS resolution time, and if the DNS difference is equal to 0, the access request is a proxy access.
The DNS resolution time-consuming acquisition module 220 obtains a time point when DNS local resolution starts by calling a performance timing. Obtaining a time point when the DNS local resolution is finished, that is, obtaining a time when the query is finished, by calling a performance timing.
Example 3
Fig. 3 is a schematic structural diagram of an electronic device according to embodiment 3 of the present invention, as shown in fig. 3, the electronic device includes a processor 310, a memory 320, an input device 330, and an output device 340; the number of the processors 310 in the computer device may be one or more, and one processor 310 is taken as an example in fig. 3; the processor 310, the memory 320, the input device 330 and the output device 340 in the electronic apparatus may be connected by a bus or other means, and the connection by the bus is exemplified in fig. 3.
The memory 320 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the proxy detection method based on domain name flooding resolution in the embodiment of the present invention (for example, the request receiving module 210, the DNS resolution time-consuming collecting module 220, and the determining module 230 in the proxy detection apparatus based on domain name flooding resolution). The processor 310 executes various functional applications and data processing of the electronic device by executing software programs, instructions and modules stored in the memory 320, that is, implements the proxy detection method based on domain name flooding resolution of embodiment 1.
The memory 320 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 320 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 320 may further include memory located remotely from the processor 310, which may be connected to the electronic device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 330 may be used to receive DNS local resolution times, etc. The output device 340 is configured to output a difference between the proxy detection result and the DNS local resolution time.
Example 4
Embodiment 4 of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions, when executed by a computer processor, are configured to implement a proxy detection method based on domain name flooding, where the method includes:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the method operations described above, and may also perform related operations in the proxy detection method based on domain name universal resolution provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling an electronic device (which may be a mobile phone, a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It should be noted that, in the embodiment of the proxy detection method or apparatus based on domain name broad-resolution, each unit and module included in the proxy detection method or apparatus is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.
Claims (10)
1. A proxy detection method based on domain name broad resolution is characterized by comprising the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
2. The proxy detection method based on domain name generic resolution according to claim 1, wherein the collecting of the DNS local resolution time of the random domain name by the front end specifically comprises: calling a WEB API (application program interface) to acquire DNS (domain name system) local resolution time of the random domain name, wherein the WEB API is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming, and respectively obtaining query start time and query end time of the random domain name through the PerformanceTiming, domain LookupStart interface and the PerformanceTiming, domain Lookupend interface.
3. The proxy detection method based on domain name broad-resolution according to claim 2, wherein the step of performing difference determination on the DNS resolution time specifically comprises: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
4. The proxy detection method based on domain name flooding resolution according to claim 1 or 3, characterized in that, according to the difference, a label value of the device fingerprint IP image is generated.
5. The proxy detection method based on domain name broad resolution as claimed in claim 1, characterized in that the random domain name after broad resolution is encrypted by Token and random characters.
6. The proxy detection method based on domain name broad-resolution as claimed in claim 1, wherein the front end is a browser, and the access request is an access request initiated by a client to the broadly-resolved random domain name.
7. The proxy detection method based on domain name broad-resolution as claimed in claim 1, wherein the random domain name after broad-resolution is preset, and the random domain name after broad-resolution resolves to the same IP.
8. An agent detection device based on domain name extensive resolution is characterized by comprising:
a request receiving module, configured to receive an access request, where the access request includes a universally resolved random domain name;
the DNS analysis time-consuming acquisition module is used for acquiring DNS local analysis time of the random domain name through a front end;
and the judging module is used for judging the difference of the DNS resolution time, and if the DNS difference is equal to 0, the access request is proxy access.
9. An electronic device comprising a processor, a storage medium, and a computer program, the computer program being stored in the storage medium, wherein the computer program, when executed by the processor, implements the domain name flood resolution-based proxy detection method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the method for proxy detection based on domain name flooding resolution of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010189470.2A CN111064827B (en) | 2020-03-18 | 2020-03-18 | Agent detection method, device, equipment and medium based on domain name generic resolution |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010189470.2A CN111064827B (en) | 2020-03-18 | 2020-03-18 | Agent detection method, device, equipment and medium based on domain name generic resolution |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111064827A true CN111064827A (en) | 2020-04-24 |
CN111064827B CN111064827B (en) | 2020-07-07 |
Family
ID=70307959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010189470.2A Active CN111064827B (en) | 2020-03-18 | 2020-03-18 | Agent detection method, device, equipment and medium based on domain name generic resolution |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111064827B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112702425A (en) * | 2020-12-22 | 2021-04-23 | 杭州易安联科技有限公司 | WEB application access agent method, device and system based on domain name extensive resolution |
CN115190107A (en) * | 2022-07-07 | 2022-10-14 | 四川川大智胜系统集成有限公司 | Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506525A (en) * | 2014-12-22 | 2015-04-08 | 北京奇虎科技有限公司 | Method for preventing malicious grabbing and protection device |
CN106411819A (en) * | 2015-07-30 | 2017-02-15 | 阿里巴巴集团控股有限公司 | Method and apparatus for recognizing proxy Internet protocol address |
CN106921670A (en) * | 2017-03-22 | 2017-07-04 | 北京安博通科技股份有限公司 | A kind of method and device for acting on behalf of detection |
US20190028569A1 (en) * | 2017-07-18 | 2019-01-24 | Citrix Systems, Inc. | Cloud to on-premises debug service routing |
CN109543121A (en) * | 2018-11-09 | 2019-03-29 | 深圳万物云联科技有限公司 | A kind of exterior chain url resource transfer method and device |
-
2020
- 2020-03-18 CN CN202010189470.2A patent/CN111064827B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506525A (en) * | 2014-12-22 | 2015-04-08 | 北京奇虎科技有限公司 | Method for preventing malicious grabbing and protection device |
CN106411819A (en) * | 2015-07-30 | 2017-02-15 | 阿里巴巴集团控股有限公司 | Method and apparatus for recognizing proxy Internet protocol address |
CN106921670A (en) * | 2017-03-22 | 2017-07-04 | 北京安博通科技股份有限公司 | A kind of method and device for acting on behalf of detection |
US20190028569A1 (en) * | 2017-07-18 | 2019-01-24 | Citrix Systems, Inc. | Cloud to on-premises debug service routing |
CN109543121A (en) * | 2018-11-09 | 2019-03-29 | 深圳万物云联科技有限公司 | A kind of exterior chain url resource transfer method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112702425A (en) * | 2020-12-22 | 2021-04-23 | 杭州易安联科技有限公司 | WEB application access agent method, device and system based on domain name extensive resolution |
CN112702425B (en) * | 2020-12-22 | 2022-12-23 | 杭州易安联科技有限公司 | WEB application access proxy method, device and storage medium based on domain name extensive resolution |
CN115190107A (en) * | 2022-07-07 | 2022-10-14 | 四川川大智胜系统集成有限公司 | Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111064827B (en) | 2020-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111221743A (en) | Automatic testing method and system | |
CN105939231B (en) | Shared access detection method and device | |
CN111064827B (en) | Agent detection method, device, equipment and medium based on domain name generic resolution | |
CN108777687B (en) | Crawler intercepting method based on user behavior portrait, electronic equipment and storage medium | |
CN107133516B (en) | Authority control method and system | |
CN107395553B (en) | Network attack detection method, device and storage medium | |
CN111447204A (en) | Weak password detection method, device, equipment and medium | |
CN105635064B (en) | CSRF attack detection method and device | |
CN109831351B (en) | Link tracking method, device, terminal and storage medium | |
EP3179370A1 (en) | Webpage automatic test method and apparatus | |
JP6525486B2 (en) | Network request and response processing method, terminal, server and storage medium | |
CN110955544A (en) | Method, device and system for detecting usability of web system | |
CN114157568A (en) | Browser security access method, device, equipment and storage medium | |
CN117424743A (en) | Data processing method and device, electronic equipment and storage medium | |
CN112152993A (en) | Method and device for detecting webpage hijacking, computer equipment and storage medium | |
CN115314271B (en) | Access request detection method, system and computer storage medium | |
CN114301872B (en) | Domain name based access method and device, electronic equipment and storage medium | |
CN113453076B (en) | User video service quality evaluation method, device, computing equipment and storage medium | |
CN113364780B (en) | Network attack victim determination method, equipment, storage medium and device | |
CN115098151A (en) | Fine-grained intranet equipment firmware version detection method | |
CN112153011A (en) | Detection method and device for machine scanning, electronic equipment and storage medium | |
CN110012023B (en) | Poison-throwing type anti-climbing method, system, terminal and medium | |
CN112541183B (en) | Data processing method and device, edge computing equipment and storage medium | |
CN111970175B (en) | Method and device for malicious sharing detection of network-access account | |
CN115189901B (en) | Method and device for identifying abnormal request, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210917 Address after: Room 209, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province Patentee after: TONGDUN TECHNOLOGY Co.,Ltd. Address before: Room 704, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province Patentee before: TONGDUN HOLDINGS Co.,Ltd. |
|
TR01 | Transfer of patent right |