CN111064827A - Agent detection method, device, equipment and medium based on domain name generic resolution - Google Patents

Agent detection method, device, equipment and medium based on domain name generic resolution Download PDF

Info

Publication number
CN111064827A
CN111064827A CN202010189470.2A CN202010189470A CN111064827A CN 111064827 A CN111064827 A CN 111064827A CN 202010189470 A CN202010189470 A CN 202010189470A CN 111064827 A CN111064827 A CN 111064827A
Authority
CN
China
Prior art keywords
domain name
resolution
dns
proxy
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010189470.2A
Other languages
Chinese (zh)
Other versions
CN111064827B (en
Inventor
焦小齐
李克勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TONGDUN TECHNOLOGY Co.,Ltd.
Original Assignee
Tongdun Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongdun Holdings Co Ltd filed Critical Tongdun Holdings Co Ltd
Priority to CN202010189470.2A priority Critical patent/CN111064827B/en
Publication of CN111064827A publication Critical patent/CN111064827A/en
Application granted granted Critical
Publication of CN111064827B publication Critical patent/CN111064827B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a proxy detection method based on domain name generic resolution, relates to the technical field of internet, and aims to judge whether an access request aiming at a generic domain name is proxy access or not by collecting DNS local resolution time of the generic domain name at the front end, so that the judgment time of proxy detection is shortened and the judgment accuracy is improved. The method comprises the following steps: receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution; collecting DNS local resolution time of the random domain name through a front end; and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access. The invention also discloses a proxy detection device based on domain name flooding analysis, electronic equipment and a computer storage medium.

Description

Agent detection method, device, equipment and medium based on domain name generic resolution
Technical Field
The invention relates to the technical field of internet, in particular to a proxy detection method, a device, equipment and a medium based on domain name flooding analysis.
Background
In internet access, there are a large number of accesses performed using a proxy server. A proxy server is a server that sits between a client application (e.g., an internet Web browser) and a real internet content server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Currently, the following detection methods are mainly used: the method comprises the steps of carrying out proxy detection by a reverse detection technology For detecting whether an IP source is opened at an 80 or 8080 port, realizing proxy detection by detecting X-Forward-For information in HTTP header information of an access source, realizing proxy detection by detecting Keep-alive message information and realizing proxy detection by detecting the opening condition of the IP port of the access source. However, these proxy detection methods have problems of being able to falsify detection results, having high delay and low accuracy to different degrees, for example, it takes more than several minutes to scan the port opening condition of the source IP of the access request, and also have problems of network delay and excessive access, so that it is impossible to determine the access mode in real time, and the proxy detection methods have poor timeliness and high time cost and labor cost. When the information in the request header is detected, the information of the request header is easy to forge, the detection result is interfered, and the detection result has a high false alarm rate, so that the authenticity of the detection result is low.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the purposes of the present invention is to provide a proxy detection method based on domain name flooding resolution, which aims to judge whether DNS local resolution is performed or not by collecting time-consuming information of DNS local resolution at a front end, so as to judge whether the DNS local resolution is a proxy access or not, and has the advantages of fast response time, low cost and strong authenticity.
One of the purposes of the invention is realized by adopting the following technical scheme:
a proxy detection method based on domain name broad resolution comprises the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Further, acquiring, by the front end, the DNS local resolution time of the random domain name specifically includes: calling a WEBAPI interface to acquire DNS local resolution time of the random domain name, wherein the WEB API interface is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming.
Further, the performing of difference determination on the DNS resolution time specifically includes: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
And further, generating a label value of the device fingerprint IP image according to the difference value.
Further, the random domain name after the extensive resolution is encrypted by Token and random characters.
Further, the front end is a browser, and the access request is an access request initiated by the client to the broadly-resolved random domain name.
Further, the random domain name after the extensive resolution is preset, and the random domain name after the extensive resolution resolves to the same IP.
The second purpose of the present invention is to provide a proxy detection device based on domain name broad-resolution, through which a user can call a front end to collect time-consuming information of DNS local resolution, and determine whether to access a proxy according to the time-consuming information, and the device has the advantages of fast response speed, low cost and strong authenticity. .
The second purpose of the invention is realized by adopting the following technical scheme:
a request receiving module, configured to receive an access request, where the access request includes a universally resolved random domain name;
the DNS analysis time-consuming acquisition module is used for acquiring DNS local analysis time of the random domain name through a front end;
and the judging module is used for judging the difference of the DNS resolution time, and if the DNS difference is equal to 0, the access request is proxy access.
It is a further object of the present invention to provide an electronic device for performing one of the above objects, comprising a processor, a storage medium, and a computer program, wherein the computer program is stored in the storage medium, and when being executed by the processor, the computer program implements the above proxy detection method based on domain name flooding.
It is a fourth object of the present invention to provide a computer-readable storage medium storing one of the objects of the invention, on which a computer program is stored, which, when being executed by a processor, implements the above-mentioned proxy detection method based on domain name flooding.
Compared with the prior art, the invention has the beneficial effects that:
by collecting the DNS local analysis time of the access request at the front end and judging whether the access request is proxy access according to the collected DNS local analysis time, the judgment time of proxy detection is shortened, the accuracy is improved, and the collection result can be used for supplementing the device fingerprint and IP portrait and is beneficial to enhancing the protection detection of the access device.
Drawings
FIG. 1 is a flow chart of a proxy detection method based on domain name flooding resolution of the present invention;
fig. 2 is a block diagram showing the structure of a proxy detection apparatus according to embodiment 2, which is based on domain name broad-resolution;
fig. 3 is a block diagram of the electronic apparatus of embodiment 3.
Detailed Description
The present invention will now be described in more detail with reference to the accompanying drawings, in which the description of the invention is given by way of illustration and not of limitation. The various embodiments may be combined with each other to form other embodiments not shown in the following description.
Example 1
The embodiment provides a proxy detection method based on domain name flooding resolution, which is based on the principle that proxy access does not perform local DNS resolution, but performs DNS resolution in a proxy server, and judges whether an access request uses a proxy according to whether DNS local resolution is performed in front-end access or not. When the resource access is carried out by using the agent, the time consumption of DNS local resolution is the millisecond number of long type other than 0, and when the resource access is carried out by using the agent, the time consumption of DND local resolution is always equal to 0, because when the resource access is carried out by using the agent, the relevant domain name information is packaged in the agent flow and sent to the agent client, the DNS resolution is carried out at the far end, and the DNS resolution is not carried out locally, so that whether the access request is the agent access or not can be judged according to the time consumption of the DNS local resolution.
However, when the time consumption of DNS local resolution is equal to 0, the corresponding access request is not necessarily accessed using a proxy, and there are cases where DNS local resolution is not used:
1. browser resource access using long connections
2. The IP corresponding to the domain name exists in the DNS local cache, and the corresponding IP is searched from the DNS local cache
3. Accessing local resources
The proxy detection method provided by the embodiment is applied to scenes such as equipment fingerprints and IP portraits, and the network environments are all internet environments, so that the communication judgment is carried out on the first access request, and the situations of long connection access and local resource access do not exist. Therefore, the embodiment mainly solves the problem of how to detect the proxy according to the time-consuming information of the DNS local resolution under the condition that the DNS local resolution is not used due to the DNS local cache. Based on the principle that DNS local cache cannot be executed when an access request is initiated to a new link, the domain name of a specific link is subjected to extensive resolution setting, so that each access request is initiated to a random domain name and is a new link when the access request is initiated to the domain name of the specific link, and therefore the DNS local cache cannot be used. In conclusion, when the acquired local resolution time of the DNS is 0, the relevant access request can be judged to be proxy access, the response time of proxy detection is prolonged, the cost is reduced, the accuracy is improved, and the compatibility of the SDK version is improved.
According to the above principle, a proxy detection method based on domain name broad-resolution is introduced, as shown in fig. 1, the proxy detection method based on domain name broad-resolution specifically includes the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Preferably, the random domain name after the extensive resolution is preset, and the random domain name after the extensive resolution resolves to the same IP.
The random domain name after the extensive resolution is obtained by carrying out the extensive resolution operation on the domain name by a developer, and the random domain name after the extensive resolution simultaneously supports HTTP and HTTPS access. After the domain name is subjected to the domain name extensive resolution, any sub domain name (secondary domain name) is added before the original domain name (primary domain name), namely, after the random domain name subjected to the domain resolution is formed, the WEB address pointed by the original domain name can be accessed through HTTP or HTTPS, and the same IP is resolved through the domain name, namely, all the random domain names set under the domain name #.com are resolved to the same IP.
In practical application, when a specific domain name is accessed, an access request is actually initiated to the domain name (new link) after the domain name is subjected to the extensive resolution, a DNS local cache is not used, the condition that the domain name resolution is carried out through the DNS local cache but the DNS local resolution is not used is eliminated, the subsequent collected DNS local resolution time is ensured, and the access request can be used for judging whether the access request is proxy access or not.
Preferably, the acquiring, by the front end, the DNS local resolution time of the random domain name specifically includes: calling a WEB API (application program interface) to acquire DNS (domain name system) local resolution time of the random domain name, wherein the WEB API is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming.
The performanceitiniming interface and the performanceitinlookuppend interface of the performanceirming interface are unsigned long numerical values, the numerical values are generally millisecond numbers and are respectively used for representing UNIX timestamps of the beginning and the end of local domain name resolution, so that the performanceitinuous lookuppest interface is called, and the time point of initiating DNS local resolution by a front end (browser) is returned, so that the query starting time is obtained; and returning to a time point when the front end (browser) finishes DNS local resolution by calling a Performancetiming. If the result of the domain name query is stored in a local cache of the DNS or is accessed to local resources based on long connection access, proxy access and the like, the corresponding access request has no DNS query process; therefore, the upper performantetiming. domain lookupstart takes the value of the return performantetiming. fetchstart as the query start time, and the performantetiming. domain lookupstart also takes the return performantetiming. fetchstart as the query end time.
The application scene of the invention eliminates the condition that long connection accesses and local resources are accessed, and eliminates the condition that the domain name query result is stored in a local cache of the DNS through the extensive domain name resolution operation.
Therefore, in this embodiment, when the proxy access resource is not used, the time consumed for the local resolution of the DNS should be the difference (difference) between the return value of the performance timing.
When the agent is used for resource access, after the performanceirming.
Therefore, by collecting the local resolution time of the DNS of the random domain name at the front end, whether the access request initiated aiming at the random domain name after the extensive resolution is proxy access or not can be judged, namely whether the access request received by the server is initiated based on the proxy IP or not.
Preferably, the performing of the difference determination on the DNS resolution time specifically includes: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
It should be noted that the access request is initiated by a source client and received by a server, where the server deploys a device fingerprint product, an IP representation product, and the like, and the source client is a client used by a user or a proxy client (proxy server).
Preferably, the front end is a browser, the access request is an access request initiated by a client to the broadly analyzed random domain name, and the broadly analyzed random domain name is analyzed to a server IP.
Preferably, the difference values are stored as tag values of the device fingerprint and/or the IP portrait, which is helpful for increasing the data diversity of the device fingerprint or the IP portrait, increasing the dimension of the IP portrait drawing and eliminating the risk behavior.
Preferably, the randomly domain name after the extensive resolution is encrypted through Token and random characters, and whether the randomly domain name is cracked or not can be judged through performing back-end verification on the randomly domain name after the extensive resolution, so that the countermeasure protection detection of the WEB product is facilitated.
Example 2
The present embodiment discloses a device corresponding to the proxy detection method based on domain name generic resolution in embodiment 1, which is a virtual structure device, and in this embodiment, as shown in fig. 2, the method includes:
a request receiving module 210, configured to receive an access request, where the access request includes a universally resolved random domain name;
a DNS resolution time-consuming acquisition module 220, configured to acquire, by a front end, DNS local resolution time of the random domain name;
a determining module 230, configured to perform difference determination on the DNS resolution time, and if the DNS difference is equal to 0, the access request is a proxy access.
The DNS resolution time-consuming acquisition module 220 obtains a time point when DNS local resolution starts by calling a performance timing. Obtaining a time point when the DNS local resolution is finished, that is, obtaining a time when the query is finished, by calling a performance timing.
Example 3
Fig. 3 is a schematic structural diagram of an electronic device according to embodiment 3 of the present invention, as shown in fig. 3, the electronic device includes a processor 310, a memory 320, an input device 330, and an output device 340; the number of the processors 310 in the computer device may be one or more, and one processor 310 is taken as an example in fig. 3; the processor 310, the memory 320, the input device 330 and the output device 340 in the electronic apparatus may be connected by a bus or other means, and the connection by the bus is exemplified in fig. 3.
The memory 320 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the proxy detection method based on domain name flooding resolution in the embodiment of the present invention (for example, the request receiving module 210, the DNS resolution time-consuming collecting module 220, and the determining module 230 in the proxy detection apparatus based on domain name flooding resolution). The processor 310 executes various functional applications and data processing of the electronic device by executing software programs, instructions and modules stored in the memory 320, that is, implements the proxy detection method based on domain name flooding resolution of embodiment 1.
The memory 320 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 320 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 320 may further include memory located remotely from the processor 310, which may be connected to the electronic device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 330 may be used to receive DNS local resolution times, etc. The output device 340 is configured to output a difference between the proxy detection result and the DNS local resolution time.
Example 4
Embodiment 4 of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions, when executed by a computer processor, are configured to implement a proxy detection method based on domain name flooding, where the method includes:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the method operations described above, and may also perform related operations in the proxy detection method based on domain name universal resolution provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling an electronic device (which may be a mobile phone, a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It should be noted that, in the embodiment of the proxy detection method or apparatus based on domain name broad-resolution, each unit and module included in the proxy detection method or apparatus is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.

Claims (10)

1. A proxy detection method based on domain name broad resolution is characterized by comprising the following steps:
receiving an access request, wherein the access request is initiated to the random domain name after the flooding resolution;
collecting DNS local resolution time of the random domain name through a front end;
and performing difference judgment on the DNS resolution time, wherein if the DNS difference is equal to 0, the access request is proxy access.
2. The proxy detection method based on domain name generic resolution according to claim 1, wherein the collecting of the DNS local resolution time of the random domain name by the front end specifically comprises: calling a WEB API (application program interface) to acquire DNS (domain name system) local resolution time of the random domain name, wherein the WEB API is a PerformanceTiming, domain LookupStart interface and a PerformanceTiming, and respectively obtaining query start time and query end time of the random domain name through the PerformanceTiming, domain LookupStart interface and the PerformanceTiming, domain Lookupend interface.
3. The proxy detection method based on domain name broad-resolution according to claim 2, wherein the step of performing difference determination on the DNS resolution time specifically comprises: and subtracting the query starting time and the query ending time of the random domain name to obtain the difference, and judging whether the access request is proxy access or not according to the difference.
4. The proxy detection method based on domain name flooding resolution according to claim 1 or 3, characterized in that, according to the difference, a label value of the device fingerprint IP image is generated.
5. The proxy detection method based on domain name broad resolution as claimed in claim 1, characterized in that the random domain name after broad resolution is encrypted by Token and random characters.
6. The proxy detection method based on domain name broad-resolution as claimed in claim 1, wherein the front end is a browser, and the access request is an access request initiated by a client to the broadly-resolved random domain name.
7. The proxy detection method based on domain name broad-resolution as claimed in claim 1, wherein the random domain name after broad-resolution is preset, and the random domain name after broad-resolution resolves to the same IP.
8. An agent detection device based on domain name extensive resolution is characterized by comprising:
a request receiving module, configured to receive an access request, where the access request includes a universally resolved random domain name;
the DNS analysis time-consuming acquisition module is used for acquiring DNS local analysis time of the random domain name through a front end;
and the judging module is used for judging the difference of the DNS resolution time, and if the DNS difference is equal to 0, the access request is proxy access.
9. An electronic device comprising a processor, a storage medium, and a computer program, the computer program being stored in the storage medium, wherein the computer program, when executed by the processor, implements the domain name flood resolution-based proxy detection method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the method for proxy detection based on domain name flooding resolution of any one of claims 1 to 7.
CN202010189470.2A 2020-03-18 2020-03-18 Agent detection method, device, equipment and medium based on domain name generic resolution Active CN111064827B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010189470.2A CN111064827B (en) 2020-03-18 2020-03-18 Agent detection method, device, equipment and medium based on domain name generic resolution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010189470.2A CN111064827B (en) 2020-03-18 2020-03-18 Agent detection method, device, equipment and medium based on domain name generic resolution

Publications (2)

Publication Number Publication Date
CN111064827A true CN111064827A (en) 2020-04-24
CN111064827B CN111064827B (en) 2020-07-07

Family

ID=70307959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010189470.2A Active CN111064827B (en) 2020-03-18 2020-03-18 Agent detection method, device, equipment and medium based on domain name generic resolution

Country Status (1)

Country Link
CN (1) CN111064827B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702425A (en) * 2020-12-22 2021-04-23 杭州易安联科技有限公司 WEB application access agent method, device and system based on domain name extensive resolution
CN115190107A (en) * 2022-07-07 2022-10-14 四川川大智胜系统集成有限公司 Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506525A (en) * 2014-12-22 2015-04-08 北京奇虎科技有限公司 Method for preventing malicious grabbing and protection device
CN106411819A (en) * 2015-07-30 2017-02-15 阿里巴巴集团控股有限公司 Method and apparatus for recognizing proxy Internet protocol address
CN106921670A (en) * 2017-03-22 2017-07-04 北京安博通科技股份有限公司 A kind of method and device for acting on behalf of detection
US20190028569A1 (en) * 2017-07-18 2019-01-24 Citrix Systems, Inc. Cloud to on-premises debug service routing
CN109543121A (en) * 2018-11-09 2019-03-29 深圳万物云联科技有限公司 A kind of exterior chain url resource transfer method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506525A (en) * 2014-12-22 2015-04-08 北京奇虎科技有限公司 Method for preventing malicious grabbing and protection device
CN106411819A (en) * 2015-07-30 2017-02-15 阿里巴巴集团控股有限公司 Method and apparatus for recognizing proxy Internet protocol address
CN106921670A (en) * 2017-03-22 2017-07-04 北京安博通科技股份有限公司 A kind of method and device for acting on behalf of detection
US20190028569A1 (en) * 2017-07-18 2019-01-24 Citrix Systems, Inc. Cloud to on-premises debug service routing
CN109543121A (en) * 2018-11-09 2019-03-29 深圳万物云联科技有限公司 A kind of exterior chain url resource transfer method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702425A (en) * 2020-12-22 2021-04-23 杭州易安联科技有限公司 WEB application access agent method, device and system based on domain name extensive resolution
CN112702425B (en) * 2020-12-22 2022-12-23 杭州易安联科技有限公司 WEB application access proxy method, device and storage medium based on domain name extensive resolution
CN115190107A (en) * 2022-07-07 2022-10-14 四川川大智胜系统集成有限公司 Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium

Also Published As

Publication number Publication date
CN111064827B (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN111221743A (en) Automatic testing method and system
CN105939231B (en) Shared access detection method and device
CN111064827B (en) Agent detection method, device, equipment and medium based on domain name generic resolution
CN108777687B (en) Crawler intercepting method based on user behavior portrait, electronic equipment and storage medium
CN107133516B (en) Authority control method and system
CN107395553B (en) Network attack detection method, device and storage medium
CN111447204A (en) Weak password detection method, device, equipment and medium
CN105635064B (en) CSRF attack detection method and device
CN109831351B (en) Link tracking method, device, terminal and storage medium
EP3179370A1 (en) Webpage automatic test method and apparatus
JP6525486B2 (en) Network request and response processing method, terminal, server and storage medium
CN110955544A (en) Method, device and system for detecting usability of web system
CN114157568A (en) Browser security access method, device, equipment and storage medium
CN117424743A (en) Data processing method and device, electronic equipment and storage medium
CN112152993A (en) Method and device for detecting webpage hijacking, computer equipment and storage medium
CN115314271B (en) Access request detection method, system and computer storage medium
CN114301872B (en) Domain name based access method and device, electronic equipment and storage medium
CN113453076B (en) User video service quality evaluation method, device, computing equipment and storage medium
CN113364780B (en) Network attack victim determination method, equipment, storage medium and device
CN115098151A (en) Fine-grained intranet equipment firmware version detection method
CN112153011A (en) Detection method and device for machine scanning, electronic equipment and storage medium
CN110012023B (en) Poison-throwing type anti-climbing method, system, terminal and medium
CN112541183B (en) Data processing method and device, edge computing equipment and storage medium
CN111970175B (en) Method and device for malicious sharing detection of network-access account
CN115189901B (en) Method and device for identifying abnormal request, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210917

Address after: Room 209, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: TONGDUN TECHNOLOGY Co.,Ltd.

Address before: Room 704, building 18, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee before: TONGDUN HOLDINGS Co.,Ltd.

TR01 Transfer of patent right