CN105847262A - Anti-stealing-link method and system - Google Patents

Anti-stealing-link method and system Download PDF

Info

Publication number
CN105847262A
CN105847262A CN201610195922.1A CN201610195922A CN105847262A CN 105847262 A CN105847262 A CN 105847262A CN 201610195922 A CN201610195922 A CN 201610195922A CN 105847262 A CN105847262 A CN 105847262A
Authority
CN
China
Prior art keywords
access
node
time
path
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610195922.1A
Other languages
Chinese (zh)
Inventor
李洪福
李艳松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Cloud Computing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Cloud Computing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610195922.1A priority Critical patent/CN105847262A/en
Publication of CN105847262A publication Critical patent/CN105847262A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an anti-stealing-link method, comprising: querying the access log of a target user to determine a plurality of access nodes of the user and the access time of each access node; comparing the plurality of access nodes with a preset access path; and shielding the target user if an actual access path formed by the plurality of access nodes according to an access time sequence is different from the preset access path. The invention also provides an anti-stealing-link system which compares the actual access path formed by the plurality of access nodes according to an access time sequence with the preset access path to determine whether the target user is a link stealer, shields the target user if yes, reduces anti-stealing-link workload, and realizes anti-stealing-link more thoroughly.

Description

Anti-stealing link method and system
Technical field
The present embodiments relate to internet security technical field, particularly relate to a kind of anti-stealing link method and be System.
Background technology
Along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem is arisen at the historic moment, Stealing chain is exactly one side therein.Steal chain and refer to that service provider oneself does not provide the content of service, pass through Technological means walks around other gainful end-user interface (such as advertisement), directly on the website of oneself There is provided the service content of other service provider to end user, section end user browses and clicking rate.
Such as, in actual application, some illegal businessmans can pass through correlation technique (such as web crawlers technology) Crawl URL address (the Uniform Resource of the files in stream media that multimedia service provider provides Locator, URL), the sky of oneself will be put into after some coding changes inside URL address In between, when user wants to watch this video, just can directly play after just clicking directly on this link, And real service provider does not knows the most stolen chain of resource of oneself, provide to real service Business causes huge economic loss.
Stealing during chain, beneficiary does not provide resource or provides little resource, and real service Provider but can not get any income, and still suffers from a series of harm brought because of stolen chain, As: chain is stolen in website can consume the bandwidth of stolen chain website in a large number, causes the access speed of stolen chain website to become Slowly, real clicking rate perhaps can be the least, and if there is a large amount of such robber's chain in a station server Situation, the speed of server will decline, and network card pauses, and brings bad experience to user, the most serious Compromise the interests of stolen chain website, if more serious chain website of stealing also has pornographic, reaction content, more The fame of stolen chain website can be caused and have a strong impact on.Therefore the Internet especially wireless Internet is led safely Territory, steals chain security protection imperative.
Existing door chain scheme can be divided into the most several by principle: irregularly change filename or file Catalogue, restriction referer, encryption certification, file camouflage etc., but these methods are typically all by institute Some users verify, and then judge whether to shield user, cause workload heavy, and because Most work all carries out verifying whether user is to steal chain person to make door chain the most thorough.
Summary of the invention
In order to solve the problems of the prior art, on the one hand, the embodiment of the present invention provides a kind of door chain side Method, including:
The access log of inquiry targeted customer, determines that multiple access nodes of user and described each access joint The access time of point;
The plurality of access node is compared with default access path;
When the plurality of access node is different from described according to the actual access path accessing time sequencing composition When presetting access path, shield described targeted customer.
The embodiment of the present invention also provides for a kind of anti-stealing link system, including:
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted When path is different from described default access path, shield described targeted customer.
The anti-stealing link method of embodiment of the present invention offer and system, by inquiring about the access log of targeted customer, Determine multiple access nodes and the access time of each access node described of user, and then by the plurality of Access node to contrast with default access path, to the plurality of access node according to accessing time sequencing The access request of the targeted customer that the actual access path constituted is different from described default access path is shielded Cover, and then wherein, if stealing chain person directly access object content, then the access node the most only of user Individual, will make to be different from described by access node according to the actual access path that access time sequencing is constituted Preset access path, thus shield described targeted customer, make to prevent while decreasing door chain workload Steal chain the most thorough.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below The required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is this Some bright embodiments, for those of ordinary skill in the art, before not paying creative work Put, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the anti-stealing link method of one embodiment of the invention;
Fig. 2 is the structural representation of the anti-stealing link system of one embodiment of the invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment Involved technical characteristic can be mutually combined each other.
The execution object of the method described in the embodiment of the present invention can be that certain class (is led to comprehensive in portal website Internet information resource also provides the application system about information service), forum, social network sites (such as Happy net, Renren Network etc.), blog (i.e. individual daily record website), e-commerce website, enterprise web site In the various websites such as (for corporate image displaying), video website, Educational website, to reach all kinds of The protection of valuable source in website.
The embodiment of the present invention can be passed through hardware processor (hardware processor) realize being correlated with Functional unit.
Fig. 1 is the schematic flow sheet of embodiment of the present invention anti-stealing link method.As it is shown in figure 1, the present invention prevents Steal chain method to include:
Step 101: the access log of inquiry targeted customer, determines multiple access nodes of user and described Each accesses the access time of node;
Such as, when user wants certain video access in happy view station, user must first open happy regarding Advocating war, and then scan for target video at happy view station, point opens video, the most also must be through Cross advertisement, just can see video selected by user.
User, during accessing target video content, regards main website, search, advertisement, video through happy Several processes, will stay and access vestige accordingly, i.e. can by inquire about targeted customer access log, Determine that user's accesses node and the access time of each access node described.
Step 102: the plurality of access node is compared with default access path;
Above-mentioned default access path be i.e. had to pass through during user accesses target resource main website, The necessary path such as search, advertisement, video, and the sequencing containing process.
Step 103: when the plurality of access node is according to accessing the actual access path that time sequencing is constituted When being different from described default access path, shield described targeted customer.
It is different from institute according to the actual access path accessing time sequencing composition according to the plurality of access node It can be understood as actual access path accesses node less than presetting access path when stating default access path In the situation of quantity accessing node.
The anti-stealing link method of embodiment of the present invention offer and system, by inquiring about the access log of targeted customer, Determine multiple access nodes and the access time of each access node described of user, and then by the plurality of Access node to contrast with default access path, to the plurality of access node according to accessing time sequencing The access request of the targeted customer that the actual access path constituted is different from described default access path is shielded Cover, and then wherein, if stealing chain person directly access object content, then the access node the most only of user Individual, will make to be different from described by access node according to the actual access path that access time sequencing is constituted Preset access path, thus shield described targeted customer, make to prevent while decreasing door chain workload Steal chain the most thorough.
In some preferred embodiments, the access log of described inquiry targeted customer, determine that user is many Individual access node and each access time accessing node described include: the access log of inquiry targeted customer, Determine user multiple by way of access layer to determine multiple access nodes of user;According to the plurality of by way of The access time of access layer, determine the access time of each access node described.
Pleasure described in the above-described embodiments is user to target depending on main website, search, advertisement, video Content conduct interviews during process multiple by way of access layer, by queried access daily record, and then Multiple multiple access nodes determining user by way of access layer according to user, it is to avoid robber chain person is to user The node that accesses carry out imitating the purpose reaching to steal chain, and, determining multiple access nodes of user Also determine the access time of the plurality of access node simultaneously, reduce stolen chain person simulation further May, add the effect of door chain.
As the further improvement of above-described embodiment, described actual access path is different from described default access Path includes: the quantity accessing node in described actual access path is less than in described default access path Access node quantity.
Such as, when actual user wants to watch target video, he must log in main website, through search, extensively Accuse and just can see target video, but stealing chain person, but can to walk around main website, search, these flow processs of advertisement straight Video resource is asked in receiving, i.e. according to steal chain person by way of access layer will reduce and then the actual visit of user Asking the way the node that accesses in footpath can be less than the access node preset in access path, when judgement is learnt described many Individual access node is different from described default access path according to the actual access path accessing time sequencing composition Time, so that it may assert that this is the request stealing chain person, so that it may directly shield described targeted customer.
In order to make door chain more thorough, it is preferable that when the plurality of access node is suitable according to the time of access When the actual access path of sequence composition is identical with described default access path, the most described actual visit Ask the way each group neighboring user accesses between node in footpath very first time interval whether with described default access road Predetermined the second time interval that in footpath, each group neighboring user accesses between node is identical, if between the very first time Every less than described second time interval, then shield described targeted customer.
Because stealing chain person in the access to object content in order to avoid being found to be likely to by simulation very Positive access user takes object content, so for the effect reaching door chain further, also needing Judge that in user's actual access path, each very first time organized between neighboring user access node is spaced with described Preset each group neighboring user in access path and access the whether phase of the second predetermined time interval between node With, decide whether to shield described targeted customer according to judged result.
Because stealing the purpose being likely to during chain person steals chain by reaching to steal chain by machine, And the speed of operation of machine is much larger than artificial speed of operation, even if or stealing chain person and simulate real visit Ask user browsing process, but for the time of saving, the most real access user wants when accessing object content The time spot waited is 60 seconds, but steals chain person and will shorten to the time spot 15 seconds, and not by advertisement Finish watching and begin to watch video, thus make very first time interval be less than the second predetermined time interval, And then can learn that user is to steal chain person by this judged result, thus shield described targeted customer, subtract Workload in few door chain, makes door chain the most thorough simultaneously.
The anti-stealing link method that the embodiment of the present invention provides, by inquiring about the access log of targeted customer, determines Multiple access nodes of user and the access time of each access node described, and then by the plurality of access Node contrasts with default access path, constitutes the plurality of access node according to accessing time sequencing Actual access path be different from the targeted customer of described default access path and shield, and then wherein, If steal chain person directly access object content, then the access node of user with regard to only one of which, will make by Access node and be different from described default access path according to the actual access path accessing time sequencing composition, Thus shield described targeted customer, make door chain the most thorough while decreasing door chain workload.
Further, in order to make door chain more thorough, compare the plurality of access node according to Access actual access path that time sequencing constitutes and after described default access path, also need to compare described reality In access path each very first time interval organized between adjacent access node whether with described default access path In each the second time interval preset organized between adjacent access node identical, if interval of the described very first time Less than described second time interval, then shield described targeted customer, thus decrease robber chain person and simulate really Access user's access to object content, make door chain the most thorough.
Fig. 2 is the structural representation of embodiment of the present invention anti-stealing link system.Door chain side of the present invention Method can be implemented by the anti-stealing link system in the present embodiment.As in figure 2 it is shown, anti-stealing link system of the present invention Unit, comparing unit, screen unit is determined including accessing node and access time, wherein,
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted When path is different from described default access path, shield described targeted customer.
The anti-stealing link system that the embodiment of the present invention provides includes accessing node and the access time determines unit, ratio Relatively unit, screen unit, by inquiring about the access log of targeted customer, determine multiple access joints of user Point and the access time of each access node described, and then the plurality of access node is accessed road with presetting Footpath contrasts, to the plurality of access node according to accessing the actual access path of time sequencing composition not The targeted customer being same as described default access path shields, and then wherein, directly accesses if stealing chain person Object content, then the access node of user, with regard to only one of which, will make by accessing node according to access The actual access path that time sequencing is constituted is different from described default access path, thus shields described target User, makes door chain the most thorough while decreasing door chain workload.
As the further optimization of embodiment illustrated in fig. 2 system, preferred at some in embodiment illustrated in fig. 2 Embodiment in described access node and the access time determine that unit includes:
Access node and determine module, for inquiring about the access log of targeted customer, determine multiple ways of user Through access layer to determine multiple access nodes of user;
The access time determines module, for according to the plurality of access time by way of access layer, determines institute State each access time accessing node.
Pleasure described in the above-described embodiments is user to target depending on main website, search, advertisement, video Content conduct interviews during process multiple by way of access layer, by queried access daily record, and then Multiple multiple access nodes determining user by way of access layer according to user, it is to avoid robber chain person is to user The node that accesses carry out imitating the purpose reaching to steal chain, and, determining multiple access nodes of user Also determine the access time of the plurality of access node simultaneously, reduce stolen chain person simulation further May, add the effect of door chain.
In above-described embodiment, described actual access path is different from described default access path and includes: described The quantity accessing node in actual access path is less than the number accessing node in described default access path Amount.
As the further improvement of above-described embodiment, when the plurality of access node is according to accessing time sequencing When the actual access path of composition is identical with described default access path, described screen unit is additionally operable to into one Walk each group neighboring user in more described actual access path and access whether the very first time between node is spaced Each group neighboring user accesses the second predetermined time interval phase between node with described default access path With;If the very first time, interval was less than described second time interval, then shield described targeted customer.
The anti-stealing link system that the embodiment of the present invention provides includes accessing node and the access time determines unit, ratio Relatively unit, screen unit, by inquiring about the access log of targeted customer, determine multiple access joints of user Point and the access time of each access node described, and then the plurality of access node is accessed road with presetting Footpath contrasts, to the plurality of access node according to accessing the actual access path of time sequencing composition not The targeted customer being same as described default access path shields, and then wherein, directly accesses if stealing chain person Object content, then the access node of user, with regard to only one of which, will make by accessing node according to access The actual access path that time sequencing is constituted is different from described default access path, thus shields described target User, makes door chain the most thorough while decreasing door chain workload.
Further, in order to make door chain more thorough, compare the plurality of access node according to Access actual access path that time sequencing constitutes and after described default access path, also need to compare described reality In access path each very first time interval organized between adjacent access node whether with described default access path In each the second time interval preset organized between adjacent access node identical, if interval of the described very first time Less than described second time interval, then shield described targeted customer, thus decrease robber chain person and simulate really Access user's access to object content, make door chain the most thorough.
Device embodiment described above is only schematically, wherein said illustrates as separating component Unit can be or may not be physically separate, the parts shown as unit can be or Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (8)

1. an anti-stealing link method, including:
The access log of inquiry targeted customer, determines that multiple access nodes of user and described each access joint The access time of point;
The plurality of access node is compared with default access path;
When the plurality of access node is different from described according to the actual access path accessing time sequencing composition When presetting access path, shield described targeted customer.
Method the most according to claim 1, wherein, the access log of described inquiry targeted customer, Determine that multiple access nodes and each access time accessing node described of user include:
The access log of inquiry targeted customer, determine user multiple by way of access layer to determine that user is many Individual access node;
According to the plurality of access time by way of access layer, when determining the access of each access node described Between.
Method the most according to claim 1, wherein, described actual access path is different from described pre- If access path includes:
The quantity accessing node in described actual access path is less than the access in described default access path The quantity of node.
4. according to the method according to any one of claim 1-3, wherein, when the plurality of access node According to access time sequencing constitute actual access path identical with described default access path time,
In the most described actual access path, each group neighboring user accesses the very first time between node When whether each group neighboring user accesses predetermined second between node and in described default access path at interval Between be spaced identical,
If the very first time, interval was less than described second time interval, then shield described targeted customer.
5. an anti-stealing link system, including:
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted When path is different from described default access path, shield described targeted customer.
System the most according to claim 5, wherein, described access node and access time determine list Unit includes:
Access node and determine module, for inquiring about the access log of targeted customer, determine multiple ways of user Through access layer to determine multiple access nodes of user;
The access time determines module, for according to the plurality of access time by way of access layer, determines institute State each access time accessing node.
System the most according to claim 5, wherein, described actual access path is different from described pre- If access path includes:
The quantity accessing node in described actual access path is less than the access in described default access path The quantity of node.
8. according to the system according to any one of claim 5-7, wherein, when the plurality of access node According to access time sequencing constitute actual access path identical with described default access path time, described screen Cover unit to be additionally operable to compare further in described actual access path between each group neighboring user access node Very first time interval whether and in described default access path each group neighboring user access between node predetermined The second time interval identical,
If the very first time, interval was less than described second time interval, then shield described targeted customer.
CN201610195922.1A 2016-03-31 2016-03-31 Anti-stealing-link method and system Pending CN105847262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610195922.1A CN105847262A (en) 2016-03-31 2016-03-31 Anti-stealing-link method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610195922.1A CN105847262A (en) 2016-03-31 2016-03-31 Anti-stealing-link method and system

Publications (1)

Publication Number Publication Date
CN105847262A true CN105847262A (en) 2016-08-10

Family

ID=56596308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610195922.1A Pending CN105847262A (en) 2016-03-31 2016-03-31 Anti-stealing-link method and system

Country Status (1)

Country Link
CN (1) CN105847262A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778250A (en) * 2016-12-16 2017-05-31 四川长虹电器股份有限公司 The method whether determining interface is illegally called
CN108234400A (en) * 2016-12-15 2018-06-29 北京金山云网络技术有限公司 A kind of attack determines method, apparatus and Situation Awareness System
CN110704779A (en) * 2019-09-27 2020-01-17 杭州迪普科技股份有限公司 Website page access compliance detection method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008139993A (en) * 2006-11-30 2008-06-19 Hitachi Software Eng Co Ltd Home page verification system and method
CN101815060A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link method of internet content delivery network
CN102045348A (en) * 2010-12-01 2011-05-04 北京迅捷英翔网络科技有限公司 Link stealing prevention system and method
CN102685086A (en) * 2011-04-14 2012-09-19 天脉聚源(北京)传媒科技有限公司 File access method and system
US20130347069A1 (en) * 2012-06-25 2013-12-26 Electronics And Telecommunications Research Institute Referer verification apparatus and method
US8850567B1 (en) * 2008-02-04 2014-09-30 Trend Micro, Inc. Unauthorized URL requests detection
CN104284215A (en) * 2014-09-26 2015-01-14 北京奇艺世纪科技有限公司 Video request processing method and device
CN104584028A (en) * 2012-07-31 2015-04-29 惠普发展公司,有限责任合伙企业 Unauthorized user classification
CN104954415A (en) * 2014-09-24 2015-09-30 腾讯科技(深圳)有限公司 Method and apparatus for carrying out processing on HTTP request

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008139993A (en) * 2006-11-30 2008-06-19 Hitachi Software Eng Co Ltd Home page verification system and method
US8850567B1 (en) * 2008-02-04 2014-09-30 Trend Micro, Inc. Unauthorized URL requests detection
CN101815060A (en) * 2009-02-23 2010-08-25 未序网络科技(上海)有限公司 Anti-stealing link method of internet content delivery network
CN102045348A (en) * 2010-12-01 2011-05-04 北京迅捷英翔网络科技有限公司 Link stealing prevention system and method
CN102685086A (en) * 2011-04-14 2012-09-19 天脉聚源(北京)传媒科技有限公司 File access method and system
US20130347069A1 (en) * 2012-06-25 2013-12-26 Electronics And Telecommunications Research Institute Referer verification apparatus and method
CN104584028A (en) * 2012-07-31 2015-04-29 惠普发展公司,有限责任合伙企业 Unauthorized user classification
CN104954415A (en) * 2014-09-24 2015-09-30 腾讯科技(深圳)有限公司 Method and apparatus for carrying out processing on HTTP request
CN104284215A (en) * 2014-09-26 2015-01-14 北京奇艺世纪科技有限公司 Video request processing method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234400A (en) * 2016-12-15 2018-06-29 北京金山云网络技术有限公司 A kind of attack determines method, apparatus and Situation Awareness System
CN106778250A (en) * 2016-12-16 2017-05-31 四川长虹电器股份有限公司 The method whether determining interface is illegally called
CN110704779A (en) * 2019-09-27 2020-01-17 杭州迪普科技股份有限公司 Website page access compliance detection method, device and equipment

Similar Documents

Publication Publication Date Title
Yang et al. Fake Co-visitation Injection Attacks to Recommender Systems.
Urban et al. Measuring the impact of the GDPR on data sharing in ad networks
Falahrastegar et al. Tracking personal identifiers across the web
Sanchez-Rola et al. The web is watching you: A comprehensive review of web-tracking techniques and countermeasures
US7756987B2 (en) Cybersquatter patrol
CN102891826B (en) The control method of web page access, equipment and system
Wang et al. Webranz: web page randomization for better advertisement delivery and web-bot prevention
CN105915494A (en) Anti-stealing-link method and system
Chaabane et al. Big friend is watching you: Analyzing online social networks tracking capabilities
CN105141605B (en) Session method, Website server and browser
Iliou et al. Hybrid focused crawling for homemade explosives discovery on surface and dark web
Kaizer et al. Towards automatic identification of javascript-oriented machine-based tracking
CN105516734A (en) Method and apparatus for detecting video playing possibility
Iliou et al. Hybrid focused crawling on the Surface and the Dark Web
CN107807937A (en) A kind of website SEO processing methods, apparatus and system
CN105847262A (en) Anti-stealing-link method and system
CN105897671A (en) Anti-hotlinking method and system
CN102629265B (en) A kind of method and system setting up web database
Koide et al. To get lost is to learn the way: Automatically collecting multi-step social engineering attacks on the web
CN106446068A (en) Directory database generation and query methods and apparatuses
CN106656929A (en) Information processing method and apparatus
KR101639869B1 (en) Program for detecting malignant code distributing network
Bailey et al. Look Who's Tracking-An analysis of the 500 websites most-visited by Finnish web users
CN107294903A (en) A kind of network address access method and device
Liou et al. A study of the internet privacy in private browsing mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810

WD01 Invention patent application deemed withdrawn after publication