CN105847262A - Anti-stealing-link method and system - Google Patents
Anti-stealing-link method and system Download PDFInfo
- Publication number
- CN105847262A CN105847262A CN201610195922.1A CN201610195922A CN105847262A CN 105847262 A CN105847262 A CN 105847262A CN 201610195922 A CN201610195922 A CN 201610195922A CN 105847262 A CN105847262 A CN 105847262A
- Authority
- CN
- China
- Prior art keywords
- access
- node
- time
- path
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides an anti-stealing-link method, comprising: querying the access log of a target user to determine a plurality of access nodes of the user and the access time of each access node; comparing the plurality of access nodes with a preset access path; and shielding the target user if an actual access path formed by the plurality of access nodes according to an access time sequence is different from the preset access path. The invention also provides an anti-stealing-link system which compares the actual access path formed by the plurality of access nodes according to an access time sequence with the preset access path to determine whether the target user is a link stealer, shields the target user if yes, reduces anti-stealing-link workload, and realizes anti-stealing-link more thoroughly.
Description
Technical field
The present embodiments relate to internet security technical field, particularly relate to a kind of anti-stealing link method and be
System.
Background technology
Along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem is arisen at the historic moment,
Stealing chain is exactly one side therein.Steal chain and refer to that service provider oneself does not provide the content of service, pass through
Technological means walks around other gainful end-user interface (such as advertisement), directly on the website of oneself
There is provided the service content of other service provider to end user, section end user browses and clicking rate.
Such as, in actual application, some illegal businessmans can pass through correlation technique (such as web crawlers technology)
Crawl URL address (the Uniform Resource of the files in stream media that multimedia service provider provides
Locator, URL), the sky of oneself will be put into after some coding changes inside URL address
In between, when user wants to watch this video, just can directly play after just clicking directly on this link,
And real service provider does not knows the most stolen chain of resource of oneself, provide to real service
Business causes huge economic loss.
Stealing during chain, beneficiary does not provide resource or provides little resource, and real service
Provider but can not get any income, and still suffers from a series of harm brought because of stolen chain,
As: chain is stolen in website can consume the bandwidth of stolen chain website in a large number, causes the access speed of stolen chain website to become
Slowly, real clicking rate perhaps can be the least, and if there is a large amount of such robber's chain in a station server
Situation, the speed of server will decline, and network card pauses, and brings bad experience to user, the most serious
Compromise the interests of stolen chain website, if more serious chain website of stealing also has pornographic, reaction content, more
The fame of stolen chain website can be caused and have a strong impact on.Therefore the Internet especially wireless Internet is led safely
Territory, steals chain security protection imperative.
Existing door chain scheme can be divided into the most several by principle: irregularly change filename or file
Catalogue, restriction referer, encryption certification, file camouflage etc., but these methods are typically all by institute
Some users verify, and then judge whether to shield user, cause workload heavy, and because
Most work all carries out verifying whether user is to steal chain person to make door chain the most thorough.
Summary of the invention
In order to solve the problems of the prior art, on the one hand, the embodiment of the present invention provides a kind of door chain side
Method, including:
The access log of inquiry targeted customer, determines that multiple access nodes of user and described each access joint
The access time of point;
The plurality of access node is compared with default access path;
When the plurality of access node is different from described according to the actual access path accessing time sequencing composition
When presetting access path, shield described targeted customer.
The embodiment of the present invention also provides for a kind of anti-stealing link system, including:
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use
Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted
When path is different from described default access path, shield described targeted customer.
The anti-stealing link method of embodiment of the present invention offer and system, by inquiring about the access log of targeted customer,
Determine multiple access nodes and the access time of each access node described of user, and then by the plurality of
Access node to contrast with default access path, to the plurality of access node according to accessing time sequencing
The access request of the targeted customer that the actual access path constituted is different from described default access path is shielded
Cover, and then wherein, if stealing chain person directly access object content, then the access node the most only of user
Individual, will make to be different from described by access node according to the actual access path that access time sequencing is constituted
Preset access path, thus shield described targeted customer, make to prevent while decreasing door chain workload
Steal chain the most thorough.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below
The required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is this
Some bright embodiments, for those of ordinary skill in the art, before not paying creative work
Put, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the anti-stealing link method of one embodiment of the invention;
Fig. 2 is the structural representation of the anti-stealing link system of one embodiment of the invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this
Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention,
Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on
Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment
Involved technical characteristic can be mutually combined each other.
The execution object of the method described in the embodiment of the present invention can be that certain class (is led to comprehensive in portal website
Internet information resource also provides the application system about information service), forum, social network sites (such as
Happy net, Renren Network etc.), blog (i.e. individual daily record website), e-commerce website, enterprise web site
In the various websites such as (for corporate image displaying), video website, Educational website, to reach all kinds of
The protection of valuable source in website.
The embodiment of the present invention can be passed through hardware processor (hardware processor) realize being correlated with
Functional unit.
Fig. 1 is the schematic flow sheet of embodiment of the present invention anti-stealing link method.As it is shown in figure 1, the present invention prevents
Steal chain method to include:
Step 101: the access log of inquiry targeted customer, determines multiple access nodes of user and described
Each accesses the access time of node;
Such as, when user wants certain video access in happy view station, user must first open happy regarding
Advocating war, and then scan for target video at happy view station, point opens video, the most also must be through
Cross advertisement, just can see video selected by user.
User, during accessing target video content, regards main website, search, advertisement, video through happy
Several processes, will stay and access vestige accordingly, i.e. can by inquire about targeted customer access log,
Determine that user's accesses node and the access time of each access node described.
Step 102: the plurality of access node is compared with default access path;
Above-mentioned default access path be i.e. had to pass through during user accesses target resource main website,
The necessary path such as search, advertisement, video, and the sequencing containing process.
Step 103: when the plurality of access node is according to accessing the actual access path that time sequencing is constituted
When being different from described default access path, shield described targeted customer.
It is different from institute according to the actual access path accessing time sequencing composition according to the plurality of access node
It can be understood as actual access path accesses node less than presetting access path when stating default access path
In the situation of quantity accessing node.
The anti-stealing link method of embodiment of the present invention offer and system, by inquiring about the access log of targeted customer,
Determine multiple access nodes and the access time of each access node described of user, and then by the plurality of
Access node to contrast with default access path, to the plurality of access node according to accessing time sequencing
The access request of the targeted customer that the actual access path constituted is different from described default access path is shielded
Cover, and then wherein, if stealing chain person directly access object content, then the access node the most only of user
Individual, will make to be different from described by access node according to the actual access path that access time sequencing is constituted
Preset access path, thus shield described targeted customer, make to prevent while decreasing door chain workload
Steal chain the most thorough.
In some preferred embodiments, the access log of described inquiry targeted customer, determine that user is many
Individual access node and each access time accessing node described include: the access log of inquiry targeted customer,
Determine user multiple by way of access layer to determine multiple access nodes of user;According to the plurality of by way of
The access time of access layer, determine the access time of each access node described.
Pleasure described in the above-described embodiments is user to target depending on main website, search, advertisement, video
Content conduct interviews during process multiple by way of access layer, by queried access daily record, and then
Multiple multiple access nodes determining user by way of access layer according to user, it is to avoid robber chain person is to user
The node that accesses carry out imitating the purpose reaching to steal chain, and, determining multiple access nodes of user
Also determine the access time of the plurality of access node simultaneously, reduce stolen chain person simulation further
May, add the effect of door chain.
As the further improvement of above-described embodiment, described actual access path is different from described default access
Path includes: the quantity accessing node in described actual access path is less than in described default access path
Access node quantity.
Such as, when actual user wants to watch target video, he must log in main website, through search, extensively
Accuse and just can see target video, but stealing chain person, but can to walk around main website, search, these flow processs of advertisement straight
Video resource is asked in receiving, i.e. according to steal chain person by way of access layer will reduce and then the actual visit of user
Asking the way the node that accesses in footpath can be less than the access node preset in access path, when judgement is learnt described many
Individual access node is different from described default access path according to the actual access path accessing time sequencing composition
Time, so that it may assert that this is the request stealing chain person, so that it may directly shield described targeted customer.
In order to make door chain more thorough, it is preferable that when the plurality of access node is suitable according to the time of access
When the actual access path of sequence composition is identical with described default access path, the most described actual visit
Ask the way each group neighboring user accesses between node in footpath very first time interval whether with described default access road
Predetermined the second time interval that in footpath, each group neighboring user accesses between node is identical, if between the very first time
Every less than described second time interval, then shield described targeted customer.
Because stealing chain person in the access to object content in order to avoid being found to be likely to by simulation very
Positive access user takes object content, so for the effect reaching door chain further, also needing
Judge that in user's actual access path, each very first time organized between neighboring user access node is spaced with described
Preset each group neighboring user in access path and access the whether phase of the second predetermined time interval between node
With, decide whether to shield described targeted customer according to judged result.
Because stealing the purpose being likely to during chain person steals chain by reaching to steal chain by machine,
And the speed of operation of machine is much larger than artificial speed of operation, even if or stealing chain person and simulate real visit
Ask user browsing process, but for the time of saving, the most real access user wants when accessing object content
The time spot waited is 60 seconds, but steals chain person and will shorten to the time spot 15 seconds, and not by advertisement
Finish watching and begin to watch video, thus make very first time interval be less than the second predetermined time interval,
And then can learn that user is to steal chain person by this judged result, thus shield described targeted customer, subtract
Workload in few door chain, makes door chain the most thorough simultaneously.
The anti-stealing link method that the embodiment of the present invention provides, by inquiring about the access log of targeted customer, determines
Multiple access nodes of user and the access time of each access node described, and then by the plurality of access
Node contrasts with default access path, constitutes the plurality of access node according to accessing time sequencing
Actual access path be different from the targeted customer of described default access path and shield, and then wherein,
If steal chain person directly access object content, then the access node of user with regard to only one of which, will make by
Access node and be different from described default access path according to the actual access path accessing time sequencing composition,
Thus shield described targeted customer, make door chain the most thorough while decreasing door chain workload.
Further, in order to make door chain more thorough, compare the plurality of access node according to
Access actual access path that time sequencing constitutes and after described default access path, also need to compare described reality
In access path each very first time interval organized between adjacent access node whether with described default access path
In each the second time interval preset organized between adjacent access node identical, if interval of the described very first time
Less than described second time interval, then shield described targeted customer, thus decrease robber chain person and simulate really
Access user's access to object content, make door chain the most thorough.
Fig. 2 is the structural representation of embodiment of the present invention anti-stealing link system.Door chain side of the present invention
Method can be implemented by the anti-stealing link system in the present embodiment.As in figure 2 it is shown, anti-stealing link system of the present invention
Unit, comparing unit, screen unit is determined including accessing node and access time, wherein,
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use
Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted
When path is different from described default access path, shield described targeted customer.
The anti-stealing link system that the embodiment of the present invention provides includes accessing node and the access time determines unit, ratio
Relatively unit, screen unit, by inquiring about the access log of targeted customer, determine multiple access joints of user
Point and the access time of each access node described, and then the plurality of access node is accessed road with presetting
Footpath contrasts, to the plurality of access node according to accessing the actual access path of time sequencing composition not
The targeted customer being same as described default access path shields, and then wherein, directly accesses if stealing chain person
Object content, then the access node of user, with regard to only one of which, will make by accessing node according to access
The actual access path that time sequencing is constituted is different from described default access path, thus shields described target
User, makes door chain the most thorough while decreasing door chain workload.
As the further optimization of embodiment illustrated in fig. 2 system, preferred at some in embodiment illustrated in fig. 2
Embodiment in described access node and the access time determine that unit includes:
Access node and determine module, for inquiring about the access log of targeted customer, determine multiple ways of user
Through access layer to determine multiple access nodes of user;
The access time determines module, for according to the plurality of access time by way of access layer, determines institute
State each access time accessing node.
Pleasure described in the above-described embodiments is user to target depending on main website, search, advertisement, video
Content conduct interviews during process multiple by way of access layer, by queried access daily record, and then
Multiple multiple access nodes determining user by way of access layer according to user, it is to avoid robber chain person is to user
The node that accesses carry out imitating the purpose reaching to steal chain, and, determining multiple access nodes of user
Also determine the access time of the plurality of access node simultaneously, reduce stolen chain person simulation further
May, add the effect of door chain.
In above-described embodiment, described actual access path is different from described default access path and includes: described
The quantity accessing node in actual access path is less than the number accessing node in described default access path
Amount.
As the further improvement of above-described embodiment, when the plurality of access node is according to accessing time sequencing
When the actual access path of composition is identical with described default access path, described screen unit is additionally operable to into one
Walk each group neighboring user in more described actual access path and access whether the very first time between node is spaced
Each group neighboring user accesses the second predetermined time interval phase between node with described default access path
With;If the very first time, interval was less than described second time interval, then shield described targeted customer.
The anti-stealing link system that the embodiment of the present invention provides includes accessing node and the access time determines unit, ratio
Relatively unit, screen unit, by inquiring about the access log of targeted customer, determine multiple access joints of user
Point and the access time of each access node described, and then the plurality of access node is accessed road with presetting
Footpath contrasts, to the plurality of access node according to accessing the actual access path of time sequencing composition not
The targeted customer being same as described default access path shields, and then wherein, directly accesses if stealing chain person
Object content, then the access node of user, with regard to only one of which, will make by accessing node according to access
The actual access path that time sequencing is constituted is different from described default access path, thus shields described target
User, makes door chain the most thorough while decreasing door chain workload.
Further, in order to make door chain more thorough, compare the plurality of access node according to
Access actual access path that time sequencing constitutes and after described default access path, also need to compare described reality
In access path each very first time interval organized between adjacent access node whether with described default access path
In each the second time interval preset organized between adjacent access node identical, if interval of the described very first time
Less than described second time interval, then shield described targeted customer, thus decrease robber chain person and simulate really
Access user's access to object content, make door chain the most thorough.
Device embodiment described above is only schematically, wherein said illustrates as separating component
Unit can be or may not be physically separate, the parts shown as unit can be or
Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network
On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible
Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality
The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly
Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words
Dividing and can embody with the form of software product, this computer software product can be stored in computer can
Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one
Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented
The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it
Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area
Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or
Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill
The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (8)
1. an anti-stealing link method, including:
The access log of inquiry targeted customer, determines that multiple access nodes of user and described each access joint
The access time of point;
The plurality of access node is compared with default access path;
When the plurality of access node is different from described according to the actual access path accessing time sequencing composition
When presetting access path, shield described targeted customer.
Method the most according to claim 1, wherein, the access log of described inquiry targeted customer,
Determine that multiple access nodes and each access time accessing node described of user include:
The access log of inquiry targeted customer, determine user multiple by way of access layer to determine that user is many
Individual access node;
According to the plurality of access time by way of access layer, when determining the access of each access node described
Between.
Method the most according to claim 1, wherein, described actual access path is different from described pre-
If access path includes:
The quantity accessing node in described actual access path is less than the access in described default access path
The quantity of node.
4. according to the method according to any one of claim 1-3, wherein, when the plurality of access node
According to access time sequencing constitute actual access path identical with described default access path time,
In the most described actual access path, each group neighboring user accesses the very first time between node
When whether each group neighboring user accesses predetermined second between node and in described default access path at interval
Between be spaced identical,
If the very first time, interval was less than described second time interval, then shield described targeted customer.
5. an anti-stealing link system, including:
Access node and the access time determines unit, for inquiring about the access log of targeted customer, determine use
Multiple access nodes at family and the access time of each access node described;
Comparing unit, for comparing the plurality of access node with default access path;
Screen unit, for when the plurality of access node is according to accessing the actual access that time sequencing is constituted
When path is different from described default access path, shield described targeted customer.
System the most according to claim 5, wherein, described access node and access time determine list
Unit includes:
Access node and determine module, for inquiring about the access log of targeted customer, determine multiple ways of user
Through access layer to determine multiple access nodes of user;
The access time determines module, for according to the plurality of access time by way of access layer, determines institute
State each access time accessing node.
System the most according to claim 5, wherein, described actual access path is different from described pre-
If access path includes:
The quantity accessing node in described actual access path is less than the access in described default access path
The quantity of node.
8. according to the system according to any one of claim 5-7, wherein, when the plurality of access node
According to access time sequencing constitute actual access path identical with described default access path time, described screen
Cover unit to be additionally operable to compare further in described actual access path between each group neighboring user access node
Very first time interval whether and in described default access path each group neighboring user access between node predetermined
The second time interval identical,
If the very first time, interval was less than described second time interval, then shield described targeted customer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610195922.1A CN105847262A (en) | 2016-03-31 | 2016-03-31 | Anti-stealing-link method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610195922.1A CN105847262A (en) | 2016-03-31 | 2016-03-31 | Anti-stealing-link method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105847262A true CN105847262A (en) | 2016-08-10 |
Family
ID=56596308
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610195922.1A Pending CN105847262A (en) | 2016-03-31 | 2016-03-31 | Anti-stealing-link method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105847262A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778250A (en) * | 2016-12-16 | 2017-05-31 | 四川长虹电器股份有限公司 | The method whether determining interface is illegally called |
CN108234400A (en) * | 2016-12-15 | 2018-06-29 | 北京金山云网络技术有限公司 | A kind of attack determines method, apparatus and Situation Awareness System |
CN110704779A (en) * | 2019-09-27 | 2020-01-17 | 杭州迪普科技股份有限公司 | Website page access compliance detection method, device and equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008139993A (en) * | 2006-11-30 | 2008-06-19 | Hitachi Software Eng Co Ltd | Home page verification system and method |
CN101815060A (en) * | 2009-02-23 | 2010-08-25 | 未序网络科技(上海)有限公司 | Anti-stealing link method of internet content delivery network |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102685086A (en) * | 2011-04-14 | 2012-09-19 | 天脉聚源(北京)传媒科技有限公司 | File access method and system |
US20130347069A1 (en) * | 2012-06-25 | 2013-12-26 | Electronics And Telecommunications Research Institute | Referer verification apparatus and method |
US8850567B1 (en) * | 2008-02-04 | 2014-09-30 | Trend Micro, Inc. | Unauthorized URL requests detection |
CN104284215A (en) * | 2014-09-26 | 2015-01-14 | 北京奇艺世纪科技有限公司 | Video request processing method and device |
CN104584028A (en) * | 2012-07-31 | 2015-04-29 | 惠普发展公司,有限责任合伙企业 | Unauthorized user classification |
CN104954415A (en) * | 2014-09-24 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Method and apparatus for carrying out processing on HTTP request |
-
2016
- 2016-03-31 CN CN201610195922.1A patent/CN105847262A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008139993A (en) * | 2006-11-30 | 2008-06-19 | Hitachi Software Eng Co Ltd | Home page verification system and method |
US8850567B1 (en) * | 2008-02-04 | 2014-09-30 | Trend Micro, Inc. | Unauthorized URL requests detection |
CN101815060A (en) * | 2009-02-23 | 2010-08-25 | 未序网络科技(上海)有限公司 | Anti-stealing link method of internet content delivery network |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102685086A (en) * | 2011-04-14 | 2012-09-19 | 天脉聚源(北京)传媒科技有限公司 | File access method and system |
US20130347069A1 (en) * | 2012-06-25 | 2013-12-26 | Electronics And Telecommunications Research Institute | Referer verification apparatus and method |
CN104584028A (en) * | 2012-07-31 | 2015-04-29 | 惠普发展公司,有限责任合伙企业 | Unauthorized user classification |
CN104954415A (en) * | 2014-09-24 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Method and apparatus for carrying out processing on HTTP request |
CN104284215A (en) * | 2014-09-26 | 2015-01-14 | 北京奇艺世纪科技有限公司 | Video request processing method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234400A (en) * | 2016-12-15 | 2018-06-29 | 北京金山云网络技术有限公司 | A kind of attack determines method, apparatus and Situation Awareness System |
CN106778250A (en) * | 2016-12-16 | 2017-05-31 | 四川长虹电器股份有限公司 | The method whether determining interface is illegally called |
CN110704779A (en) * | 2019-09-27 | 2020-01-17 | 杭州迪普科技股份有限公司 | Website page access compliance detection method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Fake Co-visitation Injection Attacks to Recommender Systems. | |
Urban et al. | Measuring the impact of the GDPR on data sharing in ad networks | |
Falahrastegar et al. | Tracking personal identifiers across the web | |
Sanchez-Rola et al. | The web is watching you: A comprehensive review of web-tracking techniques and countermeasures | |
US7756987B2 (en) | Cybersquatter patrol | |
CN102891826B (en) | The control method of web page access, equipment and system | |
Wang et al. | Webranz: web page randomization for better advertisement delivery and web-bot prevention | |
CN105915494A (en) | Anti-stealing-link method and system | |
Chaabane et al. | Big friend is watching you: Analyzing online social networks tracking capabilities | |
CN105141605B (en) | Session method, Website server and browser | |
Iliou et al. | Hybrid focused crawling for homemade explosives discovery on surface and dark web | |
Kaizer et al. | Towards automatic identification of javascript-oriented machine-based tracking | |
CN105516734A (en) | Method and apparatus for detecting video playing possibility | |
Iliou et al. | Hybrid focused crawling on the Surface and the Dark Web | |
CN107807937A (en) | A kind of website SEO processing methods, apparatus and system | |
CN105847262A (en) | Anti-stealing-link method and system | |
CN105897671A (en) | Anti-hotlinking method and system | |
CN102629265B (en) | A kind of method and system setting up web database | |
Koide et al. | To get lost is to learn the way: Automatically collecting multi-step social engineering attacks on the web | |
CN106446068A (en) | Directory database generation and query methods and apparatuses | |
CN106656929A (en) | Information processing method and apparatus | |
KR101639869B1 (en) | Program for detecting malignant code distributing network | |
Bailey et al. | Look Who's Tracking-An analysis of the 500 websites most-visited by Finnish web users | |
CN107294903A (en) | A kind of network address access method and device | |
Liou et al. | A study of the internet privacy in private browsing mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |
|
WD01 | Invention patent application deemed withdrawn after publication |