CN107341375A - A kind of method and system for the attacker that traced to the source based on Web page picture secret mark - Google Patents
A kind of method and system for the attacker that traced to the source based on Web page picture secret mark Download PDFInfo
- Publication number
- CN107341375A CN107341375A CN201611128079.1A CN201611128079A CN107341375A CN 107341375 A CN107341375 A CN 107341375A CN 201611128079 A CN201611128079 A CN 201611128079A CN 107341375 A CN107341375 A CN 107341375A
- Authority
- CN
- China
- Prior art keywords
- secret mark
- attacker
- picture
- relevant information
- visitor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000009545 invasion Effects 0.000 claims description 8
- 230000008901 benefit Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Abstract
The invention discloses a kind of method and system for the attacker that traced to the source based on Web page picture secret mark, including:The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;Capture screen message disclosed in attacker;The picture secret mark in screen message is extracted, parsing picture secret mark obtains secret mark, and searches journal file based on secret mark and then obtain the relevant information of attacker.Technical scheme of the present invention by picture secret mark generation method built in the webpage development stage, and then cause attacker it is open invade information when unconsciously expose secret mark information, and then the attacker that effectively traces to the source, association attack tissue.
Description
Technical field
The present invention relates to technical field of network security, more particularly to a kind of side for the attacker that traced to the source based on Web page picture secret mark
Method and system.
Background technology
For political motives or commercial object, some attackers can repeatedly distort website after invasion government, enterprise web site
The page, such as leave reactionary slogan or slander by the information of invasion website.In order to prove that it is invaded achievement, shown off to others or real
Existing its politics, commercial object, attacker is often to the page after distorting(Including pointing to the page in browser address bar
URL)Record screen message is carried out, and this kind of sectional drawing, photo are shared by social networks using sectional drawing, the mode such as take pictures.
Although these sectional drawings, the screen message described in photo, nothing can got afterwards by invasion government, enterprise
Method judges that whom attacker is accordingly, can not also judge whether different intrusion events belong to same attack tissue.
The content of the invention
For above-mentioned technical problem, technical solutions according to the invention carry out correlation in related web site development process and set
Put, if access request be present, obtain the relevant information of visitor and generate corresponding secret mark, and the secret mark is added in picture
Form picture secret mark and be shown to visitor, once attacker records screen message by sectional drawing, the form such as take pictures and issued without restraint,
The picture secret mark being then directed in screen message can obtain the relevant information of attacker, be easy to later stage seat offence source or pass
Connection attack tissue.
The present invention realizes with the following method:A kind of method for the attacker that traced to the source based on Web page picture secret mark, including:
The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;Wherein, institute
Stating corresponding secret mark need to only ensure in short term uniquely, because attacker selects very first time public attack generally after success attack
Achievement, therefore, the secret mark need to only ensure in short term uniquely, and be corresponded with relevant information;
The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;
Capture screen message disclosed in attacker;
Extract the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and based on secret mark search journal file and then
Obtain the relevant information of attacker.
Further, the relevant information for obtaining visitor, and the relevant information is write with the corresponding secret mark generated
Enter journal file, be specially:If Website server receives the access request of visitor, the relevant information of visitor is obtained,
And based on preset rules generation secret mark, the relevant information is write into journal file with the corresponding secret mark generated.
Further, it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Further, screen message disclosed in the capture attacker, it is specially:If attacker be present publishes website
Message is invaded, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provide normal web service.
In the above method, in addition to:Relevant information based on attacker trace to the source attacker or association attack tissue.
In the above method, the relevant information includes but is not limited to:Access date, access time, visitor IP;The phase
Closing information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or
Person's system banner etc..
The present invention can be realized using following system:A kind of system for the attacker that traced to the source based on Web page picture secret mark, bag
Include:
Secret mark generation module, write for obtaining the relevant information of visitor, and by the relevant information with the corresponding secret mark generated
Enter journal file;Wherein, the corresponding secret mark need to only ensure short-term unique, because attacker generally selects after success attack
Very first time public attack achievement is selected, therefore, the secret mark need to only ensure in short term uniquely, and corresponded with relevant information and be
Can;
Secret mark display module, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added into webpage
In be shown to visitor;
Screen message acquisition module, for capturing screen message disclosed in attacker;
Information searching module is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and is based on
Secret mark searches journal file and then obtains the relevant information of attacker.
Further, the secret mark generation module, is specifically used for:If the access that Website server receives visitor please
Ask, then obtain the relevant information of visitor, and based on preset rules generation secret mark, the relevant information is corresponding dark with generating
Note write-in journal file.
Further, it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Further, the screen message acquisition module, is specifically used for:Disappear if attacker be present and publish invasion
Breath, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provides normal web service.
In said system, in addition to:Attacker traces to the source module, for the relevant information based on attacker trace to the source attacker or
Person associates attack tissue.
In said system, the relevant information includes but is not limited to:Access date, access time, visitor IP;The phase
Closing information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or
Person's system banner etc..
To sum up, the present invention provides a kind of method and system for the attacker that traced to the source based on Web page picture secret mark, and the present invention is used for
When visitor submits access request, Website server obtains the relevant information of visitor and generated one-to-one dark with it
Note, and be recorded in journal file, picture secret mark is added in the page returned then to visitor, and the picture secret mark is more hidden
And the access to the true page is not influenceed, attacker's relevant information will be recorded in the case of attacker is unwitting so as to realize
Picture secret mark record, if get in a network attacker distribution the sectional drawing or photo of distorting webpage, obtain
Picture secret mark in sectional drawing or photo, parses the picture secret mark and obtains secret mark, searches journal file based on secret mark, and then obtain
Take the relevant information of attacker.
Have the beneficial effect that:Obtained in webpage capture or photo that technical scheme of the present invention can be issued from attacker
Picture secret mark, so as to which the identity information of the attacker drawn based on parsing picture secret mark assists the attacker that traces to the source, associate attack group
Knit, in this, as the aucillary document of prosecution attacker, or the trail of evidence as legal agency law enforcement.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to the required accompanying drawing used in embodiment below
Singly introduce, it should be apparent that, drawings in the following description are only some embodiments described in the present invention, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of embodiment of the method flow chart for the attacker that traced to the source based on Web page picture secret mark provided by the invention;
Fig. 2 is a kind of system embodiment structure chart for the attacker that traced to the source based on Web page picture secret mark provided by the invention.
Embodiment
The present invention gives a kind of method and system embodiment for the attacker that traced to the source based on Web page picture secret mark, in order that this
Person skilled in the art more fully understands the technical scheme in the embodiment of the present invention, and make the present invention above-mentioned purpose, feature and
Advantage can be more obvious understandable, and technical scheme in the present invention is described in further detail below in conjunction with the accompanying drawings:
Present invention firstly provides a kind of embodiment of the method for the attacker that traced to the source based on Web page picture secret mark, as shown in figure 1, bag
Include:
S101:The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated.
Wherein, the method by Website page development process, then adding generation secret mark, it is specially:If website service
Device receives the access request of visitor, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by described in
Relevant information writes journal file with the corresponding secret mark generated.
More specifically, the preset rules of the generation secret mark are not unique, as long as ensureing that visitor accesses every time can give birth to
Into difference secret mark corresponding with this access related information, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Wherein, the corresponding secret mark need to only ensure short-term unique, because attacker generally selects after success attack
Very first time public attack achievement, therefore, the secret mark need to only ensure in short term uniquely, and be corresponded with relevant information;
Wherein, if selection Generating Random Number generates secret mark as preset rules, such as:12345, then by the phase of visitor
Information and secret mark write-in journal file are closed, such as:2016-11-24 15:49:00 123.123.123.123 12345;Meanwhile
Pre-arranged code mode can be selected to generate secret mark, and specific coded system can select as needed, each coded system has respectively
From benefit, such as BASE64.
Wherein, the relevant information includes but is not limited to:Access date, access time, visitor IP;The relevant information
It can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or system
Mark etc.;, can not be according to these although in the prior art, can be with the identity information of record access person in server side
Identity information seat offence person.
S102:The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to
Visitor;Wherein, the secret mark is not directly displayed to visitor, but secret mark is encoded to the purpose shown into picture is,
The picture secret mark is more hidden, can't influence overall display effect, is not easy to be found by attacker.Wherein, by secret mark encode to
Method in picture is not unique, can select as needed, includes but is not limited to:Two-dimensional code generation method etc..
S103:Capture screen message disclosed in attacker;Wherein, attacker discloses the form of screen message and included but unlimited
In:Sectional drawing or the diversified forms such as take pictures;
Specifically, if attacker be present publishes invasion message, obtain screen message disclosed in attacker, otherwise after
Continue and provide normal web service for visitor.
S104:The picture secret mark in screen message is extracted, parsing picture secret mark obtains secret mark, and searches daily record based on secret mark
File and then the relevant information for obtaining attacker.
Such as:It is 12345 that secret mark is parsed after acquisition picture secret mark, then it is 12345 pairs that secret mark is searched in journal file
The log information answered, the relevant information of visitor is most obtained at last, is comprised at least:2016-11-24 15:49:00
123.123.123.123。
S105:Relevant information based on attacker trace to the source attacker or association attack tissue.
Secondly the present invention provides a kind of system embodiment for the attacker that traced to the source based on Web page picture secret mark, as shown in Fig. 2
Including:
Secret mark generation module 201, for obtaining the relevant information of visitor, and the corresponding secret mark by the relevant information with generation
Write journal file.
Wherein, the method by Website page development process, then adding generation secret mark, it is specially:If website service
Device receives the access request of visitor, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by described in
Relevant information writes journal file with the corresponding secret mark generated.
More specifically, the preset rules of the generation secret mark are not unique, as long as ensureing that visitor accesses every time can give birth to
Into difference secret mark corresponding with this access related information.
Secret mark display module 202, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added
Enter and visitor is shown in webpage.
Wherein, the secret mark is not directly displayed to visitor, but secret mark is encoded to the purpose shown into picture is,
The picture secret mark is more hidden, can't influence overall display effect, is not easy to be found by attacker.Wherein, by secret mark encode to
Method in picture is not unique, can select as needed, includes but is not limited to:Two-dimensional code generation method etc..
Screen message acquisition module 203, for capturing screen message disclosed in attacker.
Information searching module 204 is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains dark
Note, and journal file is searched based on secret mark and then obtains the relevant information of attacker.
Attacker traces to the source module 205, is traced to the source attacker or association attack tissue for the relevant information based on attacker.
Preferably, the secret mark generation module, is specifically used for:If Website server receives the access request of visitor,
The relevant information of visitor is then obtained, and based on preset rules generation secret mark, the corresponding secret mark by the relevant information with generation
Write journal file.
It is highly preferred that it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Preferably, the screen message acquisition module, is specifically used for:Disappear if attacker be present and publish invasion
Breath, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provides normal web service.
In said system embodiment, the relevant information includes but is not limited to:Access date, access time, visitor IP;
The relevant information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user
Mark or system banner etc..
Each embodiment in this specification is described by the way of progressive, same or analogous between each embodiment
Part is mutually referring to what each embodiment stressed is the difference with other embodiment.Especially for system
For embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is implemented referring to method
The part explanation of example.
As described above, above-described embodiment gives a kind of method and system reality for the attacker that traced to the source based on Web page picture secret mark
Example is applied, by the way that in Website page development process, its relevant information will be obtained for the access request of visitor, and generate short
Phase, unduplicated secret mark was corresponding, was stored in journal file;Secret mark is encoded into picture and forms picture secret mark, and with page
Face content is together exported to visitor;Once attacker distorts web page contents and screenshotss are shown off, then together with picture secret mark together by
Screenshots show, secret mark information is obtained by obtaining parsing picture secret mark, can be obtained pair based on secret mark information searching journal file
The relevant information of the visitor answered, you can using relevant information trace to the source attacker or association attack tissue.Meanwhile according to being obtained
The single or multiple screen message got, so associate attack tissue, and can in this, as prosecution attacker aucillary document,
Or the clue as legal agency law enforcement.
Above example is to illustrative and not limiting technical scheme.Appointing for spirit and scope of the invention is not departed from
What modification or local replacement, all should cover among scope of the presently claimed invention.
Claims (10)
- A kind of 1. method for the attacker that traced to the source based on Web page picture secret mark, it is characterised in that including:The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;Capture screen message disclosed in attacker;Extract the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and based on secret mark search journal file and then Obtain the relevant information of attacker.
- 2. the method as described in claim 1, it is characterised in that the relevant information for obtaining visitor, and by the correlation Information writes journal file with the corresponding secret mark generated, is specially:If Website server receives the access request of visitor, The relevant information of visitor is obtained, and based on preset rules generation secret mark, the relevant information is write with the corresponding secret mark generated Enter journal file.
- 3. method as claimed in claim 2, it is characterised in that it is described based on preset rules generation secret mark, including:Random numeral is generated as secret mark based on Generating Random Number;OrSelection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
- 4. the method as described in claim 1, it is characterised in that screen message disclosed in the capture attacker, be specially:If Attacker be present and publish invasion message, then screen message disclosed in acquisition attacker, otherwise continues as visitor and carry For normal web service.
- 5. the method as described in claim 1-4 is any, it is characterised in that also include:Relevant information based on attacker is traced to the source Attacker or association attack tissue.
- A kind of 6. system for the attacker that traced to the source based on Web page picture secret mark, it is characterised in that including:Secret mark generation module, write for obtaining the relevant information of visitor, and by the relevant information with the corresponding secret mark generated Enter journal file;Secret mark display module, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added into webpage In be shown to visitor;Screen message acquisition module, for capturing screen message disclosed in attacker;Information searching module is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and is based on Secret mark searches journal file and then obtains the relevant information of attacker.
- 7. system as claimed in claim 6, it is characterised in that the secret mark generation module, be specifically used for:If Website server The access request of visitor is received, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by the phase Close information and write journal file with the corresponding secret mark generated.
- 8. system as claimed in claim 7, it is characterised in that it is described based on preset rules generation secret mark, including:Random numeral is generated as secret mark based on Generating Random Number;OrSelection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
- 9. system as claimed in claim 6, it is characterised in that the screen message acquisition module, be specifically used for:If in the presence of attacking The person of hitting publishes invasion message, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provide normally Web service.
- 10. the system as described in claim 6-9, it is characterised in that also include:Attacker traces to the source module, for based on attack The relevant information of person trace to the source attacker or association attack tissue.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128079.1A CN107341375A (en) | 2016-12-09 | 2016-12-09 | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128079.1A CN107341375A (en) | 2016-12-09 | 2016-12-09 | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107341375A true CN107341375A (en) | 2017-11-10 |
Family
ID=60223044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611128079.1A Pending CN107341375A (en) | 2016-12-09 | 2016-12-09 | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107341375A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110543884A (en) * | 2018-05-29 | 2019-12-06 | 国际关系学院 | network attack organization tracing method based on image |
CN110990830A (en) * | 2019-12-12 | 2020-04-10 | 国网新疆电力有限公司信息通信公司 | Terminal evidence obtaining and tracing system and method |
CN114363022A (en) * | 2021-12-22 | 2022-04-15 | 西安四叶草信息技术有限公司 | Attack tracing method and device, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070156900A1 (en) * | 2005-09-06 | 2007-07-05 | Daniel Chien | Evaluating a questionable network communication |
US20080313732A1 (en) * | 2007-06-14 | 2008-12-18 | International Business Machines Corporation | Preventing the theft of protected items of user data in computer controlled communication networks by intruders posing as trusted network sites |
CN102833212A (en) * | 2011-06-14 | 2012-12-19 | 阿里巴巴集团控股有限公司 | Webpage visitor identity identification method and system |
US20130276062A1 (en) * | 2012-04-13 | 2013-10-17 | Cable Television Laboratories, Inc. | Watermarks for roaming |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN104601591A (en) * | 2015-02-02 | 2015-05-06 | 中国人民解放军国防科学技术大学 | Detection method of network attack source organization |
CN105306467A (en) * | 2015-10-30 | 2016-02-03 | 北京奇虎科技有限公司 | Method and device for analyzing webpage data tampering |
CN105844121A (en) * | 2016-03-31 | 2016-08-10 | 乐视控股(北京)有限公司 | Method and system for applying digital watermark to content delivery network (CDN) |
-
2016
- 2016-12-09 CN CN201611128079.1A patent/CN107341375A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070156900A1 (en) * | 2005-09-06 | 2007-07-05 | Daniel Chien | Evaluating a questionable network communication |
US20080313732A1 (en) * | 2007-06-14 | 2008-12-18 | International Business Machines Corporation | Preventing the theft of protected items of user data in computer controlled communication networks by intruders posing as trusted network sites |
CN102833212A (en) * | 2011-06-14 | 2012-12-19 | 阿里巴巴集团控股有限公司 | Webpage visitor identity identification method and system |
US20130276062A1 (en) * | 2012-04-13 | 2013-10-17 | Cable Television Laboratories, Inc. | Watermarks for roaming |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN104601591A (en) * | 2015-02-02 | 2015-05-06 | 中国人民解放军国防科学技术大学 | Detection method of network attack source organization |
CN105306467A (en) * | 2015-10-30 | 2016-02-03 | 北京奇虎科技有限公司 | Method and device for analyzing webpage data tampering |
CN105844121A (en) * | 2016-03-31 | 2016-08-10 | 乐视控股(北京)有限公司 | Method and system for applying digital watermark to content delivery network (CDN) |
Non-Patent Citations (1)
Title |
---|
田新 等: ""新华社多媒体数据库系统采用数字水印版权保护技术"", 《中国传媒科技》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110543884A (en) * | 2018-05-29 | 2019-12-06 | 国际关系学院 | network attack organization tracing method based on image |
CN110990830A (en) * | 2019-12-12 | 2020-04-10 | 国网新疆电力有限公司信息通信公司 | Terminal evidence obtaining and tracing system and method |
CN114363022A (en) * | 2021-12-22 | 2022-04-15 | 西安四叶草信息技术有限公司 | Attack tracing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rüth et al. | Digging into browser-based crypto mining | |
Weidmann et al. | The Internet and political protest in autocracies | |
CN110119469A (en) | A kind of data collection and transmission and method towards darknet | |
Klausen et al. | The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign | |
CN104717185B (en) | Displaying response method, device, server and the system of short uniform resource locator | |
Ruan et al. | One App, Two Systems: How WeChat uses one censorship policy in China and another internationally | |
CN101534306B (en) | Detecting method and a device for fishing website | |
US8312538B2 (en) | Site check method | |
CN109104456A (en) | A kind of user tracking based on browser fingerprint and propagating statistics analysis method | |
CN109690547A (en) | For detecting the system and method cheated online | |
WO2013097742A1 (en) | Methods and devices for identifying tampered webpage and identifying hijacked website | |
CN102436564A (en) | Method and device for identifying falsified webpage | |
Bujlow et al. | Web tracking: Mechanisms, implications, and defenses | |
Martin et al. | Hidden surveillance by Web sites: Web bugs in contemporary use | |
CN103067387B (en) | A kind of anti-phishing monitoring system and method | |
CN107341375A (en) | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark | |
Kobusińska et al. | Big Data fingerprinting information analytics for sustainability | |
Zeng et al. | A comprehensive measurement study of domain-squatting abuse | |
Cobo et al. | Turn off your camera and turn on your privacy: A case study about Zoom and digital education in South American countries | |
Abouollo et al. | Detecting malicious user accounts using Canvas Fingerprint | |
US20150149276A1 (en) | Dynamic machine-readable codes | |
Cobo et al. | Turn off your camera and turn on your privacy | |
KR102531661B1 (en) | System for providing phishing warning service using contents based blocking | |
Badawi et al. | Automatic detection and analysis of the “game hack” scam | |
Haunss | Privacy Activism after Snoweden: Advocacy Networks or Protest |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171110 |