CN107341375A - A kind of method and system for the attacker that traced to the source based on Web page picture secret mark - Google Patents

A kind of method and system for the attacker that traced to the source based on Web page picture secret mark Download PDF

Info

Publication number
CN107341375A
CN107341375A CN201611128079.1A CN201611128079A CN107341375A CN 107341375 A CN107341375 A CN 107341375A CN 201611128079 A CN201611128079 A CN 201611128079A CN 107341375 A CN107341375 A CN 107341375A
Authority
CN
China
Prior art keywords
secret mark
attacker
picture
relevant information
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611128079.1A
Other languages
Chinese (zh)
Inventor
李柏松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ahtech Network Safe Technology Ltd
Original Assignee
Beijing Ahtech Network Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ahtech Network Safe Technology Ltd filed Critical Beijing Ahtech Network Safe Technology Ltd
Priority to CN201611128079.1A priority Critical patent/CN107341375A/en
Publication of CN107341375A publication Critical patent/CN107341375A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a kind of method and system for the attacker that traced to the source based on Web page picture secret mark, including:The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;Capture screen message disclosed in attacker;The picture secret mark in screen message is extracted, parsing picture secret mark obtains secret mark, and searches journal file based on secret mark and then obtain the relevant information of attacker.Technical scheme of the present invention by picture secret mark generation method built in the webpage development stage, and then cause attacker it is open invade information when unconsciously expose secret mark information, and then the attacker that effectively traces to the source, association attack tissue.

Description

A kind of method and system for the attacker that traced to the source based on Web page picture secret mark
Technical field
The present invention relates to technical field of network security, more particularly to a kind of side for the attacker that traced to the source based on Web page picture secret mark Method and system.
Background technology
For political motives or commercial object, some attackers can repeatedly distort website after invasion government, enterprise web site The page, such as leave reactionary slogan or slander by the information of invasion website.In order to prove that it is invaded achievement, shown off to others or real Existing its politics, commercial object, attacker is often to the page after distorting(Including pointing to the page in browser address bar URL)Record screen message is carried out, and this kind of sectional drawing, photo are shared by social networks using sectional drawing, the mode such as take pictures.
Although these sectional drawings, the screen message described in photo, nothing can got afterwards by invasion government, enterprise Method judges that whom attacker is accordingly, can not also judge whether different intrusion events belong to same attack tissue.
The content of the invention
For above-mentioned technical problem, technical solutions according to the invention carry out correlation in related web site development process and set Put, if access request be present, obtain the relevant information of visitor and generate corresponding secret mark, and the secret mark is added in picture Form picture secret mark and be shown to visitor, once attacker records screen message by sectional drawing, the form such as take pictures and issued without restraint, The picture secret mark being then directed in screen message can obtain the relevant information of attacker, be easy to later stage seat offence source or pass Connection attack tissue.
The present invention realizes with the following method:A kind of method for the attacker that traced to the source based on Web page picture secret mark, including:
The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;Wherein, institute Stating corresponding secret mark need to only ensure in short term uniquely, because attacker selects very first time public attack generally after success attack Achievement, therefore, the secret mark need to only ensure in short term uniquely, and be corresponded with relevant information;
The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;
Capture screen message disclosed in attacker;
Extract the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and based on secret mark search journal file and then Obtain the relevant information of attacker.
Further, the relevant information for obtaining visitor, and the relevant information is write with the corresponding secret mark generated Enter journal file, be specially:If Website server receives the access request of visitor, the relevant information of visitor is obtained, And based on preset rules generation secret mark, the relevant information is write into journal file with the corresponding secret mark generated.
Further, it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Further, screen message disclosed in the capture attacker, it is specially:If attacker be present publishes website Message is invaded, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provide normal web service.
In the above method, in addition to:Relevant information based on attacker trace to the source attacker or association attack tissue.
In the above method, the relevant information includes but is not limited to:Access date, access time, visitor IP;The phase Closing information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or Person's system banner etc..
The present invention can be realized using following system:A kind of system for the attacker that traced to the source based on Web page picture secret mark, bag Include:
Secret mark generation module, write for obtaining the relevant information of visitor, and by the relevant information with the corresponding secret mark generated Enter journal file;Wherein, the corresponding secret mark need to only ensure short-term unique, because attacker generally selects after success attack Very first time public attack achievement is selected, therefore, the secret mark need to only ensure in short term uniquely, and corresponded with relevant information and be Can;
Secret mark display module, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added into webpage In be shown to visitor;
Screen message acquisition module, for capturing screen message disclosed in attacker;
Information searching module is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and is based on Secret mark searches journal file and then obtains the relevant information of attacker.
Further, the secret mark generation module, is specifically used for:If the access that Website server receives visitor please Ask, then obtain the relevant information of visitor, and based on preset rules generation secret mark, the relevant information is corresponding dark with generating Note write-in journal file.
Further, it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Further, the screen message acquisition module, is specifically used for:Disappear if attacker be present and publish invasion Breath, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provides normal web service.
In said system, in addition to:Attacker traces to the source module, for the relevant information based on attacker trace to the source attacker or Person associates attack tissue.
In said system, the relevant information includes but is not limited to:Access date, access time, visitor IP;The phase Closing information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or Person's system banner etc..
To sum up, the present invention provides a kind of method and system for the attacker that traced to the source based on Web page picture secret mark, and the present invention is used for When visitor submits access request, Website server obtains the relevant information of visitor and generated one-to-one dark with it Note, and be recorded in journal file, picture secret mark is added in the page returned then to visitor, and the picture secret mark is more hidden And the access to the true page is not influenceed, attacker's relevant information will be recorded in the case of attacker is unwitting so as to realize Picture secret mark record, if get in a network attacker distribution the sectional drawing or photo of distorting webpage, obtain Picture secret mark in sectional drawing or photo, parses the picture secret mark and obtains secret mark, searches journal file based on secret mark, and then obtain Take the relevant information of attacker.
Have the beneficial effect that:Obtained in webpage capture or photo that technical scheme of the present invention can be issued from attacker Picture secret mark, so as to which the identity information of the attacker drawn based on parsing picture secret mark assists the attacker that traces to the source, associate attack group Knit, in this, as the aucillary document of prosecution attacker, or the trail of evidence as legal agency law enforcement.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to the required accompanying drawing used in embodiment below Singly introduce, it should be apparent that, drawings in the following description are only some embodiments described in the present invention, for this area For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of embodiment of the method flow chart for the attacker that traced to the source based on Web page picture secret mark provided by the invention;
Fig. 2 is a kind of system embodiment structure chart for the attacker that traced to the source based on Web page picture secret mark provided by the invention.
Embodiment
The present invention gives a kind of method and system embodiment for the attacker that traced to the source based on Web page picture secret mark, in order that this Person skilled in the art more fully understands the technical scheme in the embodiment of the present invention, and make the present invention above-mentioned purpose, feature and Advantage can be more obvious understandable, and technical scheme in the present invention is described in further detail below in conjunction with the accompanying drawings:
Present invention firstly provides a kind of embodiment of the method for the attacker that traced to the source based on Web page picture secret mark, as shown in figure 1, bag Include:
S101:The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated.
Wherein, the method by Website page development process, then adding generation secret mark, it is specially:If website service Device receives the access request of visitor, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by described in Relevant information writes journal file with the corresponding secret mark generated.
More specifically, the preset rules of the generation secret mark are not unique, as long as ensureing that visitor accesses every time can give birth to Into difference secret mark corresponding with this access related information, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Wherein, the corresponding secret mark need to only ensure short-term unique, because attacker generally selects after success attack Very first time public attack achievement, therefore, the secret mark need to only ensure in short term uniquely, and be corresponded with relevant information;
Wherein, if selection Generating Random Number generates secret mark as preset rules, such as:12345, then by the phase of visitor Information and secret mark write-in journal file are closed, such as:2016-11-24 15:49:00 123.123.123.123 12345;Meanwhile Pre-arranged code mode can be selected to generate secret mark, and specific coded system can select as needed, each coded system has respectively From benefit, such as BASE64.
Wherein, the relevant information includes but is not limited to:Access date, access time, visitor IP;The relevant information It can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user's mark or system Mark etc.;, can not be according to these although in the prior art, can be with the identity information of record access person in server side Identity information seat offence person.
S102:The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to Visitor;Wherein, the secret mark is not directly displayed to visitor, but secret mark is encoded to the purpose shown into picture is, The picture secret mark is more hidden, can't influence overall display effect, is not easy to be found by attacker.Wherein, by secret mark encode to Method in picture is not unique, can select as needed, includes but is not limited to:Two-dimensional code generation method etc..
S103:Capture screen message disclosed in attacker;Wherein, attacker discloses the form of screen message and included but unlimited In:Sectional drawing or the diversified forms such as take pictures;
Specifically, if attacker be present publishes invasion message, obtain screen message disclosed in attacker, otherwise after Continue and provide normal web service for visitor.
S104:The picture secret mark in screen message is extracted, parsing picture secret mark obtains secret mark, and searches daily record based on secret mark File and then the relevant information for obtaining attacker.
Such as:It is 12345 that secret mark is parsed after acquisition picture secret mark, then it is 12345 pairs that secret mark is searched in journal file The log information answered, the relevant information of visitor is most obtained at last, is comprised at least:2016-11-24 15:49:00 123.123.123.123。
S105:Relevant information based on attacker trace to the source attacker or association attack tissue.
Secondly the present invention provides a kind of system embodiment for the attacker that traced to the source based on Web page picture secret mark, as shown in Fig. 2 Including:
Secret mark generation module 201, for obtaining the relevant information of visitor, and the corresponding secret mark by the relevant information with generation Write journal file.
Wherein, the method by Website page development process, then adding generation secret mark, it is specially:If website service Device receives the access request of visitor, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by described in Relevant information writes journal file with the corresponding secret mark generated.
More specifically, the preset rules of the generation secret mark are not unique, as long as ensureing that visitor accesses every time can give birth to Into difference secret mark corresponding with this access related information.
Secret mark display module 202, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added Enter and visitor is shown in webpage.
Wherein, the secret mark is not directly displayed to visitor, but secret mark is encoded to the purpose shown into picture is, The picture secret mark is more hidden, can't influence overall display effect, is not easy to be found by attacker.Wherein, by secret mark encode to Method in picture is not unique, can select as needed, includes but is not limited to:Two-dimensional code generation method etc..
Screen message acquisition module 203, for capturing screen message disclosed in attacker.
Information searching module 204 is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains dark Note, and journal file is searched based on secret mark and then obtains the relevant information of attacker.
Attacker traces to the source module 205, is traced to the source attacker or association attack tissue for the relevant information based on attacker.
Preferably, the secret mark generation module, is specifically used for:If Website server receives the access request of visitor, The relevant information of visitor is then obtained, and based on preset rules generation secret mark, the corresponding secret mark by the relevant information with generation Write journal file.
It is highly preferred that it is described based on preset rules generation secret mark, including:
Random numeral is generated as secret mark based on Generating Random Number;Or
Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
Preferably, the screen message acquisition module, is specifically used for:Disappear if attacker be present and publish invasion Breath, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provides normal web service.
In said system embodiment, the relevant information includes but is not limited to:Access date, access time, visitor IP; The relevant information can also include:OS Type and version, browser version, screen resolution, terminal iidentification, user Mark or system banner etc..
Each embodiment in this specification is described by the way of progressive, same or analogous between each embodiment Part is mutually referring to what each embodiment stressed is the difference with other embodiment.Especially for system For embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is implemented referring to method The part explanation of example.
As described above, above-described embodiment gives a kind of method and system reality for the attacker that traced to the source based on Web page picture secret mark Example is applied, by the way that in Website page development process, its relevant information will be obtained for the access request of visitor, and generate short Phase, unduplicated secret mark was corresponding, was stored in journal file;Secret mark is encoded into picture and forms picture secret mark, and with page Face content is together exported to visitor;Once attacker distorts web page contents and screenshotss are shown off, then together with picture secret mark together by Screenshots show, secret mark information is obtained by obtaining parsing picture secret mark, can be obtained pair based on secret mark information searching journal file The relevant information of the visitor answered, you can using relevant information trace to the source attacker or association attack tissue.Meanwhile according to being obtained The single or multiple screen message got, so associate attack tissue, and can in this, as prosecution attacker aucillary document, Or the clue as legal agency law enforcement.
Above example is to illustrative and not limiting technical scheme.Appointing for spirit and scope of the invention is not departed from What modification or local replacement, all should cover among scope of the presently claimed invention.

Claims (10)

  1. A kind of 1. method for the attacker that traced to the source based on Web page picture secret mark, it is characterised in that including:
    The relevant information of visitor is obtained, and the relevant information is write into journal file with the corresponding secret mark generated;
    The secret mark is encoded into picture generation picture secret mark, and picture secret mark is added in webpage and is shown to visitor;
    Capture screen message disclosed in attacker;
    Extract the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and based on secret mark search journal file and then Obtain the relevant information of attacker.
  2. 2. the method as described in claim 1, it is characterised in that the relevant information for obtaining visitor, and by the correlation Information writes journal file with the corresponding secret mark generated, is specially:If Website server receives the access request of visitor, The relevant information of visitor is obtained, and based on preset rules generation secret mark, the relevant information is write with the corresponding secret mark generated Enter journal file.
  3. 3. method as claimed in claim 2, it is characterised in that it is described based on preset rules generation secret mark, including:
    Random numeral is generated as secret mark based on Generating Random Number;Or
    Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
  4. 4. the method as described in claim 1, it is characterised in that screen message disclosed in the capture attacker, be specially:If Attacker be present and publish invasion message, then screen message disclosed in acquisition attacker, otherwise continues as visitor and carry For normal web service.
  5. 5. the method as described in claim 1-4 is any, it is characterised in that also include:Relevant information based on attacker is traced to the source Attacker or association attack tissue.
  6. A kind of 6. system for the attacker that traced to the source based on Web page picture secret mark, it is characterised in that including:
    Secret mark generation module, write for obtaining the relevant information of visitor, and by the relevant information with the corresponding secret mark generated Enter journal file;
    Secret mark display module, for the secret mark to be encoded into picture into generation picture secret mark, and picture secret mark is added into webpage In be shown to visitor;
    Screen message acquisition module, for capturing screen message disclosed in attacker;
    Information searching module is attacked, for extracting the picture secret mark in screen message, parsing picture secret mark obtains secret mark, and is based on Secret mark searches journal file and then obtains the relevant information of attacker.
  7. 7. system as claimed in claim 6, it is characterised in that the secret mark generation module, be specifically used for:If Website server The access request of visitor is received, then obtains the relevant information of visitor, and based on preset rules generation secret mark, by the phase Close information and write journal file with the corresponding secret mark generated.
  8. 8. system as claimed in claim 7, it is characterised in that it is described based on preset rules generation secret mark, including:
    Random numeral is generated as secret mark based on Generating Random Number;Or
    Selection pre-arranged code mode is used as secret mark after being encoded to the relevant information after arrangement.
  9. 9. system as claimed in claim 6, it is characterised in that the screen message acquisition module, be specifically used for:If in the presence of attacking The person of hitting publishes invasion message, then screen message disclosed in acquisition attacker, otherwise continues as visitor and provide normally Web service.
  10. 10. the system as described in claim 6-9, it is characterised in that also include:Attacker traces to the source module, for based on attack The relevant information of person trace to the source attacker or association attack tissue.
CN201611128079.1A 2016-12-09 2016-12-09 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark Pending CN107341375A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611128079.1A CN107341375A (en) 2016-12-09 2016-12-09 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611128079.1A CN107341375A (en) 2016-12-09 2016-12-09 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark

Publications (1)

Publication Number Publication Date
CN107341375A true CN107341375A (en) 2017-11-10

Family

ID=60223044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611128079.1A Pending CN107341375A (en) 2016-12-09 2016-12-09 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark

Country Status (1)

Country Link
CN (1) CN107341375A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110543884A (en) * 2018-05-29 2019-12-06 国际关系学院 network attack organization tracing method based on image
CN110990830A (en) * 2019-12-12 2020-04-10 国网新疆电力有限公司信息通信公司 Terminal evidence obtaining and tracing system and method
CN114363022A (en) * 2021-12-22 2022-04-15 西安四叶草信息技术有限公司 Attack tracing method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070156900A1 (en) * 2005-09-06 2007-07-05 Daniel Chien Evaluating a questionable network communication
US20080313732A1 (en) * 2007-06-14 2008-12-18 International Business Machines Corporation Preventing the theft of protected items of user data in computer controlled communication networks by intruders posing as trusted network sites
CN102833212A (en) * 2011-06-14 2012-12-19 阿里巴巴集团控股有限公司 Webpage visitor identity identification method and system
US20130276062A1 (en) * 2012-04-13 2013-10-17 Cable Television Laboratories, Inc. Watermarks for roaming
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN104601591A (en) * 2015-02-02 2015-05-06 中国人民解放军国防科学技术大学 Detection method of network attack source organization
CN105306467A (en) * 2015-10-30 2016-02-03 北京奇虎科技有限公司 Method and device for analyzing webpage data tampering
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070156900A1 (en) * 2005-09-06 2007-07-05 Daniel Chien Evaluating a questionable network communication
US20080313732A1 (en) * 2007-06-14 2008-12-18 International Business Machines Corporation Preventing the theft of protected items of user data in computer controlled communication networks by intruders posing as trusted network sites
CN102833212A (en) * 2011-06-14 2012-12-19 阿里巴巴集团控股有限公司 Webpage visitor identity identification method and system
US20130276062A1 (en) * 2012-04-13 2013-10-17 Cable Television Laboratories, Inc. Watermarks for roaming
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN104601591A (en) * 2015-02-02 2015-05-06 中国人民解放军国防科学技术大学 Detection method of network attack source organization
CN105306467A (en) * 2015-10-30 2016-02-03 北京奇虎科技有限公司 Method and device for analyzing webpage data tampering
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田新 等: ""新华社多媒体数据库系统采用数字水印版权保护技术"", 《中国传媒科技》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110543884A (en) * 2018-05-29 2019-12-06 国际关系学院 network attack organization tracing method based on image
CN110990830A (en) * 2019-12-12 2020-04-10 国网新疆电力有限公司信息通信公司 Terminal evidence obtaining and tracing system and method
CN114363022A (en) * 2021-12-22 2022-04-15 西安四叶草信息技术有限公司 Attack tracing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Rüth et al. Digging into browser-based crypto mining
Weidmann et al. The Internet and political protest in autocracies
CN110119469A (en) A kind of data collection and transmission and method towards darknet
Klausen et al. The YouTube Jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign
CN104717185B (en) Displaying response method, device, server and the system of short uniform resource locator
Ruan et al. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally
CN101534306B (en) Detecting method and a device for fishing website
US8312538B2 (en) Site check method
CN109104456A (en) A kind of user tracking based on browser fingerprint and propagating statistics analysis method
CN109690547A (en) For detecting the system and method cheated online
WO2013097742A1 (en) Methods and devices for identifying tampered webpage and identifying hijacked website
CN102436564A (en) Method and device for identifying falsified webpage
Bujlow et al. Web tracking: Mechanisms, implications, and defenses
Martin et al. Hidden surveillance by Web sites: Web bugs in contemporary use
CN103067387B (en) A kind of anti-phishing monitoring system and method
CN107341375A (en) A kind of method and system for the attacker that traced to the source based on Web page picture secret mark
Kobusińska et al. Big Data fingerprinting information analytics for sustainability
Zeng et al. A comprehensive measurement study of domain-squatting abuse
Cobo et al. Turn off your camera and turn on your privacy: A case study about Zoom and digital education in South American countries
Abouollo et al. Detecting malicious user accounts using Canvas Fingerprint
US20150149276A1 (en) Dynamic machine-readable codes
Cobo et al. Turn off your camera and turn on your privacy
KR102531661B1 (en) System for providing phishing warning service using contents based blocking
Badawi et al. Automatic detection and analysis of the “game hack” scam
Haunss Privacy Activism after Snoweden: Advocacy Networks or Protest

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171110