WO2015024435A1 - 处理系统文件的方法及装置 - Google Patents

处理系统文件的方法及装置 Download PDF

Info

Publication number
WO2015024435A1
WO2015024435A1 PCT/CN2014/083683 CN2014083683W WO2015024435A1 WO 2015024435 A1 WO2015024435 A1 WO 2015024435A1 CN 2014083683 W CN2014083683 W CN 2014083683W WO 2015024435 A1 WO2015024435 A1 WO 2015024435A1
Authority
WO
WIPO (PCT)
Prior art keywords
address
characters
system file
line
illegal
Prior art date
Application number
PCT/CN2014/083683
Other languages
English (en)
French (fr)
Inventor
王佳思
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2015024435A1 publication Critical patent/WO2015024435A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]

Definitions

  • the present invention relates to the field of the Internet, and in particular, to a method and apparatus for processing system files. Background of the invention
  • the terminal When a user needs to access a website through a terminal, the terminal first obtains an IP (Internet Protocol, Internet Protocol) address of the website, and accesses the website according to the IP address. Specifically, after the user inputs a URL (Uniform Resource Locator) of a website through the browser of the terminal, the browser submits the URL to the operating system of the terminal. After receiving the URL, the operating system of the terminal obtains a system file in the locally stored operating system, where the system file includes at least a URL and an IP address corresponding to the URL. The following uses the system file as the hosts file as an example. The operating system of the terminal resolves the hosts file by the URL entered by the user.
  • IP Internet Protocol, Internet Protocol
  • the website is accessed according to the parsed IP address. If the IP address corresponding to the URL is not resolved, the IP address corresponding to the URL is obtained from the DNS (Domain Name System) server, and the website is accessed according to the obtained IP address.
  • DNS Domain Name System
  • system files stored by the terminal may be modified by viruses.
  • the virus can change one or more IP addresses in the system file to the IP address of the phishing website, so that the terminal obtains the IP address of the phishing website from the system file, and then accesses the phishing website. It can be seen that the existing system file processing method has the risk of accessing the phishing website and reduces the network security of the terminal. Summary of the invention
  • Embodiments of the present invention provide a method and apparatus for processing system files.
  • a method of processing system files including:
  • An apparatus for processing system files including:
  • a reading module for reading each line of characters included in the system file by a function for reading characters in the system file
  • An obtaining module configured to obtain at least one illegal character in the system file according to each line character included in the system file;
  • An annotation module configured to process at least one illegal character in the system file, so that the illegal character cannot be parsed.
  • each line character included in the system file is read by a function for reading a character in the system file, and at least one illegal character in the system file is determined according to each line character included in the system file, and the processing is performed.
  • At least one line in the system file The legal character, so that the illegal character cannot be parsed. Therefore, when the terminal parses the system file, it does not parse illegal characters in the system file, such as the IP address and URL modified by the virus, thereby avoiding access to the phishing website and improving the network security of the terminal.
  • FIG. 1 is a flowchart of a method for processing a system file according to an embodiment of the present invention.
  • FIG. 2-1 is a flowchart of a method for processing a system file according to another embodiment of the present invention.
  • 2-2 is a schematic diagram of a first structure of a system file according to an embodiment of the present invention.
  • FIG. 2-3 is a schematic diagram of a second structure of a system file according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for processing a system file according to an embodiment of the present invention. Mode for carrying out the invention
  • FIG. 1 shows a method for processing a system file according to an embodiment of the present invention. As shown in Figure 1, the method includes the following steps.
  • Step 101 Call a function for reading characters in the system file from the system function library of the terminal's operating system.
  • Step 102 Read each line of characters included in the system file by a function for reading characters in the system file.
  • the system file may be a hosts file in an operating system.
  • each line character of the system file is composed of an IP address and one or more URLs corresponding to the IP address.
  • the storage location of the IP address is located before one or more URLs corresponding to the IP address.
  • the system file shown in Figure 2-2 the system file There are two lines in the first line, the first line stores the IP address "98.126.153.101", and the corresponding address of the IP address "98.126.153.101” is "www.icbc.com.cn” and " www.ccb.com , , ; The second line stores the IP address "98.126.153.101” and the corresponding IP address "98.126.153.101” is "www.abchina.com” and "www.cmbchina.com”.
  • Step 103 Determine at least one illegal character in the system file according to each line character included in the system file.
  • a legal character in a system file is modified by a virus or artificially modified, the legal character becomes an illegal character, which affects network security.
  • Step 104 Process at least one illegal character in the system file, so that the illegal character cannot be parsed.
  • the illegal character may be processed by annotating the illegal character in the system file.
  • the comment # can be added at the beginning of the at least one illegal character. For example, referring to the system file shown in Figure 2-3, when two lines of characters in the system file are determined to be illegal characters, in this step, comments are added at the beginning of the first and second line characters. Symbol #, thereby annotating the illegal character so that the illegal character cannot be parsed.
  • the illegal character may be processed by deleting the illegal character from the system file, so that the illegal character cannot be parsed.
  • each line character included in the system file is read by a function for reading characters in the system file, and at least one illegal character in the system file is determined according to each line character included in the system file, and the system is processed. At least one illegal character in the file, Make this illegal character unresolvable. Therefore, when the terminal parses the system file, it does not parse illegal characters in the system file, such as the IP address and URL modified by the virus, thereby avoiding access to the phishing website and improving the network security of the terminal.
  • FIG. 2-1 illustrates a method of processing a system file according to another embodiment of the present invention.
  • the illegal characters are characters modified by the virus.
  • the method includes the following steps.
  • Step 201 Call a function for reading characters in the system file from the operating system function library of the terminal.
  • the function for reading the characters in the system file is first called from the operating system function library.
  • dnsapi.dll file a DNS (Domain Name System, i or name system) client application interface API (Application Programming Interface) related file
  • dnsapi.dll file a DNS (Domain Name System, i or name system) client application interface API (Application Programming Interface) related file
  • Address call dnsapi.dll file, get the function address of the function used to read the characters in the system file from the dnsapi.dll file.
  • a function for reading characters in the system file is called from the system function library of the terminal's operating system.
  • the terminal may further obtain a function address of a function for opening a system file and a function address of a function for closing a system file from the dnsapi.dll file.
  • the function for opening the system file and the function for closing the system file are respectively called from the system function library of the operating system of the terminal according to the function address of the function for opening the system file and the function address of the function for closing the system file. .
  • system file may be a hosts file of a Windows operating system.
  • the function can be the HostsFile_Open() function
  • the function for reading characters in the system file can be the HostsFile_Readline() function
  • the function for closing the system file can be the HostsFile_Close() function.
  • the function for opening the system file can be Dns_OpenHostFile ( ) function
  • the function for reading characters in the system file can be Dns_ReadHostFileLine ( ) function
  • the function for closing system files can be a Dns_CloseHostFile() function.
  • Step 202 Read each line character included in the system file by a function for reading characters in the system file.
  • each line included in the opened system file is read from the opened system file by a function for reading a character in the system file by a function for opening a system file and opening the system file. character.
  • the function for opening the system file obtains the key value corresponding to the preset system file, and queries the file storage path of the system file from the stored registry according to the obtained key value.
  • the registry includes the correspondence between the key value and the file storage path of the system file.
  • the function for opening the system file obtains the system file locally from the terminal according to the file storage path, and opens the obtained system file.
  • the function of reading the characters in the system file is to read the first line of characters included in the system file shown in Figure 2-2 as 98.126.153.101www.icbc.com.cnwww.ccb.com;
  • the second line of characters included in the system file shown in 2-2 is 98.126.153.101 www.abchina.com www.cmbchina.com.
  • Step 203 Identify an IP address and a URL corresponding to the IP address from each line of characters read.
  • the line character when the start position of a certain line character in the system file includes the comment symbol #, the line character is not parsed.
  • the virus may Will modify the system file to include the character of the comment #, add a large number of space characters between the comment # and the IP address, for example, add at least 999 space characters, and modify the IP address or URL in the line character to be a phishing website. IP address or URL.
  • the IP address and the URL corresponding to the IP address are identified from the line character.
  • the start position of a line character includes the comment character #
  • the predetermined number of space characters is at least 999 characters. In practical applications, the predetermined number can be set according to the specific conditions of the operating system, thereby ensuring the identification of illegal characters.
  • the identified IP address and the URL corresponding to the IP address may be further cached to facilitate subsequent identification of illegal characters.
  • the IP address "98.126.153.101” is identified from the first line of characters read “98.126.153.101 www.icbc.com.cn www.ccb.com", and the IP address "98.126.153.101” corresponds.
  • the URLs are "www.icbc.com.cn” and "www.ccb.com” respectively.
  • the URLs "www.ic.c.com.cn” and “www.ccb.com” corresponding to the identified IP address "98.126.153.101" and the identified IP address "98.126.153.101" are cached as shown in Table 1. The correspondence between the IP address and the URL shown.
  • IP address "98.126.153.101” is identified from the second line of characters read "98.126.153.101 www.abchina.com www.cmbchina.com", and the corresponding URL of the IP address "98.126.153.101” is "Www.abchina.com” and "www.cmbchina.com”, will identify the IP address "98.126.153.101” and knowledge
  • the URLs "www.abchina.com” and "www.cmbchina.com” corresponding to the IP address "98.126.153.101" are cached in the correspondence between the IP address and the URL shown in Table 1.
  • Step 204 Determine at least one illegal character in the system file according to the identified IP address and the URL corresponding to the IP address.
  • illegal characters in the system file may be determined according to the address blacklist and/or the URL threshold.
  • the address blacklist is pre-stored in the terminal.
  • the blacklist is used to store illegal URLs and IP addresses, and is updated periodically according to the actual situation of the network. In this step, it is determined whether the IP address or the URL is included in the address blacklist. If the IP address or the URL is included in the address blacklist, one or more lines of characters including the identified IP address or URL are determined as invalid symbol.
  • the URL value is used to determine whether an identified IP address is an illegal IP address.
  • the virus may modify the IP address stored in the multi-line characters included in the system file to the IP address of the same phishing website. Therefore, in the embodiment of the present invention, the URL threshold may be set in advance. When the number of URLs corresponding to the same IP address exceeds the threshold value of the URL, it is determined that the IP address is an illegal IP address, and one or more lines of characters including the illegal IP address in the system file are determined as illegal characters.
  • the URL threshold can be set according to actual needs. For example, the URL can be 3.
  • step 203 at least one illegal character in the system file is determined according to the IP address and the URL corresponding to the IP address. For example, an illegal character in a system file is determined based on an address blacklist and/or a URL threshold. Since the IP address and the URL are cached, it is convenient for the terminal to recognize illegal characters, thereby improving the efficiency of recognition.
  • the URL corresponding to the IP address "98.126.153.101” is "www.icbc.com.cn", “www.ccb.com”, “www.boc.cn” and “www.bankcomm.com”.
  • the number of URLs corresponding to the same IP address "98.126.153.101” is four. If the default threshold is exceeded, the IP address "98.126.153.101” is determined to be an illegal IP address.
  • the first line and the second line of the system file including the illegal IP address "98.126.153.101" are determined to be illegal two lines of characters.
  • Step 205 Process at least one illegal character in the system file, so that the illegal character cannot be parsed.
  • the determined illegal characters can be directly deleted from the system file, so that the illegal characters cannot be parsed.
  • the at least one illegal character can be annotated in the system file.
  • the comment character # can be added at the beginning of the illegal character of the line.
  • at least 999 space characters are included between the comment # and IP address in the illegal character of the line, at least 999 space characters can be deleted between the comment character and the IP address.
  • Step 206 Close the open system file by a function for closing the system file. It can be seen that, according to an embodiment of the present invention, at least one line of characters illegal in the system file can be determined, and the illegal at least one line of characters can be processed, so that the illegal characters cannot be parsed, thereby preventing the operating system or the application of the terminal from parsing the illegal IP address. And URL to improve the network security of the terminal.
  • FIG. 3 illustrates an apparatus for processing a system file according to an embodiment of the present invention.
  • the apparatus includes a memory 30 and a processor 31.
  • the memory 30 may be a non-transitory computer readable storage medium.
  • Stored in the memory 30 are computer readable instructions that implement the calling module 301, the reading module 302, the obtaining module 303, and the annotation module 304.
  • Processor 31 can execute computer readable instructions stored in the memory.
  • the calling module 301 is for calling a function for reading characters in the system file from a system function library of the operating system of the terminal.
  • the reading module 302 is for reading each line of characters included in the system file by a function for reading characters in the system file.
  • the obtaining module 303 is configured to determine at least one illegal character in the system file according to each line character included in the system file.
  • the annotation module 304 is configured to process at least one illegal character in the system file so that the illegal character cannot be parsed.
  • the calling module 301 is configured to invoke a DNS client API related file, obtain a function address of a function for reading a character in the system file from the DNS client API related file, and according to The acquired function address calls a function for reading characters in the system file from a system function library of the operating system of the terminal.
  • the obtaining module 303 is configured to determine that the starting position includes a note character, and if the comment symbol # and the IP address include at least 999 space characters, determine The at least one line of characters is an illegal character.
  • the obtaining module 303 is configured to identify, from the each line of characters, an IP address and a URL corresponding to the identified IP address, where the IP address and the URL corresponding to the IP address are Determining at least one illegal character in the system file.
  • the obtaining module 303 is configured to identify, from the each line of characters, an IP address and a URL corresponding to the identified IP address, and cache the identified IP address and the identified The URL corresponding to the IP address, the URL corresponding to the IP address and the identified IP address, and determining at least one illegal character in the system file.
  • the obtaining module 303 when the IP address and the URL corresponding to the identified IP address are identified from the each line of characters, the obtaining module 303 is configured to not include at least the comment symbol # from the starting position.
  • the IP address and the URL corresponding to the IP address are identified in one line of characters.
  • the obtaining module 303 when determining at least one illegal character in the system file according to the IP address and the URL corresponding to the IP address, is configured to determine whether the IP address or the URL is included in the In the pre-set address blacklist, if the IP address or URL is included in the address blacklist, it is determined that one or more lines of characters including the IP address or the URL are illegal characters.
  • the obtaining module 303 when determining at least one illegal character in the system file according to the IP address and the URL corresponding to the IP address, is configured to determine the number of URLs corresponding to the same IP address. If the number of URLs corresponding to the same IP address exceeds the threshold of the URL, it is determined that the IP address is an illegal IP address, and one or more lines of characters of the illegal IP address are included in the system file. Determined to pay for illegal words.
  • the annotation module 304 is configured to delete the determined at least one illegal character from the system file or to annotate the at least one illegal character in the system file. It can be seen that, according to an embodiment of the present invention, at least one line of characters illegal in the system file can be determined, and the illegal at least one line of characters can be processed, so that the illegal characters cannot be parsed, thereby preventing the operating system or the application of the terminal from parsing the illegal IP address. And URL to improve the network security of the terminal.
  • the methods and apparatus provided by the embodiments of the present invention may be implemented by hardware, or computer readable instructions, or a combination of hardware and computer readable instructions.
  • the computer readable instructions used in this embodiment are stored by a plurality of processors in a readable storage medium such as a hard disk, a CD-ROM, a DVD, an optical disk, a floppy disk, a magnetic tape, a RAM, a ROM, or other suitable storage device.
  • a readable storage medium such as a hard disk, a CD-ROM, a DVD, an optical disk, a floppy disk, a magnetic tape, a RAM, a ROM, or other suitable storage device.
  • at least some of the computer readable instructions may be replaced by specific hardware, such as custom integrated circuits, gate arrays, FPGAs, PLDs, and computers with specific functions, and the like.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions for causing a computer to perform the methods described herein.
  • the system or device provided by this embodiment has a storage medium in which computer readable program code is stored for implementing the functions of any of the above embodiments, and these systems or devices (or CPUs or MPUs) can read and Execute the program code stored on the storage medium.
  • the program code read from the storage medium can implement any of the above embodiments, and thus the program code and the storage medium storing the program code are part of the technical solution.
  • Storage media for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (eg, CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-win, DVD+RW), disks, Flash card, ROM, etc.
  • the program code can also be downloaded from the server computer via the communication network.
  • an operation at least partially implemented by the program code may be implemented by an operating system running on a computer, thereby implementing the technical solution of any of the above embodiments, wherein the computer is executed based on the program code. instruction.
  • program code in the storage medium is written to the memory, wherein the memory is located in an expansion board inserted in the computer or in an expansion unit connected to the computer.
  • the CPU in the expansion board or the expansion unit performs at least part of the operation based on the program code according to the instruction, thereby implementing the technical solution of any of the above embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明实施例公开了一种处理系统文件方法及装置。该方法包括:从终端的操作系统的系统函数库中调用用于读取系统文件中的字符的函数;通过用于读取系统文件中的字符的函数读取系统文件中包括的每一行字符;根据所述系统文件中包括的每一行字符,确定所述系统文件中至少一行非法字符;处理该系统文件中至少一行非法字符,使该非法字符无法被解析。

Description

处理系统文件的方法及装置 本申请要求于 2013 年 8 月 22 日提交中国专利局、 申请号为 201310370275.x,发明名称为 "一种对系统文件进行处理的方法及装置" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域
本发明涉及互联网领域, 特别涉及一种处理系统文件的方法及装 置。 发明背景
随着互联网技术的快速发展, 网站的数量越来越多。 当用户需要通 过终端访问某个网站时, 终端首先获取该网站的 IP ( Internet Protocol, 网络之间互联的协议)地址, 并根据该 IP地址访问该网站。 具体的, 当 用户通过终端的浏览器输入某个网站的 URL ( Uniform Resource Locator, 统一资源定位符)之后, 浏览器将该 URL提交给终端的操作 系统。 终端的操作系统接收该 URL之后, 获取本地存储的操作系统内 的系统文件,该系统文件中至少包括 URL和该 URL对应的 IP地址。 下 面以该系统文件为 hosts文件为例进行说明。 终端的操作系统 居用户 输入的 URL对该 hosts文件进行解析。 如果解析出该 URL对应的 IP地 址, 则根据解析出的 IP地址访问该网站。 如果没有解析出该 URL对应 的 IP地址, 则从 DNS ( Domain Name System, 域名系统)服务器中获 取该 URL对应的 IP地址, 根据获取的 IP地址访问该网站。
但是, 终端存储的系统文件可能被病毒修改。 例如, 病毒可以将系 统文件中的某一个或多个 IP地址^ ί'爹改为钓鱼网站的 IP地址, 从而使终 端从系统文件中获取到钓鱼网站的 IP地址, 进而访问钓鱼网站。 可见, 利用现有的处理系统文件的方式,存在访问钓鱼网站的风险, 降低了终端的网络安全性。 发明内容
本发明实施例提供了一种处理系统文件的方法及装置。
一种处理系统文件的方法, 包括:
从终端的操作系统的系统函数库中调用用于读取系统文件中的字符 的函数;
通过用于读取系统文件中的字符的函数读取系统文件中包括的每一 行字符;
根据所述系统文件中包括的每一行字符, 确定所述系统文件中至少 一行非法字符;
处理该系统文件中至少一行非法字符, 使该非法字符无法被解析。 一种处理系统文件的装置, 包括:
调用模块, 用于从终端的操作系统的系统函数库中调用用于读取系 统文件中的字符的函数;
读取模块, 用于通过用于读取系统文件中的字符的函数读取系统文 件中包括的每一行字符;
获取模块, 用于根据所述系统文件中包括的每一行字符, 获取所述 系统文件中至少一行非法字符;
注释模块, 用于处理该系统文件中至少一行非法字符, 使该非法字 符无法被解析。
可见, 根据本发明实施例, 通过用于读取系统文件中的字符的函数 读取系统文件中包括的每一行字符, 根据系统文件中包括的每一行字 符确定系统文件中至少一行非法字符, 处理该系统文件中至少一行非 法字符, 使该非法字符无法被解析。 因此, 终端在解析系统文件时, 不 会解析系统文件中的非法字符, 例如被病毒修改的 IP地址和 URL, 从 而避免访问钓鱼网站, 提高了终端的网络安全性。 附图简要说明
图 1是本发明实施例提供的一种处理系统文件的方法流程图。
图 2-1是本发明另一实施例提供的一种处理系统文件的方法流程图。 图 2-2是本发明实施例提供的一种系统文件第一种结构示意图。 图 2-3是本发明实施例提供的一种系统文件第二种结构示意图。 图 3 是本发明实施例提供的一种处理系统文件的装置的结构示意 图。 实施本发明的方式
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对 本发明实施方式作进一步地详细描述。
图 1示出了本发明实施例提供的一种处理系统文件的方法。 如图 1 所示, 该方法包括如下步骤。
步骤 101 : 从终端的操作系统的系统函数库中调用用于读取系统文 件中的字符的函数。
步骤 102: 通过用于读取系统文件中的字符的函数读取系统文件中 包括的每一行字符。
在本发明实施例中, 系统文件可以为操作系统中的 hosts文件。 在本发明实施例中, 系统文件的每一行字符由 IP地址和该 IP地址 对应的一个或多个 URL组成。 IP地址的存储位置位于该 IP地址对应的 一个或多个 URL之前。 例如, 参见图 2-2所示的系统文件, 该系统文件 中包含两行, 第一行存储有 IP地址 "98.126.153.101" , 以及该 IP地址 " 98.126.153.101 " 对 应 的 URL 为 " www.icbc.com.cn " 和 " www.ccb.com ,, ; 第二行存储有 IP 地址 "98.126.153.101" , 以及 该 IP地址 "98.126.153.101" 对应的 URL为 " www.abchina.com " 和 "www.cmbchina.com" 。
步骤 103: 根据系统文件中包括的每一行字符, 确定系统文件中至 少一行非法字符。
在本发明实施例中, 如果系统文件中的合法的字符被病毒修改的或 者被人为修改, 该合法的字符则成为非法的字符, 影响网络的安全性。
步骤 104: 处理该系统文件中至少一行非法字符, 使该非法字符无 法被解析。
在本发明的一个实施例中, 处理该非法字符的方式可以为在系统文 件中注释该非法字符。
在系统文件被解析的过程中, 例如, 当终端的操作系统解析到系统 文件中的某一行 IP地址和 URL时, 如果发现该行包括的第一个字符为 注释符, 则跳过该行, 并解析下一行。 因此, 在本步骤中, 可以在该至 少一行非法字符的起始位置添加注释符 #。 例如, 参见图 2-3 所示的系 统文件, 当该系统文件中的两行字符被确定为非法字符时, 在本步骤 中, 在第一行和第二行字符的起始位置处添加注释符 #, 从而注释该非 法字符, 使该非法字符无法被解析。
在本发明的一个实施例中, 处理该非法字符的方式还可以为将该非 法字符从系统文件中删除, 从而使该非法字符无法被解析。
根据本发明实施例, 通过用于读取系统文件中的字符的函数读取系 统文件中包括的每一行字符, 根据系统文件中包括的每一行字符确定 系统文件中至少一行非法字符, 处理该系统文件中至少一行非法字符, 使该非法字符无法被解析。 因此, 终端在解析系统文件时, 不会解析系 统文件中的非法字符, 例如被病毒修改的 IP地址和 URL, 从而避免访 问钓鱼网站, 提高了终端的网络安全性。
图 2-1示出了本发明另一实施例提供的一种处理系统文件的方法。 在本实施例中, 非法的字符为被病毒修改的字符。 如图 2-1所示, 该方 法包括如下步骤。
步骤 201 : 从终端的操作系统函数库中调用用于读取系统文件中的 字符的函数。
在本发明实施例中, 当终端的操作系统或者在终端上运行的某个应 用程序需要解析系统文件时, 首先从操作系统函数库中调用用于读取系 统文件中的字符的函数。
在本发明一个实施例中, 根据预设的 dnsapi.dll 文件 (为 DNS ( Domain Name System , i或名系统) 客户端应用程序接口 API ( Application Programming Interface, 应用程序编程接口 )相关文件 )的 文件地址, 调用 dnsapi.dll文件, 从 dnsapi.dll文件中获取用于读取系统 文件中的字符的函数的函数地址。 根据获取的函数地址, 从终端的操作 系统的系统函数库中调用用于读取系统文件中的字符的函数。
在本发明一个实施例中, 终端还可以进一步从 dnsapi.dll 文件中获 取用于打开系统文件的函数的函数地址和用于关闭系统文件的函数的 函数地址。 根据用于打开系统文件的函数的函数地址和用于关闭系统文 件的函数的函数地址, 从终端的操作系统的系统函数库中分别调用用 于打开系统文件的函数和用于关闭系统文件的函数。
在本发明实施例中, 系统文件可以为 windows操作系统的 hosts文 件。
如果终端的操作系统为 windows vista \7\8, 则用于打开系统文件的 函数可以为 HostsFile_Open ( ) 函数, 用于读取系统文件中的字符的函 数可以为 HostsFile_Readline ( )函数, 以及用于关闭系统文件的函数可 以为 HostsFile_Close ( ) 函数。
如果终端的操作系统为 windows xp, 则用于打开系统文件的函数可 以为 Dns_OpenHostFile ( ) 函数, 用于读取系统文件中的字符的函数可 以为 Dns_ReadHostFileLine ( ) 函数, 以及用于关闭系统文件的函数可 以为 Dns_CloseHostFile ( ) 函数。
步骤 202: 通过用于读取系统文件中的字符的函数读取系统文件包 括的每一行字符。
在本发明实施例中, 通过用于打开系统文件的函数调用并打开系统 文件, 通过用于读取系统文件中的字符的函数从打开的系统文件中读 取打开的系统文件中包括的每一行字符。
在本发明实施例中, 用于打开系统文件的函数获取预设的系统文件 对应的键值, 根据获取的键值, 从已存储的注册表中查询系统文件的 文件存储路径。 其中, 注册表中包括键值与系统文件的文件存储路径的 对应关系。 用于打开系统文件的函数根据该文件存储路径, 从终端本地 获取系统文件, 并打开获取的系统文件。
通过用于读取系统文件中的字符的函数读取如图 2-2所示的系统文 件包括的第一行字符为 98.126.153.101www.icbc.com.cnwww.ccb.com; 读取如图 2-2 所示的系统文件包括的第二行字符为 98.126.153.101 www.abchina.com www.cmbchina.com。
步骤 203: 从读取的每一行字符中识别出 IP地址和该 IP地址对应的 URL。
在本发明实施例中, 当系统文件中的某一行字符的起始位置包括注 释符 #时, 该行字符则不被解析。 但是, 当终端感染病毒后, 病毒可能 会修改系统文件包括注释符 #的字符, 在注释符#与 IP地址之间添加大 量空格字符,例如添加至少 999个空格字符, 并将该行字符中的 IP地址 或 URL修改为为钓鱼网站的 IP地址或 URL。 当被病毒修改的系统文件 被解析时, 如果某行字符中的注释符与 IP地址之间存在大量空格字符, 例如存在至少 999个空格字符, 该行字符仍然会被解析, 以致于终端的 操作系统访问钓鱼网站。
因此在本步骤中, 当某一行字符的起始位置不包括注释符 #时,从该 行字符中识别出 IP地址和该 IP地址对应的 URL。 当某一行字符的起始 位置包括注释符#时,判断该注释符 #与 IP地址之间是否包括预定数量个 空格字符。 如果该注释符 #与 IP地址之间包括预定数量个空格字符, 则 直接确定该行字符为非法字符, 执行步骤 205。 在本发明一个实施例中, 该预定数量个空格字符为至少 999个字符。 在实际应用中, 该预定数量 可以根据操作系统的具体情况设置, 从而保证对非法字符的识别。
进一步地,在步骤 203中还可以进一步緩存识别出的 IP地址和与该 IP地址对应的 URL, 便于后续对非法字符的识别。
例如, 从读取的第一行字符 " 98.126.153.101 www.icbc.com.cn www.ccb.com" 中识别出 IP地址为 "98.126.153.101" , 以及该 IP地址 " 98.126.153.101 " 对应的 URL 分别为 " www.icbc.com.cn " 和 "www.ccb.com" 。将识别出的该 IP地址 "98.126.153.101" 和识别出的 该 IP地址 "98.126.153.101" 分别对应的 URL "www.icbc.com.cn" 和 "www.ccb.com" 緩存在如表 1所示的 IP地址与 URL的对应关系中。
从读取 的 第 二行字符 " 98.126.153.101 www.abchina.com www.cmbchina.com" 中识别出 IP地址为 "98.126.153.101" , 以及该 IP 地址 "98.126.153.101 " 对应的 URL 分别为 "www.abchina.com" 和 "www.cmbchina.com" , 将识别出的该 IP地址 "98.126.153.101" 和识 别 出 的 该 IP 地 址 " 98.126.153.101 " 分别 对应 的 URL "www.abchina.com" 和 "www.cmbchina.com" 緩存在: ^口表 1所示的 IP 地址与 URL的对应关系中。
表 1
Figure imgf000009_0001
步骤 204: 根据识别出的 IP地址和该 IP地址对应的 URL,确定系统 文件中至少一行非法字符。
在本发明实施例中, 可以根据地址黑名单和 /或 URL阔值确定系统 文件中的非法字符。
其中, 地址黑名单预先存储在终端中, 该地址黑名单用于存储非法 的 URL和 IP地址, 并根据网络的实际情况定时更新。 在本步骤中, 判 断 IP地址或 URL是否包括在该地址黑名单中, 如果 IP地址或 URL包 括在该地址黑名单中, 则包括该识别出的 IP地址或 URL的一行或多行 字符确定为非法字符。
URL阔值用于判断某个识别出的 IP地址是否为非法 IP地址。 当终 端感染病毒后, 病毒可能会将系统文件中包括的多行字符中存储的 IP 地址修改为同一钓鱼网站的 IP地址。 因此, 在本发明实施例中, 可以预 先设置 URL阔值。 当对应相同 IP地址的 URL的个数超过该 URL阔值 时, 则确定该 IP地址为非法 IP地址,将系统文件中包括该非法 IP地址 的一行或多行字符确定为非法字符。 URL阔值可以根据实际需要设置, 例如 URL可以为 3。
如果在步骤 203 中緩存了识别出的 IP地址和与该 IP地址对应的 URL, 则在本步骤中, 根据 IP地址和该 IP地址对应的 URL,确定系统文 件中至少一行非法字符。 例如, 根据地址黑名单和 /或 URL阔值确定系 统文件中的非法字符。 由于 IP地址和 URL被緩存, 便于终端对非法字 符进行识别, 提高识别的效率。
例如, 如表 1所示,根据步骤 203中緩存的识别出的 IP地址和与该 IP 地址对应的 URL, IP 地址 "98.126.153.101 " 对应的 URL 分别为 " www.icbc.com.cn " 、 " www.ccb.com " 、 " www.boc.cn " 和 "www.bankcomm.com" 。 对应同一 IP地址 "98.126.153.101" 的 URL 的个数是 4个,超过预设阔值 3, 则确定该 IP地址 "98.126.153.101" 为 非法 IP地址。 将系统文件包括非法 IP地址 "98.126.153.101" 的第一行 和第二行字符确定为非法的两行字符。
步骤 205: 处理该系统文件中至少一行非法字符, 使该非法字符无 法被解析。
在本发明一个实施例中, 可以直接将确定的非法字符从系统文件中 删除, 从而使该非法字符无法被解析。
在本发明一个实施例中, 可以在系统文件中注释该至少一行非法字 符。 当该行非法字符的起始位置不包括注释符 #时, 可以在该行非法字 符的起始位置添加注释符 #。当该行非法字符中注释符 #与 IP地址之间包 括至少 999个空格字符,可以将注释符与 IP地址之间存在至少 999个空 格字符删除。
例如, 在如图 2-2所示的系统文件包括第一行字符的起始位置处和 第二行字符的起始位置处分别添加注释符 #, 得到如图 2-3 所示的系统 文件, 从而在系统文件中注释第一行字符和第二行字符。 步骤 206: 通过用于关闭系统文件的函数关闭打开的系统文件。 可见, 根据本发明实施例, 能够确定系统文件中非法的至少一行字 符, 并处理该非法的至少一行字符, 使该非法字符无法被解析, 从而避 免终端的操作系统或者应用程序解析出非法 IP地址和 URL, 提高终端 的网络安全性。
图 3示出了本发明实施例提供了一种处理系统文件的装置。 如图 3 所示, 该装置包括存储器 30和处理器 31。 根据本申请的一个实施例, 该存储器 30可以是非易失性计算机可读存储介质。 在存储器 30中存储 有实现调用模块 301, 读取模块 302, 获取模块 303和注释模块 304的 计算机可读指令。 处理器 31可以执行存储器中存储的计算机可读指令。
调用模块 301用于从终端的操作系统的系统函数库中调用用于读取 系统文件中的字符的函数。
读取模块 302用于通过用于读取系统文件中的字符的函数读取系统 文件中包括的每一行字符。
获取模块 303用于根据该系统文件中包括的每一行字符, 确定该系 统文件中至少一行非法字符。
注释模块 304用于处理该系统文件中至少一行非法字符, 使该非法 字符无法被解析。
在本发明的一个实施例中,调用模块 301用于调用 DNS客户端 API 相关文件, 从所述 DNS客户端 API相关文件中获取用于读取系统文件 中的字符的函数的函数地址, 并根据所述获取的函数地址, 从所述终端 的操作系统的系统函数库中调用用于读取系统文件中的字符的函数。
在本发明的一个实施例中, 获取模块 303用于判断起始位置包括注 字符, 如果该注释符 #与 IP地址之间包括至少 999个空格字符, 则确定 该至少一行字符为非法字符。
在本发明的一个实施例中, 获取模块 303用于从所述每一行字符中 识别出 IP地址和所述识别出的 IP地址对应的 URL, 居所述 IP地址和 该 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符。
在本发明的一个实施例中, 获取模块 303用于从所述每一行字符中 识别出 IP地址和所述识别出的 IP地址对应的 URL,緩存所述识别出 IP 地址和所述识别出的 IP地址对应的 URL, 居所述 IP地址和所述识别 出的 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符。
在本发明的一个实施例中,在从所述每一行字符中识别出 IP地址和 所述识别出的 IP地址对应的 URL时, 获取模块 303用于从起始位置不 包括注释符 #的至少一行字符中识别出 IP地址和该 IP地址对应的 URL。
在本发明的一个实施例中, 在根据所述 IP地址和该 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符时, 获取模块 303用于判 断所述 IP地址或 URL是否包括在预先设置的地址黑名单中, 如果所述 IP地址或 URL包括在该地址黑名单中, 确定包括该 IP地址或 URL的 一行或多行字符为非法字符。
在本发明的一个实施例中, 在根据所述 IP地址和该 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符时, 获取模块 303用于判 断对应相同 IP地址的 URL的个数是否超过预设的 URL阔值,当对应相 同 IP地址的 URL的个数超过该 URL阔值时, 确定该 IP地址为非法 IP 地址,将系统文件中包括该非法 IP地址的一行或多行字符确定为非法字 付。
在本发明的一个实施例中, 注释模块 304用于将确定的该至少一行 非法字符从该系统文件中删除, 或者在所述系统文件中注释所述至少一 行非法字符。 可见, 根据本发明实施例, 能够确定系统文件中非法的至少一行字 符, 并处理该非法的至少一行字符, 使该非法字符无法被解析, 从而避 免终端的操作系统或者应用程序解析出非法 IP地址和 URL, 提高终端 的网络安全性。
本发明实施例提供的方法和装置可以由硬件、 或计算机可读指令、 或者硬件和计算机可读指令的结合来实现。 本实施例中使用的计算机 可读指令由多个处理器存储在可读存储介质中, 例如硬盘、 CD-ROM、 DVD, 光盘、 软盘、 磁带、 RAM、 ROM或其它合适的存储 设备。 或者, 至少部分计算机可读指令可以由具体硬件替换, 例如, 定制集成线路、 门阵列、 FPGA、 PLD和具体功能的计算机等等。
本发明实施例提供了计算机可读存储介质, 用于存储指令使得计算 机执行本文所述的方法。 具体地, 本实施例提供的系统或设备都具有 存储介质, 其中存储了计算机可读程序代码, 用于实现上述任意实施 例的功能, 并且这些系统或设备(或 CPU或 MPU ) 能够读取并且执行 存储在存储介质中的程序代码。
在这种情况下, 从存储介质中读取的程序代码可以实现上述任一实 施例, 因此该程序代码和存储该程序代码的存储介质是技术方案的一 部分。
用于提供程序代码的存储介质包括软盘、 硬盘、 磁光盘、 光盘 (例 如 CD-ROM、 CD-R, CD-RW、 DVD-ROM、 DVD-RAM、 DVD-勝、 DVD+RW ) 、 磁盘、 闪存卡、 ROM等等。 可选地, 程序代码也可以通 过通信网络从服务器电脑上下载。
应该注意的是, 对于由计算机执行的程序代码, 至少部分由程序代 码实现的操作可以由运行在计算机上的操作系统实现, 从而实现上述 任一实施例的技术方案, 其中该计算机基于程序代码执行指令。 另外, 存储介质中的程序代码被被写入存储器, 其中, 该存储器位 于插入在计算机中的扩展板中, 或者位于连接到计算机的扩展单元 中。 在本实施例中, 扩展板或扩展单元中的 CPU根据指令, 基于程序 代码执行至少部分操作, 从而实现上述任一实施例的技术方案。
以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本 发明的精神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应 包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种处理系统文件的方法, 其特征在于, 所述方法包括: 从终端的操作系统的系统函数库中调用用于读取系统文件中的字符 的函数;
通过用于读取系统文件中的字符的函数读取系统文件中包括的每一 行字符;
根据所述系统文件中包括的每一行字符, 确定所述系统文件中至少 一行非法字符;
处理该系统文件中至少一行非法字符, 使该非法字符无法被解析。
2、如权利要求 1所述的方法, 其特征在于, 所述从终端的操作系统 的系统函数库中调用用于读取系统文件中的字符的函数, 包括:
调用域名系统 DNS客户端应用程序接口 API相关文件;
从所述 DNS客户端 API相关文件中获取用于读取系统文件中的字 符的函数的函数地址;
根据所述获取的函数地址, 从所述终端的操作系统的系统函数库中 调用用于读取系统文件中的字符的函数。
3、如权利要求 1所述的方法, 其特征在于, 所述根据所述系统文件 中包括的每一行字符, 确定所述系统文件中至少一行非法字符, 包括: 判断起始位置包括注释符的至少一行字符中注释符与 IP地址之间 是否包括至少预定数量个空格字符,如果所述注释符与 IP地址之间包括 至少预定数量个空格字符, 则确定所述至少一行字符为非法字符。
4、如权利要求 1所述的方法, 其特征在于, 所述根据所述系统文件 中包括的每一行字符, 确定所述系统文件中至少一行非法字符包括: 从所述每一行字符中识别出网络之间互联的协议 IP地址和所述识 别出的 IP地址对应的统一资源定位符 URL;
居所述 IP地址和所述 IP地址对应的 URL,确定所述系统文件中 至少一行非法字符。
5、如权利要求 1所述的方法, 其特征在于, 所述根据所述系统文件 中包括的每一行字符, 确定所述系统文件中至少一行非法字符, 包括: 从所述每一行字符中识别出 IP地址和所述识别出的 IP地址对应的 URL;
緩存所述识别出 IP地址和所述识别出的 IP地址对应的 URL;
居所述 IP地址和所述 IP地址对应的 URL, 确定所述系统文件中 至少一行非法字符。
6、 如权利要求 4或 5所述的方法, 其特征在于, 所述根据所述 IP 地址和所述 IP地址对应的 URL, 确定所述系统文件中至少一行非法字 符, 包括:
判断所述 IP地址或 URL是否包括在预先设置的地址黑名单中, 如 果所述 IP地址或 URL包括在所述地址黑名单中,确定包括所述 IP地址 或 URL的至少一行字符为非法字符。
7、 如权利要求 4或 5所述的方法, 其特征在于, 所述根据所述 IP 地址和所述 IP地址对应的 URL, 确定所述系统文件中至少一行非法字 符, 包括:
判断对应一个 IP地址的 URL的个数是否超过预设的 URL阔值,当 对应所述 IP地址的 URL的个数超过所述 URL阔值时, 确定所述 IP地 址为非法 IP地址, 将所述系统文件中包括所述非法 IP地址的至少一行 字符确定为非法字符。
8、如权利要求 1所述的方法, 其特征在于, 所述处理该系统文件中 至少一行非法字符, 使该非法字符无法被解析, 包括: 从所述系统文件中删除所述至少一行非法字符; 或者在所述系统文 件中注释所述至少一行非法字符。
9、 一种处理系统文件的装置, 其特征在于, 所述装置包括: 调用模块, 用于从终端的操作系统的系统函数库中调用用于读取系 统文件中的字符的函数;
读取模块, 用于通过用于读取系统文件中的字符的函数读取系统文 件中包括的每一行字符;
获取模块, 用于根据所述系统文件中包括的每一行字符, 获取所述 系统文件中至少一行非法字符;
注释模块, 用于处理该系统文件中至少一行非法字符, 使该非法字 符无法被解析。
10、 如权利要求 9所述的装置, 其特征在于, 所述调用模块用于调 用域名系统 DNS客户端应用程序接口相关文件; 从所述 DNS客户端应 用程序接口相关文件中获取用于读取系统文件中的字符的函数的函数 地址; 根据所述获取的函数地址, 从所述终端的操作系统的系统函数库 中调用用于读取系统文件中的字符的函数。
11、 如权利要求 9所述的装置, 其特征在于, 所述获取模块用于判 断起始位置包括注释符的至少一行字符中注释符与 IP地址之间是否包 括至少预定数量个空格字符,如果所述注释符与 IP地址之间包括至少预 定数量个空格字符, 则确定所述至少一行字符为非法字符。
12、 如权利要求 9所述的装置, 其特征在于, 所述获取模块用于从 所述每一行字符中识别出 IP地址和所述识别出的 IP地址对应的 URL, 居所述 IP地址和该 IP地址对应的 URL, 确定所述系统文件中至少一 行非法字符。
13、 如权利要求 9所述的装置, 其特征在于, 所述获取模块用于从 所述每一行字符中识别出 IP地址和所述识别出的 IP地址对应的 URL, 緩存所述识别出 IP地址和所述识别出的 IP地址对应的 URL, 居所述 IP地址和所述识别出的 IP地址对应的 URL, 确定所述系统文件中至少 一行非法字符。
14、 如权利要求 12或 13所述的装置, 其特征在于, 在根据所述 IP 地址和该 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符 时, 获取模块用于判断所述 IP地址或 URL是否包括在预先设置的地址 黑名单中, 如果所述 IP地址或 URL包括在所述地址黑名单中, 确定包 括所述 IP地址或 URL的至少一行字符为非法字符。
15、 如权利要求 12或 13所述的装置, 其特征在于, 在根据所述 IP 地址和该 IP地址对应的 URL, 确定所述系统文件中至少一行非法字符 时, 获取模块用于判断一个 IP地址的 URL的个数是否超过预设的 URL 阔值, 当对应所述 IP地址的 URL的个数超过所述 URL阔值时,确定所 述 IP地址为非法 IP地址,将系统文件中包括所述非法 IP地址的至少一 行字符确定为非法字符。
16、 如权利要求 9所述的装置, 其特征在于, 所述注释模块用于将 确定的所述至少一行非法字符从所述系统文件中删除, 或者在所述系统 文件中注释所述至少一行非法字符。
PCT/CN2014/083683 2013-08-22 2014-08-05 处理系统文件的方法及装置 WO2015024435A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310370275.XA CN103457942B (zh) 2013-08-22 2013-08-22 一种对系统文件进行处理的方法及装置
CN201310370275.X 2013-08-22

Publications (1)

Publication Number Publication Date
WO2015024435A1 true WO2015024435A1 (zh) 2015-02-26

Family

ID=49739896

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/083683 WO2015024435A1 (zh) 2013-08-22 2014-08-05 处理系统文件的方法及装置

Country Status (2)

Country Link
CN (1) CN103457942B (zh)
WO (1) WO2015024435A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11463463B1 (en) * 2019-12-20 2022-10-04 NortonLifeLock Inc. Systems and methods for identifying security risks posed by application bundles

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457942B (zh) * 2013-08-22 2016-12-28 腾讯科技(深圳)有限公司 一种对系统文件进行处理的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316171A (zh) * 2008-06-30 2008-12-03 华为技术有限公司 病毒防范方法和装置
CN101719892A (zh) * 2008-10-09 2010-06-02 郁迪 一种计算机防护方法
CN103457942A (zh) * 2013-08-22 2013-12-18 腾讯科技(深圳)有限公司 一种对系统文件进行处理的方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152218B (zh) * 2013-01-30 2016-12-28 北京奇虎科技有限公司 计算机网络状态检测和修复方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316171A (zh) * 2008-06-30 2008-12-03 华为技术有限公司 病毒防范方法和装置
CN101719892A (zh) * 2008-10-09 2010-06-02 郁迪 一种计算机防护方法
CN103457942A (zh) * 2013-08-22 2013-12-18 腾讯科技(深圳)有限公司 一种对系统文件进行处理的方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11463463B1 (en) * 2019-12-20 2022-10-04 NortonLifeLock Inc. Systems and methods for identifying security risks posed by application bundles

Also Published As

Publication number Publication date
CN103457942A (zh) 2013-12-18
CN103457942B (zh) 2016-12-28

Similar Documents

Publication Publication Date Title
WO2018107784A1 (zh) 检测网页后门的方法和装置
WO2018107943A1 (zh) 一种网络访问控制方法、装置及系统
JP5382850B2 (ja) クライアントサイド攻撃対抗フィッシング検出
US9654500B2 (en) Web redirection for content filtering
US8387140B2 (en) Method and apparatus for controlling access to encrypted network communication channels
WO2017004947A1 (zh) 防止域名劫持的方法和装置
US20170011133A1 (en) System and method for improving webpage loading speeds
RU2653241C1 (ru) Обнаружение угрозы нулевого дня с использованием сопоставления ведущего приложения/программы с пользовательским агентом
WO2014154095A1 (zh) 网站认证信息的显示方法及浏览器
CN111159709A (zh) 一种文件类型识别方法、装置、设备及存储介质
CN111090449A (zh) Api服务的访问方法、装置及电子设备
EP4391448A1 (en) Method and apparatus for determining lost host
US11368430B2 (en) Domain name server based validation of network connections
WO2015024435A1 (zh) 处理系统文件的方法及装置
CN110177096B (zh) 客户端认证方法、装置、介质和计算设备
CN112152993A (zh) 网页劫持的检测方法、装置、计算机设备以及存储介质
US20210092130A1 (en) Detecting malicious web pages by analyzing elements of hypertext markup language (html) files
WO2020019515A1 (zh) 一种注入漏洞检测方法及装置
WO2020019514A1 (zh) 一种注入漏洞检测方法及装置
TWI546688B (zh) 對網路位址進行處理的方法及相關的伺服器與非暫態電腦可讀取儲存媒體
CN113329035B (zh) 一种攻击域名的检测方法、装置、电子设备及存储介质
CN113938317A (zh) 一种网络安全监测方法及计算机设备
WO2020199029A1 (zh) 一种数据处理方法及其装置
US11647031B2 (en) Determining an origin server is potentially compromised
US8732828B1 (en) Referrer-specific network management

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14838490

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 13/07/2016 )

122 Ep: pct application non-entry in european phase

Ref document number: 14838490

Country of ref document: EP

Kind code of ref document: A1