WO2015162985A1 - 不正検知ネットワークシステム及び、不正検知方法 - Google Patents
不正検知ネットワークシステム及び、不正検知方法 Download PDFInfo
- Publication number
- WO2015162985A1 WO2015162985A1 PCT/JP2015/054707 JP2015054707W WO2015162985A1 WO 2015162985 A1 WO2015162985 A1 WO 2015162985A1 JP 2015054707 W JP2015054707 W JP 2015054707W WO 2015162985 A1 WO2015162985 A1 WO 2015162985A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- fraud detection
- user terminal
- script
- terminal device
- fraud
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000000694 effects Effects 0.000 title abstract description 14
- 238000013515 script Methods 0.000 claims abstract description 108
- 238000001514 detection method Methods 0.000 claims description 234
- 238000004891 communication Methods 0.000 claims description 35
- 230000008569 process Effects 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 23
- 238000010586 diagram Methods 0.000 description 6
- 241000338154 Limosa Species 0.000 description 3
- 241000700605 Viruses Species 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
Definitions
- the present invention relates to a system and method in which a fraud detection server device detects falsification of legitimate content in a user terminal device, and in particular, malware rewrites web content information and causes a web browser processing unit of the user terminal device to perform an illegal operation.
- a fraud detection server device detects falsification of legitimate content in a user terminal device, and in particular, malware rewrites web content information and causes a web browser processing unit of the user terminal device to perform an illegal operation.
- malware attack methods are diversifying.
- conventional malware when a user terminal device is infected with malware, there is an example in which an ID or password input at the time of login is read and misused for remittance that is not intended by the user. In this case, measures are taken to prevent damage by introducing a one-time password whose password is changed each time or encrypting communication.
- a method is also employed in which a second authentication is further performed to prevent unauthorized access.
- Most of the second authentication is a format in which only some arbitrary answers are asked from a random number table given in advance to the user, and therefore unauthorized access is not successful unless the entire random number table is obtained. Therefore, there is also a technique called phishing that leads to a screen very similar to a bank site and inputs all the answers in the random number table.
- Patent Document 1 discloses a man-in-the-machine that intercepts an external transmission to a website and determines whether the user input is an external transmission in light of a transaction fingerprint associated with the website.
- a method for detecting browser attacks is disclosed.
- Non-Patent Document 1 discloses software that protects against intervention by malware by installing a secure module on the terminal side as a countermeasure against such an MITB attack (“Limosa” manufactured by FFRI Corporation).
- a secure module is downloaded from the site and automatically applied to the browser.
- Non-Patent Document 1 Malware that performs the above-mentioned MITB attack hijacks a web browser while connected to a legitimate website, so conventional authentication methods cannot handle it. Further, in the method of Non-Patent Document 1, it is necessary to install the secure module in the user terminal device.
- the present invention was created in view of the above-described problems of the prior art, and efficiently detects the behavior of malware that performs unauthorized operations, and is also easy to introduce and not susceptible to attacks. It aims to provide a method.
- the present invention provides the following fraud detection network system.
- a web server apparatus transmits a randomly selected problem from a combination of a plurality of problems assigned in advance for each user and the correct answer, and a correct answer is returned from a user terminal apparatus connected via a network.
- a fraud detection network system is provided in which a fraud detection server device connected to a network detects an illegal operation in a user terminal device while providing a service after performing an authentication process.
- the web server device stores web content information used for providing the service and a call script for calling the fraud detection server device, and the user terminal including the call script in the web content information.
- Content transmitting means for transmitting to the apparatus.
- a content receiving means for receiving web content information on the user terminal device, a web browser processing means for displaying the web content, accepting information input from the user, and executing a call script, a fraud detection server device, And a fraud detection server communication means for performing communication.
- the user terminal device acquires the fraud detection script from the fraud detection server based on the call script, searches for detection target data included in the web content information based on the fraud detection script, and transmits the search result to the fraud detection server device. To do. Then, a predetermined fraud countermeasure operation is performed based on the fraud detection result received from the fraud detection server device.
- the fraud detection server device includes a fraud detection script storage unit that stores a fraud detection script corresponding to the calling script, a user terminal communication unit that communicates with the user terminal device, and the presence / absence of fraudulent operation regarding the search result by the fraud detection script. It is characterized by comprising fraud detection means for detecting.
- the web content may be changed so that the web browser processing means does not accept input of information related to authentication from the user based on the fraud detection script.
- the detection target data may be tags and tag attribute information in a markup language. Further, the detection target data may be text related to the authentication process.
- a communication session is established between the web server device and the user terminal device, and the user is sent from the web server device to the user.
- the web content information including the calling script may be transmitted to the terminal device.
- the log recording unit may record at least one of the search result received from the user terminal device or the detection result by the fraud detection unit.
- the above-described web server device may include an obfuscation unit that obfuscates the call script, and the content transmission unit transmits the web content information including the obfuscated call script.
- the present invention can also provide the following fraud detection network system. That is, the web server device sends a randomly selected question from a combination of a plurality of questions assigned to each user in advance and the correct answer, and authentication is performed by returning a correct answer from the user terminal device connected via the network.
- a fraud detection network system in which a fraud detection server device connected to the network detects a fraudulent operation in the user terminal device and provides a service to the web server device.
- the content receiving means for receiving the web content information on the user terminal device
- the web browser processing means for displaying the web content, accepting information input from the user, and executing the fraud detection script
- a fraud detection server communication means for communicating with the fraud detection server device, search for detection target data included in the web content information based on the fraud detection script, and transmit the search result to the fraud detection server device.
- a predetermined fraud countermeasure operation based on the fraud detection result received from the fraud detection server device, the fraud detection server device including user terminal communication means for communicating with the user terminal device, and the fraud detection It is provided with fraud detection means for detecting the presence or absence of fraudulent behavior in search results by scripts
- the present invention can also provide the following fraud detection method. That is, the web server device sends a randomly selected question from a combination of a plurality of questions assigned to each user in advance and the correct answer, and authentication is performed by returning a correct answer from the user terminal device connected via the network.
- a fraud detection method in a fraud detection network system in which a fraud detection server device connected to a network detects an illegal operation in a user terminal device while providing a service after processing.
- the method includes the following steps.
- (S1) A content transmission step in which the content transmission means of the web server device transmits to the user terminal device including a call script for calling the fraud detection server device in the web content information used for providing the service
- (S2) In the user terminal device, the content receiving unit receives the web content information, a content receiving step
- (S3) A fraud detection script acquisition step in which the web browser processing means acquires the fraud detection script from the fraud detection server based on the call script
- S4 a search result transmission step of searching for detection target data included in the web content information based on the fraud detection script and transmitting the search result to the fraud detection server device
- (S5) In the fraud detection server device, the fraud detection means detects the presence or absence of fraudulent operation for the search result, and transmits the fraud detection result to the user terminal device
- (S6) A fraud countermeasure operation step in which the web browser processing means of the user terminal device performs a predetermined fraud countermeasure operation based on the fraud detection result.
- the web browser processing means may change the web content so as not to accept the input of authentication information from the user based on the fraud detection script.
- the log recording unit of the fraud detection server device records at least one of the search result received from the user terminal device or the detection result by the fraud detection unit.
- the log recording step (S41) may be configured.
- the obfuscation means of the web server device may have an obfuscation step (S03) for obfuscating the call script.
- the present invention can also provide a fraud detection method in the following fraud detection network system.
- the content transmitting unit of the web server device transmits the web content information used for providing the service including the fraud detection script to the user terminal device.
- the content receiving unit includes: A content receiving step for receiving the web content information, and the web browser processing means retrieves detection target data included in the web content information based on the fraud detection script, and transmits the search result to the fraud detection server device.
- the fraud detection means detects the presence or absence of fraud in the search result and transmits the fraud detection result to the user terminal device.
- the web browser processing means Characterized in that it has at least the steps of fraud operation step of performing a predetermined fraud behavior Te.
- the present invention can provide a fraud detection network system and a fraud detection method that can efficiently detect the behavior of malware that performs fraudulent operations and that are easy to introduce and that do not hinder operations by adopting the above configuration.
- the initial introduction is possible simply by sending the web content information including the calling script, and the detection can be made difficult by using an obfuscated script. .
- FIG. 1 is an overall view of a fraud detection network system in the present invention. It is a flowchart of the fraud detection method of this invention. It is a block diagram of the web server apparatus which concerns on this invention. It is a block diagram of the user terminal device concerning the present invention. It is a block diagram of a fraud detection server device according to the present invention. It is process explanatory drawing of the 1st step in the fraud detection method of this invention. It is process explanatory drawing of the 2nd step in the fraud detection method of this invention. It is process explanatory drawing of the 3rd step in the fraud detection method of this invention. It is process explanatory drawing of the 4th step in the fraud detection method of this invention. It is a flowchart of another Example of the fraud detection method of this invention. It is process explanatory drawing of another Example of the fraud detection method of this invention.
- FIG. 1 is an overall view of a fraud detection network system (1) according to the present invention.
- This system can be applied to a system that provides services requiring particularly high security, such as publicly known internet banking and online securities systems.
- the web server device transmits a randomly selected question from a combination of a plurality of questions assigned to each user in advance and the correct answer, and the correct answer is obtained from the user terminal device connected via the network.
- a method of performing authentication processing by sending a reply is known.
- an authentication method is used in which a random number table of 5 columns in length and width is distributed for each contractor and two numbers are asked from the random number table.
- an authentication method in which several questions are presented and correct answers are obtained from combinations of questions set by the user in advance, such as pet names and mother maiden names, and their answers.
- the present invention provides a technique for preventing malware from illegally acquiring a correct answer that is not originally asked by modifying a regular screen.
- the system (1) includes a web server (10) connected to a network such as the Internet (2), a user terminal (20), and a fraud detection server (30). ) Provides services using the web such as Internet banking in response to access from a large number of user terminals (20).
- the MITB attack targeted by the present invention while communication between the web server (10) and the user terminal (20) is established, the content of the web content received from the web server (10) is rewritten and displayed on the web browser. , Let the user input information different from the original. There is a problem that the user provides information that should not be answered because it is indistinguishable from the question from the correct connected web server. The input information is transmitted to the unauthorized server (40) connected to the Internet by malware.
- FIG. 2 is a flowchart of the fraud detection method according to the present invention
- FIG. 3 is a block diagram of the web server (10)
- FIG. 4 is a block diagram of the user terminal (20)
- FIG. 5 is a block diagram of the fraud detection server (30). is there.
- description will be given with reference to the drawings.
- the web server (10) is a known server device using a computer, and a web server processing unit (100), an obfuscation processing unit (101), and a first authentication unit realized by a computer program in the CPU (10). (102) and a second authentication unit (103).
- a communication unit (11) which is a network interface for performing communication with the Internet (2), and a storage unit (12) provided by a hard disk or a memory are provided. Other known configurations are omitted.
- the storage unit (12) stores content information (120) for providing a service and a call script (121) according to the present invention.
- the user terminal (20) is also a known terminal device using a computer, and a web browser unit (200), a fraud detection server communication unit (201), a first authentication unit (201) realized by a computer program in the CPU (20). 202) and a second authentication unit (203).
- a communication unit (21) that communicates with the Internet (2) for example, a keyboard / mouse (22) and a monitor (23) that displays a screen are connected as input means.
- the fraud detection server (30) is also a known server device.
- the CPU (30) is provided with a user terminal communication unit (300), a fraud detection processing unit (301), and a log recording unit (302).
- the communication unit (31) that communicates with 2) is connected to the storage unit (32) that stores the fraud detection script (320) and the detection database (321).
- the first authentication unit (102) of the web server transmits a screen for prompting an ID and a password to the user terminal (20), and the first authentication unit (202) returns the authentication information input by the user.
- the service is provided by performing the second authentication after the first authentication.
- the web server processing unit (100) of the web server (10) displays information for displaying a screen for inputting the second authentication, that is, the content information (120) described in the markup language is transmitted to the user terminal ( 20), the call script (121) described in JavaScript (registered trademark) is included and transmitted (content transmission step: S1).
- FIG. 6 shows a flow of information in the first stage of the present invention.
- Web content (122) including a call script (121) in content information (120) is transmitted (f1) to the user terminal (20). Represents the state.
- the call script (121) is read from the web content (122), and the web browser unit (200) executes it.
- JavaScript can be executed by default in almost all web browser applications.
- the script language of the present invention is not limited to JavaScript, and any program can be applied as long as it can be executed by the browser of the user terminal and can be executed by the browser of the user terminal.
- FIG. 7 shows the information flow of the second stage of the present invention.
- the call script defines the address of the fraud detection server (30) and the information to be read, and access (f2) is performed from the user terminal (20) accordingly.
- the user terminal communication unit (300) of the fraud detection server (30) reads out the fraud detection script (320) designated by the calling script (121) from the storage unit (32) and reads the fraud detection script (320) of the user terminal (20). It returns (f3) to the fraud detection server communication unit (201) (fault detection script acquisition step: S3).
- the fraud detection script simply searches the content of the web content (122) received by the user terminal (20), and performs a process of extracting necessary information.
- the point which does not perform etc. is mentioned. That is, when transmitting an executable file for the purpose of searching for a virus as in the prior art, a lot of time is required for the file transmission itself and the subsequent search.
- Active X registered trademark
- Active X control requires the installation of a plug-in to the web browser, and there is a problem that the execution environment is limited.
- the present invention has an advantage that only the reception of the fraud detection script is difficult to distinguish from communication in a normal service, and since only a simple search process is performed after communication of a small-capacity script, speeding up can be achieved. Figured. In fact, even if the processing of the present invention is introduced, the processing time until the second authentication is completed in an instant, so that the user is not aware of the processing.
- the web browser unit (200) searches the detection target data included in the web content information according to the fraud detection script, and transmits the search result to the fraud detection server device (search result transmission step: S4).
- FIG. 8 shows the information flow of the third stage of the present invention.
- Examples of search by the fraud detection script in the user terminal (20) include an input tag and a form tag in the HTML language of the web content (122).
- the web server (10) and the user terminal (20) are performing secure communication by SSL, the content is rewritten immediately before being decrypted and displayed on the web browser on the user terminal (20). Is called. Therefore, in order to confirm whether or not this rewriting has been performed, information related to the HTML content is searched.
- the number of input tags and form tags included in the web content (122) can be extracted. It is possible to find a case where fifteen input fields are provided by rewriting even though only two numbers are supposed to be input. It is also effective to extract what is included in attribute information such as name information of the input tag.
- the user terminal (20) does not determine whether or not this information is correct on the spot, and the fraud detection script (320) only searches for this information and transmits it to the fraud detection server (30). Take on.
- the web browser unit (200) transmits the number of tags and name information specified in the fraud detection script (320) to the API server (303) (S4). .
- the detection target data included in the searched web content information is not limited to the tag, and may be an arbitrary character string in the HTML content.
- the malware may rewrite the display so that the warning screen itself is not displayed.
- the retrieved value itself may be transmitted, or the value after performing a predetermined calculation using a hash function, for example, may be transmitted.
- FIG. 9 shows the information flow of the fourth stage of the present invention.
- the fraud detection processing unit (301) matches the correct website information while referring to the detection database (321). Check if you want to. In line with the above example, whether the number of input tags and form tags has changed, whether there are any added or modified attribute values such as tag names, text or image links, and operation tag changes Check if there is any. Obviously, these collations have a very small load on the computer processing, and the collation processing itself is completed in a short time.
- the fraud detection step (S5) it is detected whether or not fraudulent operation is performed by malware, and the determination result is transmitted to the fraud detection server communication unit (201) of the user terminal (20) (f5). To do.
- the web browser unit (200) Based on the determination result from the fraud detection server (30), the web browser unit (200) performs the fraud countermeasure operation (S6). That is, when rewriting of the web content (122) is accepted, the fraud detection script (320) prohibits transmission of information from the user terminal (20) (f6), and displays a warning display to the user. You may go. Alternatively, a signal for temporarily invalidating the user account may be transmitted to the web server (10). In the present invention, the fraud countermeasure operation is not limited.
- the process proceeds to the second authentication process (S7) as usual, and the service may be started (S8).
- FIG. 10 shows a flowchart in another embodiment of the present invention.
- the obfuscation processing unit (101) performs obfuscation processing (S03).
- JavaScript obfuscation processing is well-known, and any technique that makes it difficult to understand the contents of a script can be applied as appropriate. Obfuscation can make it difficult for malware to detect the presence and content of the calling script.
- the obfuscation processing may be performed before the content transmission step (S1). For example, it may be performed in advance at the time of content preparation.
- the first authentication and second authentication screens and other service screens generally contain scripts in the first place, and this general script and call script should be obfuscated together.
- This also has the effect of making it difficult for malware to perform operations. For example, even if it can be detected that a script is included, it is difficult for the Service-to-Self side to separate the original part from the calling script part. It is expected that the expected operation cannot be performed by deleting the necessary script, and the web application does not operate correctly on the browser. Therefore, this obfuscation process (S03) works particularly effectively in combination with the present invention.
- the obfuscation process (S03) is performed on the calling script (121), but it may be performed on the fraud detection script. That is, the same obfuscation processing unit as described above is provided in the fraud detection server (30), and the fraud detection script can be obfuscated. Even in this case, it is not only obfuscated each time the fraud detection script is transmitted, but may be performed in advance when preparing the fraud detection script.
- the search result received from the user terminal (20) by the log recording unit (302) of the fraud detection server (30) or the fraud detection processing unit (301) after the fraud result transmission step (S4) or the fraud detection step (S5). ) Can be recorded (log recording step: S41).
- log information to be collected include the identification number of the web content searched as the determination result, the determination result, the IP address of the user terminal (20), the User-Agent information of the web browser, and the access date and time.
- the searched content itself may be recorded. In that case, the modified HTML content can be recorded and used for analyzing malware.
- the web browser unit (200) Before or after the obfuscation process (S03), the web browser unit (200) can temporarily stop the input from the user. In other words, some malware may send information to the unauthorized server (40) at the same time as the user inputs, so the call script (121) includes a process to stop the input and accepts any form input. By avoiding this, information leakage can be avoided.
- the fraud detection server (30) and the web server (20) are distributed in the above, the address and domain name of the fraud detection server (30) called by the call script (121) are different from those of the web server (20).
- the domain name is clearly different from that of the operator of the web server (20), it will be easily detected by malware, so the fraud detection server (30) domain or subdomain will be in the same domain as the web server (20). It is preferable to register DNS (DomainDNSName (Server). Since the web server (20) and the fraud detection server (30) are in the same domain, the behavior according to the fraud detection method of the present invention becomes more difficult to understand together with the obfuscation process (S03).
- a fraud detection script may be included in the web content (122). That is, as shown in FIG. 11, in the fraud detection network system similar to the above, the web server (10) uses the fraud detection script (322) instead of the calling script together with the web content (122) used for providing the service.
- the web server (10) uses the fraud detection script (322) instead of the calling script together with the web content (122) used for providing the service.
- the web content (122) including the fraud detection script (322) is sent to the web browser unit (200) of the user terminal (20) to display the web content, accept information input from the user, and detect fraud.
- the script (322) is executed.
- the subsequent processing is the same as in the above embodiment, and the web browser unit (200) transmits the number of tags and name information specified in the fraud detection script (320) to the API server (303).
- the user terminal communication unit (300) of the fraud detection server (30) receives the designated information, whether the fraud detection processing unit (301) matches the correct website information while referring to the detection database (321). Is matched. Based on the determination result from the fraud detection server (30), the web browser unit (200) performs a fraud countermeasure operation.
- the present invention is a technique for easily detecting alteration of web contents as a countermeasure against an MITB attack. Instead of the black list method having a list of registered malware and its behavior, it is possible to flexibly deal with new malware by having the necessary conditions for regular web content as a white list. Since the present invention can be implemented by adding a script, it is not necessary to install client software in the user terminal device, and high-speed processing can be realized. In addition, the fraud detection server device collects log information, so it is possible to collect information on damaged customers, determination results, and abnormal contents, thereby contributing to prevention of damage spread.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
そこで最近では、例えばブラウザのプロセスに入り込むことで第1認証の成功後に、SSLの暗号通信が復号された後の平文を改ざんし、偽の第2認証画面を表示し、ユーザが気がつかないうちに必要な情報を窃取したり、あるいはユーザが意図しない操作を行ってしまう攻撃方法が現れている。この攻撃はMan In The Browser(MITB)攻撃と呼ばれており、正規のサイトに接続された状態で不正動作が行われるためユーザやウイルス検知ソフトによる発見が困難な問題がある。
また、上記非特許文献1の方法ではセキュアモジュールをユーザ端末装置にインストールする必要がある。
ユーザ端末装置は、呼出スクリプトに基づいて不正検知サーバから不正検知スクリプトを取得し、不正検知スクリプトに基づいてウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を不正検知サーバ装置に送信する。そして、不正検知サーバ装置から受信する不正検知結果に基づいて所定の不正対策動作を行う。
すなわち、予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、該ネットワークに接続された不正検知サーバ装置が該ユーザ端末装置における不正動作を検知する不正検知ネットワークシステムであって、該ウェブサーバ装置に、サービスの提供に用いるウェブコンテンツ情報と、不正検知スクリプトとを記憶する記憶手段と、該ウェブコンテンツ情報に、該不正検知スクリプトを含めて該ユーザ端末装置に送信するコンテンツ送信手段とを備える。
すなわち、予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、ネットワークに接続された不正検知サーバ装置がユーザ端末装置における不正動作を検知する不正検知ネットワークシステムにおける不正検知方法を提供する。
(S1)ウェブサーバ装置のコンテンツ送信手段が、サービスの提供に用いるウェブコンテンツ情報に、不正検知サーバ装置を呼び出しするための呼出スプリクトを含めてユーザ端末装置に送信するコンテンツ送信ステップ、
(S2)ユーザ端末装置において、コンテンツ受信手段が、ウェブコンテンツ情報を受信するコンテンツ受信ステップ、
(S3)ウェブブラウザ処理手段が、呼出スクリプトに基づいて不正検知サーバから不正検知スクリプトを取得する不正検知スクリプト取得ステップ、
(S4)不正検知スクリプトに基づいてウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を不正検知サーバ装置に送信する検索結果送信ステップ、
(S5)不正検知サーバ装置において、不正検知手段が、検索結果について不正動作の有無を検知し、ユーザ端末装置に不正検知結果を送信する不正検知ステップ、
(S6)ユーザ端末装置のウェブブラウザ処理手段が、不正検知結果に基づいて所定の不正対策動作を行う不正対策動作ステップ。
本方法では、ウェブサーバ装置のコンテンツ送信手段が、サービスの提供に用いるウェブコンテンツ情報に、不正検知スプリクトを含めて該ユーザ端末装置に送信するコンテンツ送信ステップ、該ユーザ端末装置において、コンテンツ受信手段が、該ウェブコンテンツ情報を受信するコンテンツ受信ステップ、ウェブブラウザ処理手段が、該不正検知スクリプトに基づいて該ウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を該不正検知サーバ装置に送信する検索結果送信ステップ、該不正検知サーバ装置において、不正検知手段が、該検索結果について不正動作の有無を検知し、該ユーザ端末装置に不正検知結果を送信する不正検知ステップ、該ユーザ端末装置のウェブブラウザ処理手段が、該不正検知結果に基づいて所定の不正対策動作を行う不正対策動作ステップの各ステップを少なくとも有することを特徴とする。
図1は、本発明における不正検知ネットワークシステム(1)の全体図である。本システムは、公知のインターネットバンキングや、オンライン証券システムを始めとする特に高いセキュリティが要求されるサービスを提供するシステムに適用可能である。
本発明では、マルウェアが正規の画面を改変して本来問われていない正解を不正に取得することを防止する技術を提供する。
記憶部(12)にはサービスを提供するためのコンテンツ情報(120)と、本発明に係る呼出スクリプト(121)が格納されている。
ユーザ端末(20)においてコンテンツを受信(S2)すると、ウェブコンテンツ(122)から呼出スクリプト(121)を読み出してウェブブラウザ部(200)が実行処理する。周知のようにJavaScriptの実行はほとんど全てのウェブブラウザアプリケーションが標準で可能である。なお、本発明のスクリプト言語はJavaScriptに限定されず、ユーザ端末のブラウザが実行可能で、かつユーザ端末のブラウザ上で実行可能なプログラムであれば任意に適用できる。
このアクセスに対して不正検知サーバ(30)のユーザ端末通信部(300)は、記憶部(32)から呼出スクリプト(121)が指定する不正検知スクリプト(320)を読み出してユーザ端末(20)の不正検知サーバ通信部(201)に返信(f3)する(不正検知スクリプト取得ステップ:S3) 。
すなわち、従来のようにウイルス探索を目的とした実行ファイルを送信する場合、ファイルの送信自体や、その後の探索に多くの時間が必要である。また、例えばActive X(登録商標)コントロールによりウイルス探索を行おうとすると、その挙動自体をマルウェアが探知しやすく、探索を阻止されやすい欠点がある。さらに、Active Xコントロールはウェブブラウザへのプラグインのインストールなどが必要で、実行環境が限定される問題もある。
不正検知サーバ(30)のユーザ端末通信部(300)が指定された情報を受信(f4)すると、不正検知処理部(301)が検知データベース(321)を参照しながら正しいウェブサイトの情報と一致するかどうかを照合する。上記実施例に則して言えば、inputタグやformタグの数が変わっていないか、タグのnameなどの属性値に加除修正されたものがないか、テキストや画像のリンク、操作タグの変更がないか、などを照合する。明らかなように、これらの照合はコンピュータの処理としては負荷が非常に小さく、照合処理自体も短時間で終了する。
このように不正検知ステップ(S5)では、マルウェアによって不正動作が行われていないかどうかを検知し、ユーザ端末(20)の不正検知サーバ通信部(201)に対して判定結果を送信(f5)する。
本実施例では、呼出スクリプト(121)をウェブコンテンツ(122)に含める際に、難読化処理部(101)で難読化処理(S03)を行う。JavaScriptの難読化処理は公知であり、スクリプトの内容を分かりにくくする技術であれば適宜適用することができる。難読化によってマルウェアが呼出スクリプトの存在や内容を察知しにくくすることができる。なお、難読化処理はコンテンツ送信ステップ(S1)よりも前に行えばよい。例えばコンテンツの準備時に予め行っておけばよい。
この場合においても、不正検知スクリプトを送信するたびに難読化するだけでなく、不正検知スクリプトの準備時に予め行っておいてもよい。
収集するログの情報としては、判定結果として検索したウェブコンテンツの識別番号、判定結果、ユーザ端末(20)のIPアドレス、ウェブブラウザのUser-Agent情報、アクセス日時などが挙げられる。
また、検索したコンテンツ自体を記録してもよく、その場合は改変された後のHTMLコンテンツを記録して、マルウェアの解析に用いることができる。
以降の処理は上記実施例と同様であり、ウェブブラウザ部(200)が、不正検知スクリプト(320)で指定されているタグの数や名前の情報をAPIサーバ(303)に送信する。
不正検知サーバ(30)からの判定結果によって、ウェブブラウザ部(200)は不正対策動作を行う。
スクリプトを追加することで本発明は実施できるため、ユーザ端末装置におけるクライアントソフトのインストールが不要であり、しかも高速な処理が実現できる。また、不正検知サーバ装置がログ情報を収集することで、被害を受けた顧客の情報や、判定結果、異常コンテンツの収集が可能であり、被害の拡大防止にも寄与する。
2 インターネット
10 ウェブサーバ
20 ユーザ端末
30 不正検知サーバ
40 不正サーバ
Claims (16)
- 予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、該ネットワークに接続された不正検知サーバ装置が該ユーザ端末装置における不正動作を検知する不正検知ネットワークシステムであって、
該ウェブサーバ装置に、
サービスの提供に用いるウェブコンテンツ情報と、不正検知サーバ装置を呼び出しするための呼出スプリクトとを記憶する記憶手段と、
該ウェブコンテンツ情報に、該呼出スクリプトを含めて該ユーザ端末装置に送信するコンテンツ送信手段と
を備えると共に、
該ユーザ端末装置に、
該ウェブコンテンツ情報を受信するコンテンツ受信手段と、
該ウェブコンテンツを表示し、ユーザからの情報入力を受理すると共に、該呼出スクリプトを実行するウェブブラウザ処理手段と、
該不正検知サーバ装置との通信を行う不正検知サーバ通信手段とを備え、
該呼出スクリプトに基づいて該不正検知サーバから不正検知スクリプトを取得し、該不正検知スクリプトに基づいて該ウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を該不正検知サーバ装置に送信すると共に、該不正検知サーバ装置から受信する不正検知結果に基づいて所定の不正対策動作を行い、
該不正検知サーバ装置は、
該呼出スクリプトに対応する不正検知スクリプトを記憶する不正検知スクリプト記憶手段と、
該ユーザ端末装置との通信を行うユーザ端末通信手段と、
該不正検知スクリプトによる検索結果について不正動作の有無を検知する不正検知手段と
を備えたことを特徴とする不正検知ネットワークシステム。 - 前記ウェブブラウザ処理手段が、前記不正検知スクリプトに基づいてユーザから認証に係る情報の入力を受理しないように該ウェブコンテンツを変更する
請求項1に記載の不正検知ネットワークシステム。 - 前記検知対象データが、マークアップ言語におけるタグとタグの属性情報である
請求項1又は2に記載の不正検知ネットワークシステム。 - 前記検知対象データが、前記認証処理に係るテキストである
請求項1ないし3のいずれかに記載の不正検知ネットワークシステム。 - 前記ウェブサーバ装置と前記ユーザ端末装置の認証手段との間でセキュアな通信を確立した後に、
該ウェブサーバ装置の認証手段と前記ユーザ端末装置の認証手段との間で第1の認証処理を行い、
該ウェブサーバ装置から該ユーザ端末装置に対して前記呼出スクリプトを含むウェブコンテンツ情報を送信する
請求項1ないし4のいずれかに記載の不正検知ネットワークシステム。 - 前記不正検知サーバ装置において、前記ユーザ端末装置から受信した検索結果、又は前記不正検知手段による検知結果、の少なくともいずれかをログ記録手段が記録を行う
請求項1ないし5のいずれかに記載の不正検知ネットワークシステム。 - 前記ウェブサーバ装置において、前記呼出スクリプトを難読化する難読化手段を備え、
前記コンテンツ送信手段が、前記ウェブコンテンツ情報に、難読化された該呼出スクリプトを含めて送信する
請求項1ないし6のいずれかに記載の不正検知ネットワークシステム。 - 予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、該ネットワークに接続された不正検知サーバ装置が該ユーザ端末装置における不正動作を検知する不正検知ネットワークシステムであって、
該ウェブサーバ装置に、
サービスの提供に用いるウェブコンテンツ情報と、不正検知スクリプトとを記憶する記憶手段と、
該ウェブコンテンツ情報に、該不正検知スクリプトを含めて該ユーザ端末装置に送信するコンテンツ送信手段と
を備えると共に、
該ユーザ端末装置に、
該ウェブコンテンツ情報を受信するコンテンツ受信手段と、
該ウェブコンテンツを表示し、ユーザからの情報入力を受理すると共に、該不正検知スクリプトを実行するウェブブラウザ処理手段と、
該不正検知サーバ装置との通信を行う不正検知サーバ通信手段とを備え、
該不正検知スクリプトに基づいて該ウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を該不正検知サーバ装置に送信すると共に、該不正検知サーバ装置から受信する不正検知結果に基づいて所定の不正対策動作を行い、
該不正検知サーバ装置は、
該ユーザ端末装置との通信を行うユーザ端末通信手段と、
該不正検知スクリプトによる検索結果について不正動作の有無を検知する不正検知手段と
を備えたことを特徴とする不正検知ネットワークシステム。 - 予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、該ネットワークに接続された不正検知サーバ装置が該ユーザ端末装置における不正動作を検知する不正検知ネットワークシステムにおける不正検知方法であって、
該ウェブサーバ装置のコンテンツ送信手段が、サービスの提供に用いるウェブコンテンツ情報に、不正検知サーバ装置を呼び出しするための呼出スプリクトを含めて該ユーザ端末装置に送信するコンテンツ送信ステップ、
該ユーザ端末装置において、
コンテンツ受信手段が、該ウェブコンテンツ情報を受信するコンテンツ受信ステップ、
ウェブブラウザ処理手段が、該呼出スクリプトに基づいて該不正検知サーバから不正検知スクリプトを取得する不正検知スクリプト取得ステップ、
該不正検知スクリプトに基づいて該ウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を該不正検知サーバ装置に送信する検索結果送信ステップ、
該不正検知サーバ装置において、
不正検知手段が、該検索結果について不正動作の有無を検知し、該ユーザ端末装置に不正検知結果を送信する不正検知ステップ、
該ユーザ端末装置のウェブブラウザ処理手段が、該不正検知結果に基づいて所定の不正対策動作を行う不正対策動作ステップ
の各ステップを少なくとも有することを特徴とする不正検知方法。 - 前記不正検知スクリプト取得ステップの後に、
前記ウェブブラウザ処理手段が、前記不正検知スクリプトに基づいてユーザから認証に係る情報の入力を受理しないように該ウェブコンテンツを変更する
請求項9に記載の不正検知方法。 - 前記検知対象データが、マークアップ言語におけるタグとタグの属性情報である
請求項9又は10に記載の不正検知方法。 - 前記検知対象データが、前記認証処理に係るテキストである
請求項9ないし11のいずれかに記載の不正検知方法。 - 前記コンテンツ送信ステップの前に、
前記ウェブサーバ装置と、前記ユーザ端末装置との間でセキュアな通信を確立するセキュア通信確立ステップと、
該ウェブサーバ装置の認証手段と該ユーザ端末装置の認証手段との間で第1の認証処理を行う第1認証ステップとを有する
請求項9ないし12のいずれかに記載の不正検知方法。 - 前記検索結果送信ステップ又は前記不正検知ステップの後に、
前記不正検知サーバ装置のログ記録手段が、前記ユーザ端末装置から受信した検索結果、又は前記不正検知手段による検知結果、の少なくともいずれかを記録するログ記録ステップを有する
請求項9ないし13のいずれかに記載の不正検知方法。 - 前記コンテンツ送信ステップの前に、
前記ウェブサーバ装置の難読化手段が、前記呼出スクリプトを難読化する難読化ステップを有する
請求項9ないし14のいずれかに記載の不正検知方法。 - 予めユーザ毎に割当てられた複数の問題とその正解との組み合わせから、ウェブサーバ装置がランダムに選択された問題を送信し、ネットワークで接続されたユーザ端末装置から正解を返信させることにより認証処理を行った後にサービスを提供すると共に、該ネットワークに接続された不正検知サーバ装置が該ユーザ端末装置における不正動作を検知する不正検知ネットワークシステムにおける不正検知方法であって、
該ウェブサーバ装置のコンテンツ送信手段が、サービスの提供に用いるウェブコンテンツ情報に、不正検知スプリクトを含めて該ユーザ端末装置に送信するコンテンツ送信ステップ、
該ユーザ端末装置において、
コンテンツ受信手段が、該ウェブコンテンツ情報を受信するコンテンツ受信ステップ、
ウェブブラウザ処理手段が、該不正検知スクリプトに基づいて該ウェブコンテンツ情報に含まれる検知対象データを検索し、その検索結果を該不正検知サーバ装置に送信する検索結果送信ステップ、
該不正検知サーバ装置において、
不正検知手段が、該検索結果について不正動作の有無を検知し、該ユーザ端末装置に不正検知結果を送信する不正検知ステップ、
該ユーザ端末装置のウェブブラウザ処理手段が、該不正検知結果に基づいて所定の不正対策動作を行う不正対策動作ステップ
の各ステップを少なくとも有することを特徴とする不正検知方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2946695A CA2946695C (en) | 2014-04-25 | 2015-02-20 | Fraud detection network system and fraud detection method |
EP15782770.0A EP3136277B1 (en) | 2014-04-25 | 2015-02-20 | Illicit activity sensing network system and illicit activity sensing method |
JP2016514755A JP6438011B2 (ja) | 2014-04-25 | 2015-02-20 | 不正検知ネットワークシステム及び、不正検知方法 |
US15/306,685 US10469531B2 (en) | 2014-04-25 | 2015-02-20 | Fraud detection network system and fraud detection method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014090901 | 2014-04-25 | ||
JP2014-090901 | 2014-04-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015162985A1 true WO2015162985A1 (ja) | 2015-10-29 |
Family
ID=54332158
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/054707 WO2015162985A1 (ja) | 2014-04-25 | 2015-02-20 | 不正検知ネットワークシステム及び、不正検知方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10469531B2 (ja) |
EP (1) | EP3136277B1 (ja) |
JP (1) | JP6438011B2 (ja) |
CA (1) | CA2946695C (ja) |
WO (1) | WO2015162985A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108604262A (zh) * | 2015-12-17 | 2018-09-28 | 耶德托公司 | 保护网页、网络应用程序和应用程序 |
JP2020187771A (ja) * | 2020-07-09 | 2020-11-19 | ブラザー工業株式会社 | 画像処理装置、及び通信装置 |
KR20220100279A (ko) * | 2021-01-08 | 2022-07-15 | 주식회사 우아한형제들 | 로그인 강화 장치 및 방법 |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10395018B2 (en) | 2010-11-29 | 2019-08-27 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US10069837B2 (en) | 2015-07-09 | 2018-09-04 | Biocatch Ltd. | Detection of proxy server |
US11269977B2 (en) | 2010-11-29 | 2022-03-08 | Biocatch Ltd. | System, apparatus, and method of collecting and processing data in electronic devices |
US10586036B2 (en) | 2010-11-29 | 2020-03-10 | Biocatch Ltd. | System, device, and method of recovery and resetting of user authentication factor |
US9483292B2 (en) | 2010-11-29 | 2016-11-01 | Biocatch Ltd. | Method, device, and system of differentiating between virtual machine and non-virtualized device |
US10728761B2 (en) | 2010-11-29 | 2020-07-28 | Biocatch Ltd. | Method, device, and system of detecting a lie of a user who inputs data |
US10069852B2 (en) | 2010-11-29 | 2018-09-04 | Biocatch Ltd. | Detection of computerized bots and automated cyber-attack modules |
US10897482B2 (en) | 2010-11-29 | 2021-01-19 | Biocatch Ltd. | Method, device, and system of back-coloring, forward-coloring, and fraud detection |
US9848009B2 (en) * | 2010-11-29 | 2017-12-19 | Biocatch Ltd. | Identification of computerized bots and automated cyber-attack modules |
US10474815B2 (en) | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | System, device, and method of detecting malicious automatic script and code injection |
US10917431B2 (en) | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US9626677B2 (en) * | 2010-11-29 | 2017-04-18 | Biocatch Ltd. | Identification of computerized bots, and identification of automated cyber-attack modules |
US10037421B2 (en) | 2010-11-29 | 2018-07-31 | Biocatch Ltd. | Device, system, and method of three-dimensional spatial user authentication |
US10747305B2 (en) | 2010-11-29 | 2020-08-18 | Biocatch Ltd. | Method, system, and device of authenticating identity of a user of an electronic device |
US10685355B2 (en) | 2016-12-04 | 2020-06-16 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US10404729B2 (en) | 2010-11-29 | 2019-09-03 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US10834590B2 (en) | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US12101354B2 (en) * | 2010-11-29 | 2024-09-24 | Biocatch Ltd. | Device, system, and method of detecting vishing attacks |
US10776476B2 (en) | 2010-11-29 | 2020-09-15 | Biocatch Ltd. | System, device, and method of visual login |
US11210674B2 (en) | 2010-11-29 | 2021-12-28 | Biocatch Ltd. | Method, device, and system of detecting mule accounts and accounts used for money laundering |
US10083439B2 (en) | 2010-11-29 | 2018-09-25 | Biocatch Ltd. | Device, system, and method of differentiating over multiple accounts between legitimate user and cyber-attacker |
US10949514B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | Device, system, and method of differentiating among users based on detection of hardware components |
US10032010B2 (en) | 2010-11-29 | 2018-07-24 | Biocatch Ltd. | System, device, and method of visual login and stochastic cryptography |
US10055560B2 (en) | 2010-11-29 | 2018-08-21 | Biocatch Ltd. | Device, method, and system of detecting multiple users accessing the same account |
US11223619B2 (en) | 2010-11-29 | 2022-01-11 | Biocatch Ltd. | Device, system, and method of user authentication based on user-specific characteristics of task performance |
US10164985B2 (en) | 2010-11-29 | 2018-12-25 | Biocatch Ltd. | Device, system, and method of recovery and resetting of user authentication factor |
US10949757B2 (en) | 2010-11-29 | 2021-03-16 | Biocatch Ltd. | System, device, and method of detecting user identity based on motor-control loop model |
US10298614B2 (en) * | 2010-11-29 | 2019-05-21 | Biocatch Ltd. | System, device, and method of generating and managing behavioral biometric cookies |
US10621585B2 (en) | 2010-11-29 | 2020-04-14 | Biocatch Ltd. | Contextual mapping of web-pages, and generation of fraud-relatedness score-values |
US10476873B2 (en) | 2010-11-29 | 2019-11-12 | Biocatch Ltd. | Device, system, and method of password-less user authentication and password-less detection of user identity |
US10262324B2 (en) | 2010-11-29 | 2019-04-16 | Biocatch Ltd. | System, device, and method of differentiating among users based on user-specific page navigation sequence |
US20190158535A1 (en) * | 2017-11-21 | 2019-05-23 | Biocatch Ltd. | Device, System, and Method of Detecting Vishing Attacks |
US10970394B2 (en) | 2017-11-21 | 2021-04-06 | Biocatch Ltd. | System, device, and method of detecting vishing attacks |
GB2539705B (en) | 2015-06-25 | 2017-10-25 | Aimbrain Solutions Ltd | Conditional behavioural biometrics |
CN108476155B (zh) * | 2015-12-25 | 2021-05-14 | 新唐科技日本株式会社 | 不正当消息检测装置、方法、记录介质、以及电子控制装置 |
US11587063B1 (en) * | 2016-07-06 | 2023-02-21 | United Services Automobile Association (Usaa) | Automated proximity fraud account lock systems and methods |
GB2552032B (en) | 2016-07-08 | 2019-05-22 | Aimbrain Solutions Ltd | Step-up authentication |
US10198122B2 (en) | 2016-09-30 | 2019-02-05 | Biocatch Ltd. | System, device, and method of estimating force applied to a touch surface |
US10579784B2 (en) | 2016-11-02 | 2020-03-03 | Biocatch Ltd. | System, device, and method of secure utilization of fingerprints for user authentication |
US11194909B2 (en) | 2017-06-21 | 2021-12-07 | Palo Alto Networks, Inc. | Logical identification of malicious threats across a plurality of end-point devices |
US10397262B2 (en) | 2017-07-20 | 2019-08-27 | Biocatch Ltd. | Device, system, and method of detecting overlay malware |
US20190130404A1 (en) * | 2017-10-26 | 2019-05-02 | Mastercard International Incorporated | Systems and methods for identifying a data compromise source |
US11019090B1 (en) * | 2018-02-20 | 2021-05-25 | United Services Automobile Association (Usaa) | Systems and methods for detecting fraudulent requests on client accounts |
KR20200034020A (ko) | 2018-09-12 | 2020-03-31 | 삼성전자주식회사 | 전자 장치 및 그의 제어 방법 |
CN111131370B (zh) * | 2018-11-01 | 2022-09-27 | 百度在线网络技术(北京)有限公司 | 用于检测服务调用是否正确的方法、装置和系统 |
US11606353B2 (en) | 2021-07-22 | 2023-03-14 | Biocatch Ltd. | System, device, and method of generating and utilizing one-time passwords |
US12045826B1 (en) | 2023-02-28 | 2024-07-23 | Blockaid Ltd | Techniques for decentralized application discovery and scanning |
US11930043B1 (en) * | 2023-02-28 | 2024-03-12 | Blockaid Ltd | Techniques for digital wallet integration and for scanning transactions using integrated modules |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002342281A (ja) * | 2001-05-14 | 2002-11-29 | Nippon Telegr & Teleph Corp <Ntt> | 対話形式本人認証システムとその方法、及びこの方法の実行プログラムとこの実行プログラムの記録媒体 |
JP2004520636A (ja) * | 1999-12-31 | 2004-07-08 | インカインターネット カンパニー リミテッド | オンライン上での有害情報遮断システム及び方法、並びにそのためのコンピュータで読出し可能な記録媒体 |
JP2008276774A (ja) * | 2007-04-27 | 2008-11-13 | Beijing Kingsoft Software Co Ltd | オンラインウイルススキャンの装置及び方法 |
JP2010198054A (ja) * | 2009-02-23 | 2010-09-09 | National Institute Of Information & Communication Technology | コンピュータ検査システム、コンピュータ検査方法 |
JP2011512576A (ja) * | 2008-01-25 | 2011-04-21 | 株式会社エヌ・ティ・ティ・ドコモ | ブラウザベースのアタックに対するウェブコンテンツインスツルメンテーションのためのセキュリティポリシーを構築する方法及び装置 |
JP2013196222A (ja) * | 2012-03-16 | 2013-09-30 | Fujitsu Ltd | 認証プログラム、情報処理装置、及び認証システム |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7197534B2 (en) * | 1998-09-01 | 2007-03-27 | Big Fix, Inc. | Method and apparatus for inspecting the properties of a computer |
US20110238855A1 (en) * | 2000-09-25 | 2011-09-29 | Yevgeny Korsunsky | Processing data flows with a data flow processor |
US20070192863A1 (en) * | 2005-07-01 | 2007-08-16 | Harsh Kapoor | Systems and methods for processing data flows |
JP3593979B2 (ja) * | 2001-01-11 | 2004-11-24 | 富士ゼロックス株式会社 | 利用権制御を伴うサーバおよびクライアントならびにサービス提供方法および利用権証明方法 |
CA2487787A1 (en) * | 2004-03-16 | 2005-09-16 | Queue Global Information Systems Corp. | System and method for authenticating a user of an account |
EP1738518A1 (en) * | 2004-03-16 | 2007-01-03 | Queue Global Information Systems Corp. | System and method for authenticating a user of an account |
US8650080B2 (en) * | 2006-04-10 | 2014-02-11 | International Business Machines Corporation | User-browser interaction-based fraud detection system |
US7721091B2 (en) * | 2006-05-12 | 2010-05-18 | International Business Machines Corporation | Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages |
US7827311B2 (en) * | 2007-05-09 | 2010-11-02 | Symantec Corporation | Client side protection against drive-by pharming via referrer checking |
US8713680B2 (en) * | 2007-07-10 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program |
US8667583B2 (en) * | 2008-09-22 | 2014-03-04 | Microsoft Corporation | Collecting and analyzing malware data |
US8225401B2 (en) * | 2008-12-18 | 2012-07-17 | Symantec Corporation | Methods and systems for detecting man-in-the-browser attacks |
JP2010282293A (ja) | 2009-06-02 | 2010-12-16 | Fujitsu Ltd | 電子機器 |
US8661257B2 (en) * | 2010-05-18 | 2014-02-25 | Nokia Corporation | Generic bootstrapping architecture usage with Web applications and Web pages |
JP2012025064A (ja) * | 2010-07-26 | 2012-02-09 | Canon Inc | 印刷装置、印刷装置の制御方法、及び、プログラム |
AU2011200413B1 (en) * | 2011-02-01 | 2011-09-15 | Symbiotic Technologies Pty Ltd | Methods and Systems to Detect Attacks on Internet Transactions |
CA2849162C (en) * | 2011-09-21 | 2016-12-20 | David K. Ford | Methods and apparatus for validating communications in an open architecture system |
JP6030566B2 (ja) * | 2011-11-10 | 2016-11-24 | 株式会社セキュアブレイン | 不正アプリケーション検知システム及び、方法 |
US9021553B1 (en) * | 2012-03-30 | 2015-04-28 | Emc Corporation | Methods and apparatus for fraud detection and remediation in knowledge-based authentication |
US20130325591A1 (en) * | 2012-06-01 | 2013-12-05 | Airpush, Inc. | Methods and systems for click-fraud detection in online advertising |
GB2513494B (en) * | 2012-08-23 | 2015-07-29 | Vzinternet Ltd | Data verification |
US9544329B2 (en) * | 2014-03-18 | 2017-01-10 | Shape Security, Inc. | Client/server security by an intermediary executing instructions received from a server and rendering client application instructions |
US9516107B2 (en) * | 2014-06-05 | 2016-12-06 | Dropbox, Inc. | Secure local server for synchronized online content management system |
-
2015
- 2015-02-20 CA CA2946695A patent/CA2946695C/en active Active
- 2015-02-20 JP JP2016514755A patent/JP6438011B2/ja active Active
- 2015-02-20 WO PCT/JP2015/054707 patent/WO2015162985A1/ja active Application Filing
- 2015-02-20 US US15/306,685 patent/US10469531B2/en active Active
- 2015-02-20 EP EP15782770.0A patent/EP3136277B1/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004520636A (ja) * | 1999-12-31 | 2004-07-08 | インカインターネット カンパニー リミテッド | オンライン上での有害情報遮断システム及び方法、並びにそのためのコンピュータで読出し可能な記録媒体 |
JP2002342281A (ja) * | 2001-05-14 | 2002-11-29 | Nippon Telegr & Teleph Corp <Ntt> | 対話形式本人認証システムとその方法、及びこの方法の実行プログラムとこの実行プログラムの記録媒体 |
JP2008276774A (ja) * | 2007-04-27 | 2008-11-13 | Beijing Kingsoft Software Co Ltd | オンラインウイルススキャンの装置及び方法 |
JP2011512576A (ja) * | 2008-01-25 | 2011-04-21 | 株式会社エヌ・ティ・ティ・ドコモ | ブラウザベースのアタックに対するウェブコンテンツインスツルメンテーションのためのセキュリティポリシーを構築する方法及び装置 |
JP2010198054A (ja) * | 2009-02-23 | 2010-09-09 | National Institute Of Information & Communication Technology | コンピュータ検査システム、コンピュータ検査方法 |
JP2013196222A (ja) * | 2012-03-16 | 2013-09-30 | Fujitsu Ltd | 認証プログラム、情報処理装置、及び認証システム |
Non-Patent Citations (2)
Title |
---|
MASAKI KAMIZONO: "Categorizing Hostile JavaScript Using Abstract Syntax Tree Analysis", IPSJ JOURNAL, vol. 54, no. 1, 28 January 2013 (2013-01-28), pages 349 - 356, XP055232640 * |
See also references of EP3136277A4 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108604262A (zh) * | 2015-12-17 | 2018-09-28 | 耶德托公司 | 保护网页、网络应用程序和应用程序 |
JP2019502997A (ja) * | 2015-12-17 | 2019-01-31 | イルデト・ベー・フェー | ウェブページ、ウェブアプリ、およびアプリケーションをセキュリティ保護すること |
US10867016B2 (en) | 2015-12-17 | 2020-12-15 | Irdeto B.V. | Securing webpages, webapps and applications |
CN108604262B (zh) * | 2015-12-17 | 2022-07-12 | 耶德托公司 | 保护网页、网络应用程序和应用程序 |
US11675880B2 (en) | 2015-12-17 | 2023-06-13 | Irdeto B.V. | Securing webpages, webapps and applications |
JP2020187771A (ja) * | 2020-07-09 | 2020-11-19 | ブラザー工業株式会社 | 画像処理装置、及び通信装置 |
JP6992850B2 (ja) | 2020-07-09 | 2022-01-13 | ブラザー工業株式会社 | 画像処理装置、及び通信装置 |
KR20220100279A (ko) * | 2021-01-08 | 2022-07-15 | 주식회사 우아한형제들 | 로그인 강화 장치 및 방법 |
KR102483848B1 (ko) * | 2021-01-08 | 2023-02-07 | 주식회사 우아한형제들 | 로그인 강화 장치 및 방법 |
Also Published As
Publication number | Publication date |
---|---|
US20170048272A1 (en) | 2017-02-16 |
EP3136277B1 (en) | 2020-04-08 |
EP3136277A4 (en) | 2017-12-20 |
JP6438011B2 (ja) | 2018-12-12 |
CA2946695A1 (en) | 2015-10-29 |
EP3136277A1 (en) | 2017-03-01 |
CA2946695C (en) | 2021-05-04 |
JPWO2015162985A1 (ja) | 2017-04-13 |
US10469531B2 (en) | 2019-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6438011B2 (ja) | 不正検知ネットワークシステム及び、不正検知方法 | |
EP3219068B1 (en) | Method of identifying and counteracting internet attacks | |
JP4405248B2 (ja) | 通信中継装置、通信中継方法及びプログラム | |
US20160036849A1 (en) | Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies | |
US8312520B2 (en) | Methods and systems to detect attacks on internet transactions | |
US9584543B2 (en) | Method and system for web integrity validator | |
US10033761B2 (en) | System and method for monitoring falsification of content after detection of unauthorized access | |
KR20190026691A (ko) | 온라인 사기를 검출하기 위한 시스템 및 방법 | |
JP2013520719A (ja) | ウェブサービスのリアルタイム脆弱性診断及び結果情報提供サービスシステム | |
KR101429304B1 (ko) | 신뢰되지 않는 기계에 기밀 정보를 입력하기 위한 컴퓨터 구현 방법 | |
US20180302437A1 (en) | Methods of identifying and counteracting internet attacks | |
CN108259619A (zh) | 网络请求防护方法及网络通信系统 | |
CN106663176A (zh) | 检测装置、检测方法以及检测程序 | |
CN108028843A (zh) | 被动式web应用防火墙 | |
JP5656266B2 (ja) | ブラックリスト抽出装置、抽出方法および抽出プログラム | |
JP5661290B2 (ja) | 情報処理装置及び方法 | |
Fietkau et al. | The elephant in the background: A quantitative approachto empower users against web browser fingerprinting | |
Heiderich et al. | The bug that made me president a browser-and web-security case study on helios voting | |
JP6623128B2 (ja) | ログ分析システム、ログ分析方法及びログ分析装置 | |
JP6258189B2 (ja) | 特定装置、特定方法および特定プログラム | |
JP6488613B2 (ja) | 取引システム及びプログラム | |
JP5743822B2 (ja) | 情報漏洩防止装置及び制限情報生成装置 | |
JP7013297B2 (ja) | 不正検知装置、不正検知ネットワークシステム、及び不正検知方法 | |
KR101857060B1 (ko) | 웹사이트 수집 정보 기반 파밍 방지 방법 및 그 프로그램 | |
Delamore | An Extensible Web Application Vulnerability Assessment and Testing Framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15782770 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2016514755 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2946695 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15306685 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2015782770 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015782770 Country of ref document: EP |