[go: up one dir, main page]

CN104994092A - Service request processing method, terminal browser and anti-attack server - Google Patents

Service request processing method, terminal browser and anti-attack server Download PDF

Info

Publication number
CN104994092A
CN104994092A CN201510375370.8A CN201510375370A CN104994092A CN 104994092 A CN104994092 A CN 104994092A CN 201510375370 A CN201510375370 A CN 201510375370A CN 104994092 A CN104994092 A CN 104994092A
Authority
CN
China
Prior art keywords
attack
service request
browser
attack protection
webpage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510375370.8A
Other languages
Chinese (zh)
Other versions
CN104994092B (en
Inventor
杨谱
李智翔
张立志
翟万里
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201510375370.8A priority Critical patent/CN104994092B/en
Publication of CN104994092A publication Critical patent/CN104994092A/en
Application granted granted Critical
Publication of CN104994092B publication Critical patent/CN104994092B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention discloses a service request processing method, a terminal browser and an anti-attack server. The service request processing method implemented by a browser comprises the following steps: monitoring a service request generated on the basis of a currently-displayed webpage; if the service request is monitored, acquiring input behavior data recorded in the display process of the webpage; transmitting the input behavior data to the anti-attack server in order to obtain return information generated on the basis of an identification result after the anti-attack server performs attack behavior identification according to the input behavior data; and determining whether or not to initiate a service request to an application server providing the webpage according to the return information. Through the technical scheme provided by the embodiment of the invention, service request attacks triggered by non-human operation can be intercepted in time.

Description

Service request processing method, terminal browser and attack protection server
Technical field
The embodiment of the present invention relates to internet security technical field, particularly relates to service request processing method, terminal browser and attack protection server.
Background technology
Along with developing rapidly of development of Mobile Internet technology, the info web that application server can be supplied to user is also more and more abundanter, can enjoy service that is more, the more degree of depth to make user.For a webpage shown on terminal browser, wherein the information such as multiple assemblies can be comprised, after the clicking operation that user triggers certain assembly, one or more service request can be initiated to application server based on this operation, so that application server carries out Business Processing according to these requests, such as, issue other webpages.
But some disabled users are under the ordering about of illegitimate benefits, and Malware instrument usually can be used to perform a large amount of non-artificial clicking operation to the assembly in webpage, and repeatedly to submit service request to, application server is attacked.
For this reason, be necessary for application server and a kind of mechanism identified unartificial clicking operation is provided, so that relevant attack protection measure taked by application server.But existing mechanism normally identifies afterwards, be also namely all after the related service request response that terminal is initiated, judge that whether whole request process is unartificial operation triggering by analyzing responding result, can not intercept attack in time.
Summary of the invention
The embodiment of the present invention provides a kind of service request processing method, terminal browser and attack protection server, and the service request triggered can tackle unartificial operation is in time attacked.
On the one hand, embodiments provide a kind of service request processing method, the method comprises:
Monitor the service request produced based on current shown webpage;
If listen to described service request, then obtain the input behavior data recorded in described web page display process;
Described input behavior data are sent to attack protection server, carries out attack identification and the return information generated based on recognition result to obtain described attack protection server according to described input behavior data;
According to described return information, determine whether to providing the application server of described webpage to initiate described service request.
On the other hand, the embodiment of the present invention additionally provides a kind of service request processing method, and the method comprises:
The data that browser on receiving terminal sends, these data for described browser is after listening to the service request produced based on current shown webpage, the input behavior data recorded in described web page display process got;
Attack identification is carried out according to described input behavior data;
Generate return information based on recognition result, sending to described browser, determining whether to providing the application server of described webpage to initiate described service request according to described return information to indicate described browser.
Again on the one hand, the embodiment of the present invention additionally provides a kind of terminal browser, comprising:
Service request monitoring unit, for monitoring the service request produced based on current shown webpage;
Input behavior data capture unit, if for listening to described service request, then obtains the input behavior data recorded in described web page display process;
Input behavior data transmission unit, for described input behavior data are sent to attack protection server, carries out attack identification and the return information generated based on recognition result to obtain described attack protection server according to described input behavior data;
Service request initiates unit, for according to described return information, determines whether to providing the application server of described webpage to initiate described service request.
Again on the one hand, the embodiment of the present invention additionally provides a kind of attack protection server, comprising:
Input behavior data receipt unit, the data that browser on receiving terminal sends, these data for described browser listen to based on current shown webpage produce service request after, the input behavior data recorded in described web page display process got;
Attack recognition unit, for carrying out attack identification according to described input behavior data;
Return information transmitting element, for generating return information based on recognition result, sending to described browser, determining whether to providing the application server of described webpage to initiate described service request to indicate described browser according to described return information.
The technical scheme that the embodiment of the present invention provides, browser is after real-time listening to the service request produced based on current shown webpage, do not initiate this service request to application server immediately, but first by attack protection server, attack identification is carried out to this service request, browser determines whether to application server initiating business request based on this recognition result more afterwards, therefore, it is possible to tackled timely the service request with attack that browser produces, attack to prevent its application server, alleviate the service request processing load of application server.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention two provides;
Fig. 3 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention three provides;
Fig. 4 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention four provides;
Fig. 5 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention five provides;
Fig. 6 is the structural representation of a kind of terminal browser that the embodiment of the present invention six provides;
Fig. 7 is the structural representation of a kind of attack protection server that the embodiment of the present invention seven provides;
The signaling process figure of the service request processing method that Fig. 8 provides for the embodiment of the present invention eight.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not entire infrastructure.
Before in further detail exemplary embodiment being discussed, it should be mentioned that some exemplary embodiments are described as the process or method described as flow chart.Although operations (or step) is described as the process of order by flow chart, many operations wherein can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be rearranged.Described process can be terminated when its operations are completed, but can also have the additional step do not comprised in the accompanying drawings.Described process can correspond to method, function, code, subroutine, subprogram etc.
Also it should be mentioned that and to replace in implementation at some, the function/action mentioned can according to being different from occurring in sequence of indicating in accompanying drawing.For example, depend on involved function/action, in fact each width figure in succession illustrated can perform simultaneously or sometimes can perform according to contrary order substantially.
Embodiment one
Fig. 1 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention one provides.The present embodiment is applicable to the network architecture be made up of terminal browser, application server and attack protection server.The method can be performed by the browser in terminal, and described terminal can be the electronic equipment that such as notebook computer, desktop computer etc. have mouse input and web page browsing function.See Fig. 1, the service request processing method that the present embodiment provides specifically comprises following operation:
Operate 110, monitor the service request produced based on current shown webpage.
The webpage shown can be acquired from application server by browser.At least one assembly is included in webpage.After the trigger event getting random component in webpage, browser can produce one or more service request (being also HTTP request) initiated to application server based on this trigger event, and application server is receiving the laggard line correlation Business Processing of these service request.Under normal conditions, the assembly that the trigger event of assembly is clicked in shown webpage by user is produced.But in some cases .., described trigger event also may be by the assembly clicked with aggressive robot in the webpage shown, or adopts other attack meanses and produce.So the service request produced based on described trigger event is likely just also the request with attack.
For this reason, the present embodiment provides a kind of mechanism, with the service request making browser real-time listening produce based on current shown webpage, if after listening to, and initiate this service request not directly to application server, but first by attack protection server, attack identification is carried out to this service request, determine whether again to application server initiating business request based on recognition result afterwards.
In the present embodiment, the service request monitored can be each service request produced because of the trigger event to random component in webpage.Consider that whether some service request are the request of attack, application server is unimportant, or because some other reason, each service request that all component in webpage produces need not be monitored, so preferred, the service request of monitoring comprises: the some or all service request produced by triggering assignment component in the webpage shown.
If operation 120 listens to service request, then obtain the input behavior data recorded in web page display process.
Exemplary, terminal is the electronic equipment (such as notebook computer) of mouse input form.Browser-presented webpage in terminal is to after user, and user can, with the distinctive mode operating mouse of a kind of people, to make mouse arrive corresponding assembly place in the webpage shown, and use mouse to click this assembly, and then the generation of trigger business request.Such as, under the peculiar mode of people, the lines of the motion track composition of mouse are mixed and disorderly curves, and some coordinate points in track repeat; In addition, the acceleration of rolling mouse does not also fix (normally first accelerating to slow down) again, and traveling time is consuming time longer; Etc..And for robot, be then that mouse beacon arrives corresponding assembly place with fixing acceleration, this process is very quick, and the lines normally straight line of the motion track of mouse composition, the coordinate points in track can not repeat; Or robot clicks modularity not by mouse beacon and produces service request, but crack means with certain and directly produce trigger event to random component in webpage.
For this reason, the input behavior data recorded in web page display process can be captured in browser side, carry out attack identification to make attack protection server according to input behavior data.Wherein, input behavior data comprise: the motion track of mouse and/or the mouse click coordinate of trigger business request in terminal.Certainly, time point during each coordinate points that mouse moves in track can also be comprised.It should be noted that, in embodiments of the present invention, mouse all refers to display mouse pointer on a terminal screen.
Operate 130, input behavior data are sent to attack protection server, carry out attack identification and the return information generated based on recognition result to obtain attack protection server according to input behavior data.
Operating 140, according to return information, determining whether the application server initiating business request to providing webpage.
As a kind of specific implementation, if return information is recognition result is the first indication information corresponding to non-attack behavior, then initiate the service request listened to application server;
If return information is recognition result is authorization information corresponding to attack, then obtain the checking feedback of input, attack protection server is sent to verify, and after receiving the second indication information that attack protection server generates based on verification succeeds result, initiate the service request listened to application server.
As another kind of specific implementation, if return information is recognition result is the first indication information corresponding to non-attack behavior, then initiate the service request listened to application server; If return information is recognition result is the 3rd indication information corresponding to attack, then masks listened to service request, refuse to send to application server.
In the scheme that the present embodiment provides, browser is after real-time listening to the service request produced based on current shown webpage, and initiate this service request not directly to application server, but first by attack protection server, attack identification is carried out to this service request, determine whether to application server initiating business request again based on recognition result afterwards, thus can the produce service request with attack be tackled timely, to prevent its application server from attacking, alleviate the service request processing load of application server.
Embodiment two
Fig. 2 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention two provides.The present embodiment, on the basis of above-described embodiment one, adds the operation obtaining attack protection monitor code.The method that the present embodiment provides still can be performed by the browser in terminal.See Fig. 2, the method that the present embodiment provides specifically comprises following operation:
Operate 210, access and show the webpage that application server provides.
Operate 220, according to the attack protection service interface configured in webpage and code resource mark, obtain the attack protection monitor code of webpage from attack protection server.
Browser access to webpage in be configured with attack protection service interface and code resource mark.Wherein, code resource is designated unique character string identifying the attack protection monitor code of webpage, and it can be handed down to application server by attack protection server after generating the attack protection monitor code corresponding to webpage, is then built in webpage by application server.Like this, browser, after getting the webpage that application server provides, according to the attack protection service interface configured in webpage and code resource mark, can get the attack protection monitor code of webpage from attack protection server.Afterwards, browser is by running this code, the subsequent operation of finishing service request processing method.
Exemplary, operation 220 comprises: initiate attack protection monitor code based on attack protection service interface to attack protection server and obtain request, include code resource mark in this request; The attack protection monitor code of the webpage arrived according to code resource identifier lookup receiving that attack protection server returns.
Operate 230, monitor the service request produced based on current shown webpage.
If operation 240 listens to service request, then obtain the input behavior data recorded in web page display process.
Operate 250, input behavior data are sent to attack protection server, carry out attack identification and the return information generated based on recognition result to obtain attack protection server according to input behavior data.
Operate 260, according to return information, determine whether to application server initiating business request.
Certainly, those of ordinary skill in the art should be understood that application server also directly in webpage, can embed the attack protection monitor code that attack protection server is auto-building html files.Like this, browser is after getting the webpage that application server provides, and the attack protection monitor code that can configure in extracting directly webpage, afterwards by running this code, the subsequent operation of finishing service request processing method.
But, because attack protection monitor code amount is larger, in the scheme that the present embodiment provides, do not adopt the technological means in attack protection monitor code embedded web page, the loading velocity of browser to webpage can not only be accelerated like this, very fast by web page display to user, and to perform the work of attack protection monitor code embedded web page without the need to application server, alleviate its burden.
On the basis of such scheme, the service request processing method performed by browser that the present embodiment provides, also comprise: obtain the attack protection monitor code of webpage from attack protection server while, obtain the cryptographic algorithm that attack protection server dynamically generates, cryptographic algorithm is used for the encryption communicated between browser with attack protection server.
Embodiment three
Fig. 3 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention three provides.The present embodiment is still applicable to the network architecture be made up of terminal browser, application server and attack protection server.The method can be performed by attack protection server, can coordinate perform with the service request processing method realized by terminal browser that any embodiment of the present invention provides.Attack protection server, as the third party's physical equipment providing attack protection to serve for application server, at terminal browser before application server initiating business request, can carry out attack protection monitoring to service request.See Fig. 3, the service request processing method that the present embodiment provides specifically comprises following operation:
The data that operation 310, browser on receiving terminal send, these data for browser is after listening to the service request produced based on current shown webpage, the input behavior data recorded in web page display process got.
Operate 320, carry out attack identification according to input behavior data.
Wherein, input behavior data comprise: the motion track of mouse and/or the mouse click coordinate of trigger business request in terminal.Certainly, time point during each coordinate points that mouse moves in track can also be comprised.
Concrete, default attack recognizer can be adopted, resolve input behavior data, to carry out attack identification.Exemplary, if resolve obtain in following result at least two: the mouse click coordinate of trigger business request is the coordinate of assignment component position, to be some coordinate points met in default mixed and disorderly curve, motion track be the lines of the motion track of mouse composition repeats, the acceleration of rolling mouse is fixing and mouse traveling time exceedes default mobile duration, then identifying this service request listened to of browser is the request of attack, determines that recognition result is attack.Otherwise, then identify the request that this service request listened to of browser is not attack, determine that recognition result is non-attack behavior.
Operate 330, generate return information based on recognition result, sending to browser, determining whether the application server initiating business request to providing webpage to indicate browser according to return information.
Concrete, if recognition result is non-attack behavior, then generates the first corresponding indication information, send to browser, to indicate browser after receiving the first indication information, to the application server initiating business request providing webpage.
Exemplary, if recognition result is attack, then can enable authentication mechanism, the service request that the browser in terminal listens to is verified, and adopt the result to revise this attack recognition result.Certainly, also authentication mechanism can not be enabled, obtaining after recognition result is attack, directly generate the 3rd corresponding indication information, send to browser, to indicate browser after receiving the 3rd indication information, masking the service request that this listens to, refusing the application server initiating business request to providing webpage.
The technical scheme that the present embodiment provides, can realize attack protection server to browser real-time listening to service request carry out attack identification, and generate corresponding return information, thus make browser can based on the return information received, determine whether to application server initiating business request, therefore, it is possible to tackled in time the service request with attack that browser produces, to prevent its application server from attacking, alleviate the service request processing load of application server.
Embodiment four
Fig. 4 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention four provides.The present embodiment, on the basis of above-described embodiment three, does further optimization to operation 330, and the method still can be performed by attack protection server.See Fig. 4, the method that the present embodiment provides specifically comprises following operation:
The data that operation 410, browser on receiving terminal send, these data for browser is after listening to the service request produced based on current shown webpage, the input behavior data recorded in web page display process got.
Operate 420, carry out attack identification according to input behavior data.
If recognition result is non-attack behavior, then executable operations 430; If recognition result is attack, then executable operations 440-operation 460.
First indication information of operation 430, generation correspondence, sends to browser, initiates described service request to indicate browser after receiving the first indication information to application server.
The authorization information of operation 440, generation correspondence, sends to browser.
Operate 450, the checking feedback that browser returns according to described authorization information is verified.
Exemplary, authorization information is the checking picture including identifying code; Checking feedback is verified, comprising: checking feedback is mated with identifying code; If coupling is consistent, then verification succeeds, otherwise verifies unsuccessfully.Or
Authorization information is the checking picture including the contents such as problem, the correct option corresponding with problem, interference answer; Checking feedback is verified, comprising: checking feedback is resolved, to obtain from the answer selected in authorization information; Whether the answer selected by checking is the correct option corresponding with problem; If so, then verification succeeds, otherwise verify unsuccessfully.
Operate 460, after verification succeeds, issue the second indication information to browser, after receiving the second indication information, initiate described service request to application server to indicate browser.
If verification succeeds, then show that this attack identification makes a mistake, this service request listened to of browser is not the request of attack.As a kind of preferred implementation, the service request processing method that the present embodiment proposes, also comprises: attack protection server, after verification succeeds, revises this attack recognition result, and is optimized attack Activity recognition algorithm based on correction operation.Concrete correction operation comprises: the attack recognition result obtained is revised as non-attack Activity recognition result.
Preferably, if verify unsuccessfully, then show that this attack identification is correct, the request of the attack really of this service request listened to of browser, accordingly, attack protection server can issue the 3rd indication information to browser, to indicate browser after receiving the 3rd indication information, mask described service request, refuse to initiate described service request to application server.
The technical scheme that the present embodiment provides, obtaining after recognition result is attack, authentication mechanism can be enabled again verify the service request that browser listens to, whether to examine this service request really for attack, thus effectively can ensure the accuracy of attack protection identification, strengthen the fail safe of application server; Further, obtaining after recognition result is non-attack behavior, directly issues the execution information allowing browser to application server initiating business request, and verifying without the need to user's input information, therefore can accelerate the speed of initiating business request, promote Consumer's Experience.
Embodiment five
Fig. 5 is the schematic flow sheet of a kind of service request processing method that the embodiment of the present invention five provides.The present embodiment is on the basis of above-described embodiment three and embodiment four, and add the operation issuing attack protection monitor code, the method still can be performed by attack protection server.See Fig. 5, the method that the present embodiment provides specifically comprises following operation:
The attack protection monitor code that browser in operation 510, receiving terminal is initiated according to the attack protection service interface configured in current shown webpage and code resource mark obtains request.
Operation 520, obtain request according to attack protection monitor code, search and obtain the attack protection monitor code of described webpage, returning to browser.
The data that operation 530, browser on receiving terminal send, these data be browser after listening to the service request produced based on described webpage, the input behavior data recorded in described web page display process got;
Operate 540, carry out attack identification according to input behavior data;
Operate 550, generate return information based on recognition result, sending to browser, determining whether to providing the application server of described webpage to initiate described service request according to return information to indicate browser.
In the present embodiment, application server can ask attack protection server for attack protection monitor code corresponding to its auto-building html files provided in advance.Therefore, attack protection server is before executable operations 510, also comprise: the attack protection monitor code that reception application server sends generates request, this request comprises the uniform resource identifier (URL, Uniform Resoure Locator) of webpage and needs the service request of monitoring; According to described generation request, generate corresponding attack protection monitor code, and the character string of stochastic generation this code of unique identification; This character string is identified as code resource, is handed down to application server, to indicate application server, attack protection service interface and code resource mark are configured in webpage.
Wherein, the service request that needs are monitored is: the some or all service request produced by random component in trigger web pages or assignment component.According to generation request, generate corresponding attack protection monitor code, comprise: html (the Hypertext Markup Language of the webpage that the URL that acquisition comprises in generating and asking is corresponding, HTML) code, according to html code and the service request generating the needs monitoring comprised in request, generate corresponding attack protection monitor code.
Attack protection server, receiving after attack protection monitor code that browser sends obtains request, can extract wherein comprised code resource mark, and gets corresponding attack protection monitor code according to this identifier lookup.
As a kind of preferred implementation, the method that the present embodiment provides also comprises: dynamically generate cryptographic algorithm, and this cryptographic algorithm is used for the encryption communicated between browser with attack protection server; While attack protection monitor code is returned to browser, described cryptographic algorithm is returned to browser.Cryptographic algorithm generates in a dynamic fashion, is replaced frequently, instead of adopts the fixing cryptographic algorithm generated in advance, and considerably increase attack difficulty, the service request treatment mechanism that can effectively prevent the present embodiment from providing is cracked.
Consider some Malware instruments, still likely crack the method for processing business that invention the present embodiment provides, for ensureing safety further, on the basis of technique scheme, attack protection server is after carrying out attack identification according to described input behavior data, also comprise: if recognition result is non-attack behavior, then described recognition result is sent to application server, respond described service request to indicate application server according to recognition result.If application server is after this service request listened to receiving browser transmission, does not receive the recognition result for non-attack behavior that attack protection server sends within a preset time interval, then refuse to respond this service request.
Embodiment six
Fig. 6 is the structural representation of a kind of terminal browser that the embodiment of the present invention six provides.See Fig. 6, the concrete structure of this browser is as follows:
Service request monitoring unit 610, for monitoring the service request produced based on current shown webpage;
Input behavior data capture unit 620, if listen to described service request for described service request monitoring unit 610, then obtains the input behavior data recorded in described web page display process;
Input behavior data transmission unit 630, for described input behavior data are sent to attack protection server, carries out attack identification and the return information generated based on recognition result to obtain described attack protection server according to described input behavior data;
Service request initiates unit 640, for according to described return information, determines whether to providing the application server of described webpage to initiate described service request.
Exemplary, described service request initiates unit 640, specifically for:
If described return information is recognition result is the first indication information corresponding to non-attack behavior, then initiate described service request to described application server;
If described return information is recognition result is authorization information corresponding to attack, then obtain the checking feedback of input, described attack protection server is sent to verify, and after receiving the second indication information that described attack protection server generates based on verification succeeds result, initiate described service request to providing described application server.
Exemplary, the browser that the present embodiment provides also comprises attack protection monitor code acquiring unit 600, for:
Before monitoring at described service request monitoring unit 610 service request produced based on current shown webpage, access and show the described webpage that described application server provides;
According to the attack protection service interface configured in described webpage and code resource mark, obtain the attack protection monitor code of described webpage from attack protection server.
Exemplary, described attack protection monitor code acquiring unit 600, also for:
Obtain the attack protection monitor code of described webpage from described attack protection server while, obtain the cryptographic algorithm that described attack protection server dynamically generates, described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server.
On the basis of technique scheme, described input behavior data comprise: in described terminal mouse motion track and/or trigger the mouse click coordinate of described service request.
The service request monitored comprises: the some or all service request produced by triggering assignment component in described webpage.
The said goods can perform the service request processing method performed by the browser in terminal that any embodiment of the present invention provides, and possesses the corresponding functional module of manner of execution and beneficial effect.The ins and outs do not described in detail in the present embodiment, the service request processing method performed by the browser in terminal that can provide see any embodiment of the present invention.
Embodiment seven
Fig. 7 is the structural representation of a kind of attack protection server that the embodiment of the present invention seven provides.See Fig. 7, the concrete structure of this attack protection server is as follows:
Input behavior data receipt unit 710, the data that browser on receiving terminal sends, these data for described browser listen to based on current shown webpage produce service request after, the input behavior data recorded in described web page display process got;
Attack recognition unit 720, for carrying out attack identification according to described input behavior data;
Return information transmitting element 730, for generating return information based on recognition result, sending to described browser, determining whether to providing the application server of described webpage to initiate described service request to indicate described browser according to described return information.
Exemplary, described return information transmitting element 730, specifically for:
If the recognition result that described attack recognition unit 720 obtains is non-attack behavior, then generate the first corresponding indication information, send to described browser, after receiving described first indication information, initiate described service request to described application server to indicate described browser;
If the recognition result that described attack recognition unit 720 obtains is attack, then generate corresponding authorization information, send to described browser, and the checking feedback that described browser returns according to described authorization information is verified, after verification succeeds, issue the second indication information to described browser, after receiving described second indication information, initiate described service request to described application server to indicate described browser.
Exemplary, the attack protection server that the present embodiment provides also comprises: identify and optimize unit 740, for after described return information transmitting element 730 verification succeeds, revise this attack recognition result, and based on correction operation, attack Activity recognition algorithm is optimized.
Exemplary, the attack protection server that the present embodiment provides also comprises attack protection monitor code and issues unit 700, for:
Before the data that browser on described input behavior data receipt unit 710 receiving terminal sends, receive the attack protection monitor code acquisition request that described browser is initiated according to the attack protection service interface configured in described webpage and code resource mark;
Obtain request according to attack protection monitor code, search and obtain the attack protection monitor code of described webpage, returning to described browser.
Exemplary, described attack protection monitor code issues unit 700, also for:
Dynamic generation cryptographic algorithm, described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server;
While described attack protection monitor code is returned to described browser, described cryptographic algorithm is returned to described browser.
On the basis of technique scheme, the attack protection server that the present embodiment provides also comprises:
Recognition result transmitting element 750, after carrying out attack identification at described attack recognition unit 720 according to described input behavior data, if the recognition result obtained is non-attack behavior, then described recognition result is sent to described application server, respond described service request to indicate described application server according to recognition result.
Described input behavior data comprise following at least one item number certificate: in described terminal mouse motion track and/or trigger the mouse click coordinate of described service request.
The said goods can perform the service request processing method performed by attack protection server that any embodiment of the present invention provides, and possesses the corresponding functional module of manner of execution and beneficial effect.The ins and outs do not described in detail in the present embodiment, the service request processing method performed by attack protection server that can provide see any embodiment of the present invention.
Embodiment eight
The signaling process figure of the service request processing method that Fig. 8 provides for the embodiment of the present invention eight.The present embodiment based on above-mentioned all embodiments, can provide a kind of preferred embodiment.See Fig. 8, the method that the present embodiment provides specifically comprises following operation:
Browser in operation 801, terminal sends webpage to application server and obtains request, to access described webpage.
Operation 802, application server, by obtaining the webpage asking to find according to webpage, return to browser.
Operation 803, browser-presented webpage.
The attack protection service interface and code resource mark that configure in webpage are extracted in operation 804, browser.
Operation 805, browser, based on attack protection service interface, are initiated attack protection monitor code to attack protection server and are obtained request, and this request comprises code resource mark.
Operation 806, attack protection server, by the attack protection monitor code identifying the webpage got according to code resource and the cryptographic algorithm dynamically generated, return to browser.
Cryptographic algorithm is used for the encryption communicated between browser with attack protection server.
Browser, by running the attack protection monitor code of the webpage received, performs the operation of the follow-up service request processing method performed by browser.
Operation 807, browser record input behavior data in web page display process.
Operation 808, browser listen to the setting service request produced based on current shown webpage.
Setting service request is: the some or all service request produced by assignment component in trigger web pages.
The input behavior data of record are sent to attack protection server by operation 809, browser.
Operation 810, attack protection server carry out attack identification according to input behavior data.
If recognition result is non-attack behavior, executable operations 811; If recognition result is attack, enable authentication mechanism, executable operations 812-operation 816.
Operation 811, attack protection server generate the first corresponding indication information, send to browser.Executable operations 817.
Operation 812, attack protection server generate corresponding authorization information, send to browser.
Operation 813, browser display authorization information, obtain the checking feedback of input.
Checking feedback is sent to attack protection server by operation 814, browser.
Operation 815, attack protection server verify checking feedback.
If operation 816 verification succeeds, then attack protection recognition result is modified to non-attack behavior by attack protection server, and generates the second corresponding indication information, sends to browser.Executable operations 817.
Preferably, if verify unsuccessfully, then attack protection server generates corresponding authentication failed indication information, sends to browser; Browser, after receiving authentication failed indication information, masks listened to setting service request, refuses to send to application server, process ends.
Operation 817, browser after receiving the first indication information or the second indication information, to application server initiating business request.
Operation 818, application server send the request obtaining recognition result to attack protection server.
Operation 819, attack protection server return recognition result.
Operation 820, application server determine whether response setting service request according to recognition result.
Concrete, if recognition result is non-attack behavior, then response setting service request; If recognition result is attack, then refuse to respond setting service request.
The technical scheme tool that the present embodiment provides has the following advantages: can distinguish whether be attack in real time, the service request of timely intercept attack behavior, increases procedural freedom degree, alleviates application server burden; Cryptographic algorithm is random, frequently changes, and increases and attacks difficulty; For attack, automatically start identifying code, protection application server.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.

Claims (23)

1. a service request processing method, is characterized in that, is applied to the browser in terminal, comprises:
Monitor the service request produced based on current shown webpage;
If listen to described service request, then obtain the input behavior data recorded in described web page display process;
Described input behavior data are sent to attack protection server, carries out attack identification and the return information generated based on recognition result to obtain described attack protection server according to described input behavior data;
According to described return information, determine whether to providing the application server of described webpage to initiate described service request.
2. method according to claim 1, is characterized in that, according to described return information, determines whether, to providing the application server of described webpage to initiate described service request, to comprise:
If described return information is recognition result is the first indication information corresponding to non-attack behavior, then initiate described service request to described application server;
If described return information is recognition result is authorization information corresponding to attack, then obtain the checking feedback of input, described attack protection server is sent to verify, and after receiving the second indication information that described attack protection server generates based on verification succeeds result, initiate described service request to described application server.
3. method according to claim 1, is characterized in that, before monitoring the service request produced based on current shown webpage, also comprises:
Access and show the described webpage that described application server provides;
According to the attack protection service interface configured in described webpage and code resource mark, obtain the attack protection monitor code of described webpage from attack protection server.
4. method according to claim 3, is characterized in that, also comprises:
Obtain the attack protection monitor code of described webpage from described attack protection server while, obtain the cryptographic algorithm that described attack protection server dynamically generates, described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server.
5. the method according to any one of claim 1-4, is characterized in that, described input behavior data comprise: in described terminal mouse motion track and/or trigger the mouse click coordinate of described service request.
6. the method according to any one of claim 1-4, is characterized in that, the service request monitored comprises: the some or all service request produced by triggering assignment component in described webpage.
7. a service request processing method, is characterized in that, is applied to attack protection server, comprises:
The data that browser on receiving terminal sends, these data for described browser is after listening to the service request produced based on current shown webpage, the input behavior data recorded in described web page display process got;
Attack identification is carried out according to described input behavior data;
Generate return information based on recognition result, sending to described browser, determining whether to providing the application server of described webpage to initiate described service request according to described return information to indicate described browser.
8. method according to claim 7, is characterized in that, generates return information, send to described browser, to indicate described browser to determine whether to initiate described service request to described application server according to described return information, comprising based on recognition result:
If recognition result is non-attack behavior, then generates the first corresponding indication information, send to described browser, after receiving described first indication information, initiate described service request to described application server to indicate described browser;
If recognition result is attack, then generate corresponding authorization information, send to described browser, and the checking feedback that described browser returns according to described authorization information is verified, after verification succeeds, issue the second indication information to described browser, after receiving described second indication information, initiate described service request to described application server to indicate described browser.
9. method according to claim 8, is characterized in that, also comprises: after verification succeeds, revises this attack recognition result, and is optimized attack Activity recognition algorithm based on correction operation.
10. method according to claim 7, is characterized in that, before the data that the browser on receiving terminal sends, also comprises:
Receive the attack protection monitor code acquisition request that described browser is initiated according to the attack protection service interface configured in described webpage and code resource mark;
Obtain request according to attack protection monitor code, search and obtain the attack protection monitor code of described webpage, returning to described browser.
11. methods according to claim 10, is characterized in that, also comprise: dynamically generate cryptographic algorithm, and described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server;
While described attack protection monitor code is returned to described browser, described cryptographic algorithm is returned to described browser.
12. methods according to any one of claim 7-11, it is characterized in that, described input behavior data comprise: in described terminal mouse motion track and/or trigger the mouse click coordinate of described service request.
13. methods according to any one of claim 7-11, is characterized in that, after carrying out attack identification according to described input behavior data, also comprise:
If recognition result is non-attack behavior, then described recognition result is sent to described application server, respond described service request to indicate described application server according to recognition result.
14. 1 kinds of terminal browser, is characterized in that, comprising:
Service request monitoring unit, for monitoring the service request produced based on current shown webpage;
Input behavior data capture unit, if listen to described service request for described service request monitoring unit, then obtains the input behavior data recorded in described web page display process;
Input behavior data transmission unit, for described input behavior data are sent to attack protection server, carries out attack identification and the return information generated based on recognition result to obtain described attack protection server according to described input behavior data;
Service request initiates unit, for according to described return information, determines whether to providing the application server of described webpage to initiate described service request.
15. browsers according to claim 14, is characterized in that, described service request initiates unit, specifically for:
If described return information is recognition result is the first indication information corresponding to non-attack behavior, then initiate described service request to described application server;
If described return information is recognition result is authorization information corresponding to attack, then obtain the checking feedback of input, described attack protection server is sent to verify, and after receiving the second indication information that described attack protection server generates based on verification succeeds result, initiate described service request to described application server.
16. browsers according to claim 14, is characterized in that, also comprise attack protection monitor code acquiring unit, for:
Before monitoring at described service request monitoring unit the service request produced based on current shown webpage, access and show the described webpage that described application server provides;
According to the attack protection service interface configured in described webpage and code resource mark, obtain the attack protection monitor code of described webpage from attack protection server.
17. browsers according to claim 16, is characterized in that, described attack protection monitor code acquiring unit, also for:
Obtain the attack protection monitor code of described webpage from described attack protection server while, obtain the cryptographic algorithm that described attack protection server dynamically generates, described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server.
18. 1 kinds of attack protection servers, is characterized in that, comprising:
Input behavior data receipt unit, the data that browser on receiving terminal sends, these data for described browser listen to based on current shown webpage produce service request after, the input behavior data recorded in described web page display process got;
Attack recognition unit, for carrying out attack identification according to described input behavior data;
Return information transmitting element, for generating return information based on recognition result, sending to described browser, determining whether to providing the application server of described webpage to initiate described service request to indicate described browser according to described return information.
19. attack protection servers according to claim 18, is characterized in that, described return information transmitting element, specifically for:
If the recognition result that described attack recognition unit obtains is non-attack behavior, then generate the first corresponding indication information, send to described browser, after receiving described first indication information, initiate described service request to described application server to indicate described browser;
If the recognition result that described attack recognition unit obtains is attack, then generate corresponding authorization information, send to described browser, and the checking feedback that described browser returns according to described authorization information is verified, after verification succeeds, issue the second indication information to described browser, after receiving described second indication information, initiate described service request to described application server to indicate described browser.
20. attack protection servers according to claim 19, it is characterized in that, also comprise: identify and optimize unit, for after described return information transmitting element verification succeeds, revise this attack recognition result, and based on correction operation, attack Activity recognition algorithm is optimized.
21. attack protection servers according to claim 18, is characterized in that, also comprise attack protection monitor code and issue unit, for:
Before the data that browser on described input behavior data receipt unit receiving terminal sends, receive the attack protection monitor code acquisition request that described browser is initiated according to the attack protection service interface configured in described webpage and code resource mark;
Obtain request according to attack protection monitor code, search and obtain the attack protection monitor code of described webpage, returning to described browser.
22. attack protection servers according to claim 21, is characterized in that, described attack protection monitor code issues unit, also for:
Dynamic generation cryptographic algorithm, described cryptographic algorithm is used for the encryption communicated between described browser with described attack protection server;
While described attack protection monitor code is returned to described browser, described cryptographic algorithm is returned to described browser.
23. attack protection servers according to any one of claim 18-22, is characterized in that, also comprise:
Recognition result transmitting element, after carrying out attack identification at described attack recognition unit according to described input behavior data, described recognition result is sent to described application server, determines whether to respond described service request according to recognition result to indicate described application server.
CN201510375370.8A 2015-06-30 2015-06-30 Service request processing method, terminal browser and attack protection server Active CN104994092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510375370.8A CN104994092B (en) 2015-06-30 2015-06-30 Service request processing method, terminal browser and attack protection server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510375370.8A CN104994092B (en) 2015-06-30 2015-06-30 Service request processing method, terminal browser and attack protection server

Publications (2)

Publication Number Publication Date
CN104994092A true CN104994092A (en) 2015-10-21
CN104994092B CN104994092B (en) 2018-11-06

Family

ID=54305844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510375370.8A Active CN104994092B (en) 2015-06-30 2015-06-30 Service request processing method, terminal browser and attack protection server

Country Status (1)

Country Link
CN (1) CN104994092B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376251A (en) * 2015-12-02 2016-03-02 华侨大学 Intrusion detection method and intrusion detection system based on cloud computing
CN106230855A (en) * 2016-08-30 2016-12-14 五八同城信息技术有限公司 Request message treatment method and device
CN107220543A (en) * 2017-05-31 2017-09-29 北京京东尚科信息技术有限公司 The method and apparatus for handling the service request of mobile terminal
CN108460269A (en) * 2018-03-21 2018-08-28 广州多益网络股份有限公司 Verification method and device, verification terminal device
CN108495272A (en) * 2018-03-19 2018-09-04 上海哔哩哔哩科技有限公司 Robot recognition methods, system and storage medium based on HTML5 browsers
CN108512808A (en) * 2017-02-24 2018-09-07 贵州白山云科技有限公司 A kind of malicious requests hold-up interception method and system improving access response speed
CN109407947A (en) * 2018-09-30 2019-03-01 北京金山云网络技术有限公司 Interface alternation and its verification method, logging request generation and verification method and device
CN110266727A (en) * 2019-07-09 2019-09-20 中国工商银行股份有限公司 Recognition methods, server and the client of simulation browser behavior
CN110909353A (en) * 2019-11-28 2020-03-24 网易(杭州)网络有限公司 Plug-in detection method and device
CN111489184A (en) * 2019-01-29 2020-08-04 北京京东尚科信息技术有限公司 Method, device, server, client and medium for verifying click behavior
CN111641588A (en) * 2020-04-28 2020-09-08 深圳壹账通智能科技有限公司 Webpage analog input detection method and device, computer equipment and storage medium
WO2020199163A1 (en) * 2019-04-03 2020-10-08 Citrix Systems, Inc. Systems and methods for protecting remotely hosted application from malicious attacks
CN113360812A (en) * 2016-03-07 2021-09-07 创新先进技术有限公司 Service execution method and device
CN118138330A (en) * 2024-03-19 2024-06-04 北京安胜华信科技有限公司 Man-machine behavior detection method and system based on mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102737019A (en) * 2011-03-31 2012-10-17 阿里巴巴集团控股有限公司 Machine behavior determining method, webpage browser and webpage server
CN103218431A (en) * 2013-04-10 2013-07-24 金军 System and method for identifying and automatically acquiring webpage information
US8578482B1 (en) * 2008-01-11 2013-11-05 Trend Micro Inc. Cross-site script detection and prevention

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578482B1 (en) * 2008-01-11 2013-11-05 Trend Micro Inc. Cross-site script detection and prevention
CN102737019A (en) * 2011-03-31 2012-10-17 阿里巴巴集团控股有限公司 Machine behavior determining method, webpage browser and webpage server
CN103218431A (en) * 2013-04-10 2013-07-24 金军 System and method for identifying and automatically acquiring webpage information

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376251A (en) * 2015-12-02 2016-03-02 华侨大学 Intrusion detection method and intrusion detection system based on cloud computing
CN113360812B (en) * 2016-03-07 2024-02-06 创新先进技术有限公司 Service execution method and device
CN113360812A (en) * 2016-03-07 2021-09-07 创新先进技术有限公司 Service execution method and device
CN106230855A (en) * 2016-08-30 2016-12-14 五八同城信息技术有限公司 Request message treatment method and device
CN108512808A (en) * 2017-02-24 2018-09-07 贵州白山云科技有限公司 A kind of malicious requests hold-up interception method and system improving access response speed
CN108512808B (en) * 2017-02-24 2019-05-31 北京数安鑫云信息技术有限公司 A kind of malicious requests hold-up interception method and system improving access response speed
CN107220543B (en) * 2017-05-31 2020-11-24 北京京东尚科信息技术有限公司 Method and device for processing service request of mobile terminal
CN107220543A (en) * 2017-05-31 2017-09-29 北京京东尚科信息技术有限公司 The method and apparatus for handling the service request of mobile terminal
CN108495272A (en) * 2018-03-19 2018-09-04 上海哔哩哔哩科技有限公司 Robot recognition methods, system and storage medium based on HTML5 browsers
CN108460269A (en) * 2018-03-21 2018-08-28 广州多益网络股份有限公司 Verification method and device, verification terminal device
CN109407947A (en) * 2018-09-30 2019-03-01 北京金山云网络技术有限公司 Interface alternation and its verification method, logging request generation and verification method and device
CN111489184A (en) * 2019-01-29 2020-08-04 北京京东尚科信息技术有限公司 Method, device, server, client and medium for verifying click behavior
WO2020199163A1 (en) * 2019-04-03 2020-10-08 Citrix Systems, Inc. Systems and methods for protecting remotely hosted application from malicious attacks
CN113632080A (en) * 2019-04-03 2021-11-09 思杰系统有限公司 System and method for protecting remotely hosted applications from malicious attacks
US11347842B2 (en) 2019-04-03 2022-05-31 Citrix Systems, Inc. Systems and methods for protecting a remotely hosted application from malicious attacks
CN110266727A (en) * 2019-07-09 2019-09-20 中国工商银行股份有限公司 Recognition methods, server and the client of simulation browser behavior
CN110909353A (en) * 2019-11-28 2020-03-24 网易(杭州)网络有限公司 Plug-in detection method and device
CN111641588A (en) * 2020-04-28 2020-09-08 深圳壹账通智能科技有限公司 Webpage analog input detection method and device, computer equipment and storage medium
CN118138330A (en) * 2024-03-19 2024-06-04 北京安胜华信科技有限公司 Man-machine behavior detection method and system based on mobile terminal
CN118138330B (en) * 2024-03-19 2024-11-19 北京安胜华信科技有限公司 Man-machine behavior detection method and system based on mobile terminal

Also Published As

Publication number Publication date
CN104994092B (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN104994092A (en) Service request processing method, terminal browser and anti-attack server
US10657243B2 (en) Variation analysis-based public turing test to tell computers and humans apart
CN104144419B (en) Identity authentication method, device and system
JP6879367B2 (en) Attack status visualization device, attack status visualization method and program
CN107451472B (en) Form verification method, device and system
CN103139138B (en) A kind of application layer denial of service means of defence based on client detection and system
US11810014B2 (en) Systems, methods and apparatus for evaluating status of computing device user
CN102739663A (en) Detection method and scanning engine of web pages
KR101369743B1 (en) Apparatus and method for verifying referer
CN109302394A (en) A kind of anti-simulation login method of terminal, device, server and storage medium
CN107612926B (en) One-sentence speech WebShell interception method based on client recognition
CN102833212A (en) Webpage visitor identity identification method and system
CN107241306B (en) Man-machine identification method, server, client and man-machine identification system
CN103902913B (en) A kind of method and apparatus for carrying out safe handling to web applications
CN109818906B (en) Equipment fingerprint information processing method and device and server
CN109120626A (en) Security threat processing method, system, safety perception server and storage medium
JP2011043924A (en) Web action history acquisition system, web action history acquisition method, gateway device and program
CN106209748A (en) The means of defence of internet interface and device
CN105592070B (en) Application layer DDoS defence methods and system
CN103929498A (en) Method and device for processing client requests
JP6258189B2 (en) Specific apparatus, specific method, and specific program
CN111953647A (en) Security verification method and device, electronic equipment and storage medium
CN107634969B (en) Data interaction method and device
CN112751799A (en) Verification method and device based on picture verification code
US20200314190A1 (en) De termining that multiple requests are received from a particular user device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant