Attack object tracing method and device, equipment and medium
The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | JIAO TIANYU LU YONGDI JI WEN WANG HAIGUANG NIE YING |
description | The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117749446A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117749446A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117749446A3</originalsourceid><addsrcrecordid>eNrjZLB1LClJTM5WyE_KSk0uUSgpSkzOzEtXyE0tychPUUjMS1FISS3LTE7VUUgtLM0syE3NKwGL5qamZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_Q0NzcxNLExMzR2Ni1AAA66EvzQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Attack object tracing method and device, equipment and medium</title><source>esp@cenet</source><creator>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</creator><creatorcontrib>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</creatorcontrib><description>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240322&DB=EPODOC&CC=CN&NR=117749446A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240322&DB=EPODOC&CC=CN&NR=117749446A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JIAO TIANYU</creatorcontrib><creatorcontrib>LU YONGDI</creatorcontrib><creatorcontrib>JI WEN</creatorcontrib><creatorcontrib>WANG HAIGUANG</creatorcontrib><creatorcontrib>NIE YING</creatorcontrib><title>Attack object tracing method and device, equipment and medium</title><description>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLB1LClJTM5WyE_KSk0uUSgpSkzOzEtXyE0tychPUUjMS1FISS3LTE7VUUgtLM0syE3NKwGL5qamZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_Q0NzcxNLExMzR2Ni1AAA66EvzQ</recordid><startdate>20240322</startdate><enddate>20240322</enddate><creator>JIAO TIANYU</creator><creator>LU YONGDI</creator><creator>JI WEN</creator><creator>WANG HAIGUANG</creator><creator>NIE YING</creator><scope>EVB</scope></search><sort><creationdate>20240322</creationdate><title>Attack object tracing method and device, equipment and medium</title><author>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117749446A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>JIAO TIANYU</creatorcontrib><creatorcontrib>LU YONGDI</creatorcontrib><creatorcontrib>JI WEN</creatorcontrib><creatorcontrib>WANG HAIGUANG</creatorcontrib><creatorcontrib>NIE YING</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JIAO TIANYU</au><au>LU YONGDI</au><au>JI WEN</au><au>WANG HAIGUANG</au><au>NIE YING</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Attack object tracing method and device, equipment and medium</title><date>2024-03-22</date><risdate>2024</risdate><abstract>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN117749446A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Attack object tracing method and device, equipment and medium |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T07%3A15%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JIAO%20TIANYU&rft.date=2024-03-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117749446A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |