Attack object tracing method and device, equipment and medium

The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: JIAO TIANYU, LU YONGDI, JI WEN, WANG HAIGUANG, NIE YING
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator JIAO TIANYU
LU YONGDI
JI WEN
WANG HAIGUANG
NIE YING
description The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN117749446A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN117749446A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN117749446A3</originalsourceid><addsrcrecordid>eNrjZLB1LClJTM5WyE_KSk0uUSgpSkzOzEtXyE0tychPUUjMS1FISS3LTE7VUUgtLM0syE3NKwGL5qamZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_Q0NzcxNLExMzR2Ni1AAA66EvzQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Attack object tracing method and device, equipment and medium</title><source>esp@cenet</source><creator>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</creator><creatorcontrib>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</creatorcontrib><description>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240322&amp;DB=EPODOC&amp;CC=CN&amp;NR=117749446A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240322&amp;DB=EPODOC&amp;CC=CN&amp;NR=117749446A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>JIAO TIANYU</creatorcontrib><creatorcontrib>LU YONGDI</creatorcontrib><creatorcontrib>JI WEN</creatorcontrib><creatorcontrib>WANG HAIGUANG</creatorcontrib><creatorcontrib>NIE YING</creatorcontrib><title>Attack object tracing method and device, equipment and medium</title><description>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLB1LClJTM5WyE_KSk0uUSgpSkzOzEtXyE0tychPUUjMS1FISS3LTE7VUUgtLM0syE3NKwGL5qamZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_Q0NzcxNLExMzR2Ni1AAA66EvzQ</recordid><startdate>20240322</startdate><enddate>20240322</enddate><creator>JIAO TIANYU</creator><creator>LU YONGDI</creator><creator>JI WEN</creator><creator>WANG HAIGUANG</creator><creator>NIE YING</creator><scope>EVB</scope></search><sort><creationdate>20240322</creationdate><title>Attack object tracing method and device, equipment and medium</title><author>JIAO TIANYU ; LU YONGDI ; JI WEN ; WANG HAIGUANG ; NIE YING</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN117749446A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>JIAO TIANYU</creatorcontrib><creatorcontrib>LU YONGDI</creatorcontrib><creatorcontrib>JI WEN</creatorcontrib><creatorcontrib>WANG HAIGUANG</creatorcontrib><creatorcontrib>NIE YING</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>JIAO TIANYU</au><au>LU YONGDI</au><au>JI WEN</au><au>WANG HAIGUANG</au><au>NIE YING</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Attack object tracing method and device, equipment and medium</title><date>2024-03-22</date><risdate>2024</risdate><abstract>The invention discloses an attack object tracing method and device, equipment and a medium. The attack object tracing method comprises the steps that a target function in a service system is monitored through a security detection probe, whether an attack behavior exists or not is determined, and the security detection probe is deployed on a server where the service system is located; under the condition that the attack behavior exists, an attack interception page is generated, and a traceability code is implanted in the attack interception page in advance; under the condition that the attack object accesses the attack interception page through the browser, target feature information of the attack object is obtained, and the target feature information is obtained by responding to operation of the source tracing code on a terminal of the attack object; and sending the target feature information to a security detection cloud through the security detection probe, so that the security detection cloud traces the at</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN117749446A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Attack object tracing method and device, equipment and medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T07%3A15%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=JIAO%20TIANYU&rft.date=2024-03-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN117749446A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true