发明名称 Detecting network attacks based on a hash
摘要 Techniques for analyzing access to a network-based document may be provided. For example, a portion of the network-based document for hashing may be identified. A client hash of the portion may be accessed. The client hash may be based on an access of a client to the network-based document over a network. A provider hash of the portion may be also accessed. The provider hash may be based on a trusted version of the portion. The client hash and the provider hash may be compared. Based on the comparison, an issue associated with the access to the network-based document over the network may be detected.
申请公布号 US9473516(B1) 申请公布日期 2016.10.18
申请号 US201414500649 申请日期 2014.09.29
申请人 Amazon Technologies, Inc. 发明人 Jezorek Matthew Ryan;Van Horenbeeck Maarten;Lai Richie
分类号 H04L29/06 主分类号 H04L29/06
代理机构 Kilpatrick Townsend & Stockton LLP 代理人 Kilpatrick Townsend & Stockton LLP
主权项 1. A computer-implemented method, comprising: providing, by a computer system to a client device, a network-based document comprising an annotated portion and an object, the object configured to cause the client device to hash the annotated portion of the network -based document based at least in part on an access of the client to the network-based document over a data network, the access facilitated based at least in part on a domain name system record of the network-based document, the domain name system record available from a recursive name server of an Internet service provider; receiving, from the client device, a client hash of the annotated portion of the network-based document based at least in part on an instantiation of the object by the client device; generating, by the computer system, a trusted hash based at least in part on hashing a trusted version of the annotated portion of the network-based document; comparing, by the computer system, the client hash and the trusted hash; determining, based at least in part on the comparing, that the access of the client device to the network-based document involved an unauthorized redirection to the network-based document through the data network; generating a flag indicative of the unauthorized redirection; determining whether a number of unauthorized redirections through the data network exceeds a threshold based at least in part on the flag; and determining that the domain name system record of the network-based document available from the recursive name server of the Internet service provider has been altered based at least in part on the number of unauthorized redirections exceeding the threshold.
地址 Seattle WA US