发明名称 |
Detecting network attacks based on a hash |
摘要 |
Techniques for analyzing access to a network-based document may be provided. For example, a portion of the network-based document for hashing may be identified. A client hash of the portion may be accessed. The client hash may be based on an access of a client to the network-based document over a network. A provider hash of the portion may be also accessed. The provider hash may be based on a trusted version of the portion. The client hash and the provider hash may be compared. Based on the comparison, an issue associated with the access to the network-based document over the network may be detected. |
申请公布号 |
US9473516(B1) |
申请公布日期 |
2016.10.18 |
申请号 |
US201414500649 |
申请日期 |
2014.09.29 |
申请人 |
Amazon Technologies, Inc. |
发明人 |
Jezorek Matthew Ryan;Van Horenbeeck Maarten;Lai Richie |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
Kilpatrick Townsend & Stockton LLP |
代理人 |
Kilpatrick Townsend & Stockton LLP |
主权项 |
1. A computer-implemented method, comprising:
providing, by a computer system to a client device, a network-based document comprising an annotated portion and an object, the object configured to cause the client device to hash the annotated portion of the network -based document based at least in part on an access of the client to the network-based document over a data network, the access facilitated based at least in part on a domain name system record of the network-based document, the domain name system record available from a recursive name server of an Internet service provider; receiving, from the client device, a client hash of the annotated portion of the network-based document based at least in part on an instantiation of the object by the client device; generating, by the computer system, a trusted hash based at least in part on hashing a trusted version of the annotated portion of the network-based document; comparing, by the computer system, the client hash and the trusted hash; determining, based at least in part on the comparing, that the access of the client device to the network-based document involved an unauthorized redirection to the network-based document through the data network; generating a flag indicative of the unauthorized redirection; determining whether a number of unauthorized redirections through the data network exceeds a threshold based at least in part on the flag; and determining that the domain name system record of the network-based document available from the recursive name server of the Internet service provider has been altered based at least in part on the number of unauthorized redirections exceeding the threshold. |
地址 |
Seattle WA US |