CN107426148A - A kind of anti-reptile method and system based on running environment feature recognition - Google Patents

A kind of anti-reptile method and system based on running environment feature recognition Download PDF

Info

Publication number
CN107426148A
CN107426148A CN201710203203.4A CN201710203203A CN107426148A CN 107426148 A CN107426148 A CN 107426148A CN 201710203203 A CN201710203203 A CN 201710203203A CN 107426148 A CN107426148 A CN 107426148A
Authority
CN
China
Prior art keywords
client
code
server
selection
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710203203.4A
Other languages
Chinese (zh)
Other versions
CN107426148B (en
Inventor
夏珺峥
蒋平川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Gifted Data Co Ltd
Original Assignee
Chengdu Gifted Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Gifted Data Co Ltd filed Critical Chengdu Gifted Data Co Ltd
Priority to CN201710203203.4A priority Critical patent/CN107426148B/en
Publication of CN107426148A publication Critical patent/CN107426148A/en
Application granted granted Critical
Publication of CN107426148B publication Critical patent/CN107426148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a kind of anti-reptile method and system based on running environment feature recognition, and the present invention relates to anti-crawler technology field, solves crawlers identification and the anti-technical problem for climbing strategy implement.It is main to include producing new strategy bag and the option code for the operation of new strategy bag, update server current strategies bag using new strategy bag and build the feature classification white list on new strategy bag operation characteristic data;Option code is sent to client, response is then sent and asks to client;By client, according to option code, selectively operation reserve bag carries out server response, obtain corresponding selection code characteristic and backout feature data to server;Characteristic corresponding to analysis option code and option code, calculates the feature classification of client and judges whether to belong to feature classification white list, the client implementation access control to being not belonging to feature classification white list.

Description

A kind of anti-reptile method and system based on running environment feature recognition
Technical field
The present invention relates to reptile identification and anti-crawler technology field, and in particular to a kind of based on running environment feature recognition Anti- reptile method and system.
Background technology
With the arrival in big data epoch, data become more and more important.Valuable data are analyzed from data, it is first First need substantial amounts of data.Data on internet receive the pass of enterprises and individuals due to its publicity, magnanimity, popularity Note.Many web crawlers are exploited, and gather the various data on internet.But web crawlers can bring it is many negative Influence.Web crawler meeting short time a large amount of request servers, cause server performance to decline;Some reptiles can malice collection A large amount of public datas, collect selling, property infringement.Also the data of number of site have very high value density, or Enterprise is not intended to oneself disclosed information and gathered easily by web crawlers, all implements different anti-reptile measures, as identifying code, Conversational check, access frequency etc. distinguish web crawlers or the truly artificially access to system.But web crawlers is more Kind is various, also takes many technological means for breaking through anti-reptiles.Identifying code is such as identified by machine recognition, artificial stamp, By splicing access request etc. around conversational check and using the simulation multi-user access such as Address Proxy.By being run to reptile The feature recognition of environment, web crawlers can be effectively identified, prevents leaking data.
The content of the invention
For above-mentioned prior art, present invention aims at provide a kind of anti-reptile side based on running environment feature recognition Method and system, solution prior art reptile embodiment party, which constantly accesses server and largely obtains information, causes server operation speed Degree is slow and also existence information resource is obtained by batch and the technical problem such as steals.
To reach above-mentioned purpose, the technical solution adopted by the present invention is as follows:
A kind of anti-reptile method, comprises the following steps:
Step 1, new strategy bag and the option code for the operation of new strategy bag are produced, worked as using new strategy bag renewal server Preceding strategy, which wraps, simultaneously builds the feature classification white list on new strategy bag operation characteristic data, can be by separate server or Home server carries out generation operation;
Step 2, option code is sent to client, then send response and ask to client, can pass through stand-alone service Device or home server are transmitted or received operation;
Step 3, by client, according to option code, selectively operation reserve bag carries out server response, obtains corresponding selection code Characteristic and backout feature data to server;
Characteristic corresponding to step 4, analysis option code and option code, calculates the feature classification of client and judges Whether feature classification white list is belonged to, the client implementation access control to being not belonging to feature classification white list.
In the above method, described step 1, the cycle produces new strategy bag and the option code for the operation of new strategy bag.
In the above method, described step 5, comprise the following steps:
Step 4.1, by memory module receive characteristic in predetermined time interval;
Step 4.2, characteristic of the memory module simultaneously in analysis time section is accessed by server processing module, calculated Go out the feature classification of client and judge whether to belong to feature classification white list;
Step 4.2.1, it is legal the client for belonging to feature classification white list to be marked, then jumps to step 1;
Step 4.2.2, to being not belonging to the client implementation access control of feature classification white list.
A kind of anti-reptile method based on running environment feature recognition, comprises the following steps:
Step 1, the server end cycle produce with different run time program functions as element Jacobian matrix and For selection of mapping character strings different elements into Jacobian matrix, and the white list of running environment feature classification is set, then The current function matrix of server is updated by Jacobian matrix, random character string alternatively code is generated in server end, then Send option code and response is asked to client;
Step 2, in client selection is gone out by option code decision-making, then show that selection is corresponding in Jacobian matrix The run time of element, then the run time of option code and corresponding element is sent to server;
Step 3, in server end option code and run time are analyzed, calculate client running environment feature classification, sentence Break and to be not belonging in white list the client of running environment feature classification and to the client implementation access control policy.
In the above method, described step 1, in addition to cycle produce the selection subcharacter for including selection Ziwen eigen Code.
In the above method, described step 3, comprise the following steps:
Step 3.1, inquiry server currently select subcharacter code, obtain it is currently used in Jacobian matrix and for analyzing With the selection subvalue for calculating initial setting up;
Step 3.2, select current function matrix all option codes and institute from client in preset time section The run time of corresponding element, client running environment feature class is calculated by means clustering algorithm or machine learning algorithm Not;
Step 3.3, judge to be not belonging to the client of running environment feature classification in white list and the client is marked Illegal and implementation access control policy.
In the above method, described step 3, received by the memory module of server in preset time section and come from client Option code and corresponding element run time.
A kind of anti-crawler system based on running environment feature recognition, including
Server, including characteristics algorithm module, data interface module, memory module, data analysis module and access process Module, characteristics algorithm module export the strategy bag for updating and performing to server in itself;
Client, the option code generated by characteristics algorithm module is received by data interface module;
Described client is by option code implementation strategy bag;
Described server, the spy by client executing strategy bag response is received by data interface module corresponding selection code Data are levied, the characteristic of corresponding selection code is also exported to memory module, data analysis module and calculates and deposit by data interface module Store up in module the characteristic of corresponding selection code and by result of calculation feedback information to access processing module, access processing module by Feedback information is to the client executing predetermined policy.
In such scheme, described strategy bag, including the function square with different run time program functions as element Battle array, for mapping character strings, into Jacobian matrix, the selection of different elements is sub and includes the selection subcharacter of selection Ziwen eigen Code.
A kind of server based on running environment feature recognition, with anti-reptile function, including
Characteristics algorithm module, the cycle produce with different run time program functions as element Jacobian matrix, be used for Mapping character strings selection of different elements into Jacobian matrix is sub and includes the selection subcharacter code of selection Ziwen eigen;
Data interface module, for client interaction data, export as caused by characteristics algorithm module option code to visitor The run time of family end and reception from client corresponding selection code;
Memory module, receive the corresponding selection code run time received in data interface module scheduled time section Data;
Data analysis module, calculate in memory module data in scheduled time section and client is judged by result of calculation Running environment feature classification;
Access processing module, the client running environment feature classification calculated by data analysis module is to client executing Predetermined policy.
Compared with prior art, beneficial effects of the present invention:
The present invention is collected by randomly choosing code so as to which Stochastic Decision-making goes out in Jacobian matrix to be used for the program function of computing Its run time in certain time section, judges whether it belongs to valid operation, dramatically increases after classifying according to cluster feature Find the possibility of reptile client and with increasing for data is collected, can significantly reduce white list False Rate;
The generation that subcharacter code is selected in the present invention is random and Jacobian matrix is variable function matrix so that client Need the Jacobian matrix computing that performs all different every time, so as to substantially increase the difficulty that reptile is cracked.
Brief description of the drawings
Fig. 1 is the server architecture block diagram of the embodiment of the present invention;
Fig. 2 is the anti-reptile verification method implementing procedure figure of the embodiment of the present invention.
Embodiment
All features disclosed in this specification, or disclosed all methods or during the step of, except mutually exclusive Feature and/or step beyond, can combine in any way.
Running environment refers to that client accesses the environment of the local application operation of service end service;Such as access Web The running environment of the browser of the page, access the wechat software runtime environment of the wechat page.
White list refers to that a kind of differentiate through overwriting is feature set of records ends in normal client running environment;Such as can The operation on different operating system, different hardware platforms is carried out with the browser accessed Web page and carries out actual test, collection Run time inside patent describing mode, after carrying out machine learning, pattern-recognition, neural network learning, carry out algorithmically Feature is sorted out, the set for having classification of formation.
Option code can be when client accesses, and carry out randomly generating character string, current time such as be obtained, plus random Integer, and make hash algorithm generation.
Selection is one section of program, the solution that specific algorithm can be solved with equation with many unknowns, then solution sorts from small to large, entered After row carries out modulus to the columns of Jacobian matrix, the operation function operation of this row is taken per a line successively;To sub this section of journey of selection Sequence, after the Hash for carrying out text, filename corresponding to cryptographic Hash and this program is recorded in database.
Each value of Jacobian matrix is the index of one section of operation program, according to Jacobian matrix obtained value, can be found One operation program;This operation program can be one section of JavaScr ipt program in Web page, when running it, need The time of this section of program code of operation is recorded, then by being analyzed operating time log to judge client-side program Running environment.
The present invention will be further described below in conjunction with the accompanying drawings:
A kind of anti-reptile method and system of running environment feature recognition, are specifically included:
S1, server cycle produce Jacobian matrix, selection, select subcharacter code, update server program, set and access Running environment feature classification white list;
S2, server generation option code, option code is concurrently sent to client, requesting client response;
S3, client select function and operation in Jacobian matrix according to the option code received, by selection, then Option code, each function operation time are sent to server;
S4, server store option code, each function operation time to data memory module;
S5, server are analyzed option code, the data of each function operation time of storage, calculate active client The feature classification of running environment;
S6, the strategy according to configuration, access control policy is implemented to the access not in white list;
In the above method, Jacobian matrix, option code, the key step bag of selection caused by server feature algoritic module Include:
S11, Jacobian matrix form N*N matrixes by the program function of different execution times, are identified as f (i, j);
S12, selection are the programs by character string maps to several f (i, j);
S13, selection subcharacter code are the text features for selecting subprogram;
S14, renewal server program, replace Jacobian matrix, selection of legacy version, and record current selection subcharacter Code;
S15, running environment white list are the client running environment of default Lawful access;
In the above method, server generation option code, concurrently send option code to client, requesting client response it is main Step includes:
The character string that S21, option code are randomly generated;
It is server settings that whether S22, server, which ask client's response,;
In the above method, server is analyzed option code, the data of each function operation time of storage, is calculated and is worked as The feature classification key step of preceding client running environment includes:
S51, the selection subcharacter code for inquiring about server current record, judge currently used Jacobian matrix and selection;
S52, selection current function matrix corresponding to certain time section data storage, calculate active client operation ring The feature classification in border, different recognizers can be used, such as cluster, machine learning;
S53, mark do not meet running environment feature classification white list and obtain client access;
In the above method, characteristics algorithm generation module, data acquisition module data interface module, data storage are specifically included Module, data analysis module, access processing module;Characteristics algorithm module mainly produces Jacobian matrix, selection, selection subcharacter Code, option code;Data acquisition module data interface module mainly sends and receives data;Data memory module is mainly used in depositing Store up option code, the value of Jacobian matrix under different characteristic setting that client returns;Data analysis module is mainly to data storage Analyzed, calculate running environment feature classification;Access processing module is mainly the strategy according to setting, implements access control.
Embodiment 1
Wherein, as shown in figure 1, the server includes a data acquisition module data interface module 1, a characteristics algorithm generates Module 2, a data memory module 3, a data analysis module 4 and an access processing module 5.
Each functional module possessed function is described below:
Data acquisition module data interface module 1 is used to send and receive data.
Characteristics algorithm generation module 2 is used for generating function matrix, selection subcharacter code and selection.
Data memory module 3 is used to store the option code under different characteristic setting of client return, Jacobian matrix fortune Row time data.
Data analysis module 4 is used to analyze the data in data memory module, and comes from client receiving Jacobian matrix run time data when, with the data calculate running environment feature classification, whether received with authentication server Access from reptile.
Access processing module 5 is used for the strategy according to setting, to client implementation access control.
As shown in Fig. 2 present embodiments providing a kind of anti-reptile verification method, this method is real using above-mentioned anti-crawler system Existing, it comprises the following steps:
Step 101, server generating function matrix f (i, j), selection subcharacter code and selection and server program is updated And running environment feature classification white list;
Step 102, server generates option code, concurrently send option code to client, requesting client response;
Step 103, client receives option code, and the function in Jacobian matrix is selected by selection;
Step 104, the function that client operation is selected, and gather function operation time data;
Step 105, client sends option code and run time data to server;
Step 106, option code and run time data of the server storage from client;
Step 107, server is analyzed the option code of storage, function operation time data, calculates existing customer Hold the feature classification of running environment;
Step 108, server enters step 109 according to the strategy of configuration when the client is in running environment white list, When the client is not to enter step 110 in running environment white list;
Step 109, server allows client to access, and terminates flow;
Step 110, server forbids client to access, and terminates flow.
In order that those skilled in the art are better understood from technical scheme, come for a specific example below Explanation:
Jacobian matrix f (3,3) is stored with setting server, i.e., has 9 functions (function f (1,1), f in the matrix (1,2), f (1,3), (2,1), f (2,2), f (2,3), f (3,1), f (3,2), f (3,3).
Server generates option code S at random, and option code S is sent to client, waits client response.
After client receives option code S, parsed, and function f (1,1), f are chosen by selection according to analysis result (2,1), f (2,1), (3,1).
Client is separately operable function f (1,1), f (2,1), f (2,1), (3,1) and generating run time T1, T2, T3, T4.In the case of server end requesting client response, client sends out run time data T1, T2, T3, T4 and option code Deliver to server.
After server receives data T1, T2, T3, T4 and option code from client, after being stored, trigger data Analysis module is analyzed the data.
Specifically, server can be by time data T1, T2, T3, T4 and the historical data in data memory module are carried out pair Than to calculate the feature classification M1 of active client running environment.
After this feature classification is obtained, data analysis module sends this feature classification M1 to access control module.
After access control module obtains feature classification M1, running environment white list is accessed, if it in white list, takes The client of business device running continues to access server, if it not in white list, server forbids the client to continue to visit Ask server.
In above-mentioned verification process, option code is randomly generated by server, and further, operation function is by selection Random selection, this can greatly increase reptile and crack difficulty.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Belong to those skilled in the art the invention discloses technical scope in, the change or replacement that can readily occur in, all should It is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. anti-reptile method, it is characterised in that comprise the following steps:
    Step 1, new strategy bag and the option code for the operation of new strategy bag are produced, update the current plan of server using new strategy bag Slightly wrap and build the feature classification white list on new strategy bag operation characteristic data;
    Step 2, option code is sent to client, then send response and ask to client;
    Step 3, by client, according to option code, selectively operation reserve bag carries out server response, obtains the spy of corresponding selection code Data and backout feature data are levied to server;
    Characteristic corresponding to step 4, analysis option code and option code, calculates the feature classification of client and judges whether Belong to feature classification white list, the client implementation access control to being not belonging to feature classification white list.
  2. 2. a kind of anti-reptile method according to claim 1, it is characterised in that described step 1, cycle produce new strategy Bag and the option code for the operation of new strategy bag.
  3. 3. a kind of anti-reptile method according to claim 1, it is characterised in that described step 4, comprise the following steps:
    Step 4.1, by memory module receive characteristic in predetermined time interval;
    Step 4.2, characteristic of the memory module simultaneously in analysis time section is accessed by server processing module, calculate visitor The feature classification at family end simultaneously judges whether to belong to feature classification white list;
    Step 4.2.1, it is legal the client for belonging to feature classification white list to be marked, then jumps to step 1;
    Step 4.2.2, to being not belonging to the client implementation access control of feature classification white list.
  4. A kind of 4. anti-reptile method based on running environment feature recognition, it is characterised in that comprise the following steps:
    Step 1, there are different run time program functions as the Jacobian matrix of element in the generation of server end cycle and be used for Selection of mapping character strings different elements into Jacobian matrix, the program documentaion of selection is then calculated by hash algorithm Condition code alternatively subcharacter code, and the white list of running environment feature classification is set, then pass through Jacobian matrix more new demand servicing The current function matrix of device, random character string alternatively code is generated in server end, retransmits option code and response request To client;
    Step 2, in client selection is gone out by option code decision-making, then draw corresponding in the Jacobian matrix element of selection Run time, then the run time of option code and corresponding element is sent to server;
    Step 3, in server end option code and run time are analyzed, calculate client running environment feature classification, judge It is not belonging in white list the client of running environment feature classification and to the client implementation access control policy.
  5. 5. a kind of anti-reptile method based on running environment feature recognition according to claim 4, it is characterised in that described Step 1, the cycle produce comprising selection Ziwen eigen selection subcharacter code.
  6. 6. a kind of anti-reptile method based on running environment feature recognition according to claim 5, it is characterised in that described Step 3, comprise the following steps:
    Step 3.1, inquiry server currently select subcharacter code, obtain it is currently used in Jacobian matrix and by analyze and based on Calculate the selection subvalue of initial setting up;
    Step 3.2, select current function matrix all option codes from client and corresponding in preset time section The run time of element, calculated by clustering algorithm, machine learning algorithm, algorithm for pattern recognition, deep neural network algorithm Client running environment feature classification;
    Step 3.3, judge to be not belonging to the client of running environment feature classification in white list and client mark is not conformed to Method and implementation access control policy.
  7. A kind of 7. anti-reptile based on running environment feature recognition according to any one claim in claim 4-6 Method, it is characterised in that described step 3, received by the memory module of server in preset time section from client The run time of option code and corresponding element.
  8. A kind of 8. anti-crawler system based on running environment feature recognition, it is characterised in that including
    Server, including characteristics algorithm module, data interface module, memory module, data analysis module and access processing module, Characteristics algorithm module exports the strategy bag for updating and performing to server in itself;
    Client, the option code generated by characteristics algorithm module is received by data interface module;
    Described client is by option code implementation strategy bag;
    Described server, the characteristic by client executing strategy bag response is received by data interface module corresponding selection code According to data interface module also exports the characteristic of corresponding selection code to memory module, and data analysis module calculates storage mould The characteristic of corresponding selection code and by result of calculation feedback information to access processing module in block, access processing module is by feeding back Information is to the client executing predetermined policy.
  9. 9. a kind of anti-crawler system based on running environment feature recognition according to claim 8, it is characterised in that described Strategy bag, including with different run time program functions as the Jacobian matrix of element, for mapping character strings to function The selection of different elements is sub in matrix and includes the selection subcharacter code of selection Ziwen eigen.
  10. A kind of 10. server based on running environment feature recognition, with anti-reptile function, it is characterised in that including
    Characteristics algorithm module, cycle are produced with different run time program functions as the Jacobian matrix of element, for mapping Character string selection of different elements into Jacobian matrix is sub and includes the selection subcharacter code of selection Ziwen eigen;
    Data interface module, for client interaction data, export as caused by characteristics algorithm module option code to client And receive the run time from client corresponding selection code;
    Memory module, receive the number of the corresponding selection code run time received in data interface module scheduled time section According to;
    Data analysis module, calculate in memory module data in scheduled time section and the operation of client is judged by result of calculation Environmental characteristic classification;
    Access processing module, the client running environment feature classification calculated by data analysis module make a reservation for client executing Strategy.
CN201710203203.4A 2017-03-30 2017-03-30 Crawler-resisting method and system based on running environment feature recognition Active CN107426148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710203203.4A CN107426148B (en) 2017-03-30 2017-03-30 Crawler-resisting method and system based on running environment feature recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710203203.4A CN107426148B (en) 2017-03-30 2017-03-30 Crawler-resisting method and system based on running environment feature recognition

Publications (2)

Publication Number Publication Date
CN107426148A true CN107426148A (en) 2017-12-01
CN107426148B CN107426148B (en) 2020-07-31

Family

ID=60423364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710203203.4A Active CN107426148B (en) 2017-03-30 2017-03-30 Crawler-resisting method and system based on running environment feature recognition

Country Status (1)

Country Link
CN (1) CN107426148B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133140A (en) * 2017-12-08 2018-06-08 成都数聚城堡科技有限公司 A kind of mode of the anti-reptile of dynamic
CN108521428A (en) * 2018-04-20 2018-09-11 武汉极意网络科技有限公司 A kind of realization method and system of the anti-reptile of public network based on jenkins
CN109815380A (en) * 2018-12-20 2019-05-28 山东中创软件工程股份有限公司 A kind of information crawler method, apparatus, equipment and computer readable storage medium
CN109818949A (en) * 2019-01-17 2019-05-28 济南浪潮高新科技投资发展有限公司 A kind of anti-crawler method neural network based
CN110096266A (en) * 2019-05-13 2019-08-06 上海优扬新媒信息技术有限公司 A kind of characteristic processing method and device
CN112312152A (en) * 2020-10-27 2021-02-02 浙江集享电子商务有限公司 Data processing system in network live broadcast

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008339A (en) * 2014-06-05 2014-08-27 东南大学 Active technology based malicious code capture method
CN104539053A (en) * 2014-12-31 2015-04-22 国家电网公司 Power dispatching automation polling robot and method based on reptile technology
CN104618132A (en) * 2014-12-16 2015-05-13 北京神州绿盟信息安全科技股份有限公司 Generation method and generation device for application program recognition rule
CN105577701A (en) * 2016-03-09 2016-05-11 携程计算机技术(上海)有限公司 Web crawler recognition method and system
CN105743901A (en) * 2016-03-07 2016-07-06 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN105812366A (en) * 2016-03-14 2016-07-27 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN105871850A (en) * 2016-04-05 2016-08-17 携程计算机技术(上海)有限公司 Crawler detection method and crawler detection system
US9552489B1 (en) * 2013-09-19 2017-01-24 Imdb.Com, Inc. Restricting network spidering
CN106534062A (en) * 2016-09-23 2017-03-22 南京途牛科技有限公司 Crawler prevention method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9552489B1 (en) * 2013-09-19 2017-01-24 Imdb.Com, Inc. Restricting network spidering
CN104008339A (en) * 2014-06-05 2014-08-27 东南大学 Active technology based malicious code capture method
CN104618132A (en) * 2014-12-16 2015-05-13 北京神州绿盟信息安全科技股份有限公司 Generation method and generation device for application program recognition rule
CN104539053A (en) * 2014-12-31 2015-04-22 国家电网公司 Power dispatching automation polling robot and method based on reptile technology
CN105743901A (en) * 2016-03-07 2016-07-06 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN105577701A (en) * 2016-03-09 2016-05-11 携程计算机技术(上海)有限公司 Web crawler recognition method and system
CN105812366A (en) * 2016-03-14 2016-07-27 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN105871850A (en) * 2016-04-05 2016-08-17 携程计算机技术(上海)有限公司 Crawler detection method and crawler detection system
CN106534062A (en) * 2016-09-23 2017-03-22 南京途牛科技有限公司 Crawler prevention method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133140A (en) * 2017-12-08 2018-06-08 成都数聚城堡科技有限公司 A kind of mode of the anti-reptile of dynamic
CN108521428A (en) * 2018-04-20 2018-09-11 武汉极意网络科技有限公司 A kind of realization method and system of the anti-reptile of public network based on jenkins
CN108521428B (en) * 2018-04-20 2020-09-01 武汉极意网络科技有限公司 Realization method and system for preventing reptiles in public network based on jenkins
CN109815380A (en) * 2018-12-20 2019-05-28 山东中创软件工程股份有限公司 A kind of information crawler method, apparatus, equipment and computer readable storage medium
CN109818949A (en) * 2019-01-17 2019-05-28 济南浪潮高新科技投资发展有限公司 A kind of anti-crawler method neural network based
CN110096266A (en) * 2019-05-13 2019-08-06 上海优扬新媒信息技术有限公司 A kind of characteristic processing method and device
CN110096266B (en) * 2019-05-13 2023-12-22 度小满科技(北京)有限公司 Feature processing method and device
CN112312152A (en) * 2020-10-27 2021-02-02 浙江集享电子商务有限公司 Data processing system in network live broadcast

Also Published As

Publication number Publication date
CN107426148B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN107426148A (en) A kind of anti-reptile method and system based on running environment feature recognition
CN103297435B (en) A kind of abnormal access behavioral value method and system based on WEB daily record
CN105516113B (en) System and method for automatic network fishing detected rule evolution
CN111639363B (en) Data analysis method based on block chain and edge computing server
CN103685308B (en) Detection method and system of phishing web pages, client and server
CN106777024A (en) Recognize the method and device of malicious user
CN100456286C (en) Universal file search system and method
CN108156131A (en) Webshell detection methods, electronic equipment and computer storage media
CN110781308A (en) Anti-fraud system for building knowledge graph based on big data
CN107888606A (en) A kind of domain name credit assessment and system
CN104202291A (en) Anti-phishing method based on multi-factor comprehensive assessment method
Luo et al. A CNN-based Approach to the Detection of SQL Injection Attacks
CN108718341A (en) Shared and search the method for data
CN113761531A (en) Malicious software detection system and method based on distributed API (application program interface) feature analysis
CN109818949A (en) A kind of anti-crawler method neural network based
Xi et al. A hybrid algorithm of traffic accident data mining on cause analysis
CN110457576A (en) Account-classification method, device, computer equipment and storage medium
Sujatha Improved user navigation pattern prediction technique from web log data
Chen et al. Network intrusion detection using class association rule mining based on genetic network programming
CN110245986A (en) A method of obtaining internet financial advertising body release
CN107231364A (en) A kind of website vulnerability detection method and device, computer installation and storage medium
CN104657491B (en) A kind of method that data are sent to client
CN109948339A (en) A kind of malicious script detection method based on machine learning
CN111612531A (en) Click fraud detection method and system
CN112003884A (en) Network asset acquisition and natural language retrieval method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant