CN115632817B - Method and device for preventing climbing of An Zhuo Duan - Google Patents

Method and device for preventing climbing of An Zhuo Duan Download PDF

Info

Publication number
CN115632817B
CN115632817B CN202211156703.4A CN202211156703A CN115632817B CN 115632817 B CN115632817 B CN 115632817B CN 202211156703 A CN202211156703 A CN 202211156703A CN 115632817 B CN115632817 B CN 115632817B
Authority
CN
China
Prior art keywords
data
request
climbing
http
wind control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211156703.4A
Other languages
Chinese (zh)
Other versions
CN115632817A (en
Inventor
徐万鹏
单震
谢传家
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Original Assignee
Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chaozhou Zhuoshu Big Data Industry Development Co Ltd filed Critical Chaozhou Zhuoshu Big Data Industry Development Co Ltd
Priority to CN202211156703.4A priority Critical patent/CN115632817B/en
Publication of CN115632817A publication Critical patent/CN115632817A/en
Application granted granted Critical
Publication of CN115632817B publication Critical patent/CN115632817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to An Zhuoduan data reverse climbing field, in particular to an A Zhuo Duan reverse climbing method, firstly, in a data encryption mode, an asymmetric encryption algorithm RSA is selected, and reverse climbing wind control is carried out according to a default filling mode which is different from a standard jdk of An Zhuoduan; in data compression, for longer data packets, one-step compression is performed before encryption, and when an http(s) request is performed, an http2.0 frame is selected, and reverse climbing wind control is performed according to the difference of different http frames. Compared with the prior art, the invention can further enrich and perfect the traditional anti-climbing wind control dimension and has good popularization value.

Description

Method and device for preventing climbing of An Zhuo Duan
Technical Field
The invention relates to the field of An Zhuoduan data anti-climbing, and particularly provides an A Zhuo Duan anti-climbing method and device.
Background
In recent years, with the development of mobile systems, mobile phones have been integrated into aspects of our lives. Various mobile phones are endlessly applied, and people are more familiar with going to shops, ordering food by taking cars or watching live broadcast and the like through the mobile phones. At the same time, a lot of dark gray industry is also produced. They perform a large amount of data capturing, praying, comment brushing, malicious registration, commodity killing in seconds, etc. by cracking a protocol or group control cloud control.
On the one hand, the experience of normal users is deteriorated, and on the other hand, the load of a manufacturer server is also increased. Therefore, it is necessary to identify these malicious behaviors and crawler behaviors. After long iteration, the current software manufacturer basically has a set of own anti-climbing and wind control system. Most of the clients use signature algorithms, equipment fingerprints, slider verification codes and the like to increase the difficulty of reverse engineering.
While some reinforcement techniques, code obfuscation schemes also lengthen the period of the reverse analysis. The conventional wind control anti-climbing measures at present have limits on ip, which are used for preventing a large amount of high-frequency request behaviors, or limits on equipment id, equipment fingerprint, login account number, frequency, quantity, time and the like.
Disclosure of Invention
The invention provides a An Zhuoduan anti-climbing method with strong practicability aiming at the defects of the prior art.
The invention further aims to provide a An Zhuoduan anti-climbing device which is reasonable in design, safe and applicable.
The technical scheme adopted for solving the technical problems is as follows:
firstly, in a data encryption mode, an asymmetric encryption algorithm RSA is selected, and reverse climbing wind control is carried out according to a default filling mode which is An Zhuoduan different from a standard jdk;
in data compression, for longer data packets, one-step compression is performed before encryption, and when an http(s) request is performed, an http2.0 frame is selected, and reverse climbing wind control is performed according to the difference of different http frames.
Furthermore, the android client is realized through a cipher, getinstance, the android system uses a dalvik virtual machine, and when encryption is carried out by the cipher, getinstance method, the difference between the default filling mode of RSA under the android and the standard jdk is used for carrying out wind control identification.
Further, when the black gray produces a reverse encryption protocol, the same encryption is performed by the method of cipher. Getinstance and the request is sent, jdk based on SUN standard is used, and the default filling algorithm of RSA is PKCS1Padding;
after the server receives the data, when the data is analyzed, an error of Java, crypto, badPaddingException, decryption error occurs, and the other party cannot request success.
Furthermore, in the data compression mode, the compression algorithm selects a gzip algorithm in data transmission, and anti-climbing wind control is performed according to characteristics of gzip libraries under different platforms.
Further, the file of Gzip is characterized by beginning with 1f8b, and the server side decompresses the ignored fields of the data header to assist in distinguishing abnormal behavior requests.
Further, when an http(s) request is made, the server may identify, as an exception request, a packet sent by another packet sent by a different package through an http frame of An Zhuoduan.
Furthermore, the user-agent can be directly used as an air control point at the server, the signature is utilized to check the request header, the header does not transmit the accept when the http frame is sent, and the client is added with the header when calculating the signature;
the same signature is calculated by the crawler, and the default band of the frame used in the package is accepted: * The server also recognizes the abnormal signature for the request header.
An ampere Zhuo Duan reverse climbing device comprising: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor is configured to invoke the machine-readable program to perform an ampere Zhuo Duan anti-crawling method.
Compared with the prior art, the method and the device for the anti-climbing of the An Zhuo Duan have the following outstanding beneficial effects:
the invention provides a series of anti-climbing wind control systems designed according to different crawler environments and development environments through the system differentiation, and the traditional anti-climbing wind control dimension can be further enriched and perfected. Unlike traditional wind control points, the reverse climbing wind control points which are performed through the system diversity are likely to be more easily bypassed after being discovered, but are difficult to be perceived and discovered by the opposite party due to the strong concealment, and the dimensions can distinguish abnormal request behaviors at the first time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an An Zhuo Duan anti-climbing method.
Detailed Description
In order to provide a better understanding of the aspects of the present invention, the present invention will be described in further detail with reference to specific embodiments. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
A preferred embodiment is given below:
as shown in fig. 1, in an ampere Zhuo Duan reverse climbing method in this embodiment, firstly, in a data encryption mode, we can select an asymmetric encryption algorithm RSA, and perform reverse climbing wind control according to a default filling mode different from a standard jdk at An Zhuoduan (this difference can also be used in detecting An Zhuoduan simulation execution framework unidbg based on java development). In android clients by the cipher. The android system uses a dalvik virtual machine, and when encryption is performed by a cipher. Getinstance ("RSA") method, a provider of bouncostle is used as a default, and a filling algorithm of nopoding is implemented. We can use the difference between the default fill-in of RSA under android and the standard jdk for wind control identification.
When the black gray product reverses the encryption protocol, and is similarly encrypted and requested to be sent in the manner of the cipher. Getinstance ("RSA"), jdk based on the SUN standard is used, where the default Padding algorithm of RSA is PKCS1Padding. After the server receives the data, due to the difference of filling algorithms, when the data is analyzed, the error of Java, crypto, badPaddingException, decryption error occurs, and the counterpart cannot request success naturally.
In the data compression method, especially for some longer data packets, we generally perform one-step compression before encryption. The compression algorithm can select a gzip algorithm which is common in data transmission, and the anti-climbing wind control can be performed according to the characteristics of gzip libraries under different platforms. Gzip's file features 1f8b at the beginning, and the developer also typically only determines whether the two or three bytes (1 f0b 08) in the header are all the next header information typically regarded as useless information. The header after being compressed and processed by GZIPOutputStream in android is as follows: 1F8B 08 00 00 00 00 00 00 00 00. It can be found that some fields are marked with a value of 0, and the bottom layer does not perform other operations except assigning the initial sign illusion number. In python, the header processed through the gzip library is: 1F8B 08 00 E0 68 FB 62 02 FF 4B. In addition to the beginning magic flag, the bottom layer of the library also assigns values to the modification_time, extra_flags and operating_system fields. The same zlib library of python also has corresponding features. The server can use this feature to detect the fields of the compressed header that would otherwise be ignored, and to assist us in identifying anomalous behavior requests.
When http(s) requests are made, we can choose the frame of http2.0 and make the anti-crawling wind control according to the subtle differences of different http frames. At the client, more and more vendors have used SSL tunneling to prevent reverse personnel from grabbing packets, because after android 7.0 the user credentials are separated from the path of the system credentials, and these apps only trust the system credentials, even some vendors are already using self-compiled SSL libraries and no longer use the system SSL libraries. On our server side, the same thought can be adopted, and only packets sent by the http framework used by our security Zhuo Duan can be identified as abnormal requests for packets sent by other different packages. First is a version of http, and the http protocol has evolved to the http2.0 protocol from the beginning to the time that four versions are now experienced. Many crawler frameworks default to http1.1 protocols and even do not support http2.0 protocols, but currently, the factories detecting http versions are few, and most of the factory http2.0 interfaces are compatible with http 1.1. In addition, each frame bottom package has corresponding features. A default request header is set in the python's requests library:
def default_headers():
:rtype:requests.structures.CaseInsensitiveDict
return CaseInsensitiveDict({
'User-Agent':default_user_agent(),
'Accept-Encoding':','.join(('gzip','deflate')),
'Accept':'*/*',
'Connection':'keep-alive',
likewise, a default request header is also encapsulated in httpx library:
@headers.setter
def headers(self,headers:HeaderTypes)->None:
client_headers=Headers(
b"Accept":b"*/*",
b"Accept-Encoding":ACCEPT_ENCODING.encode("ascii"),
b"Connection":b"keep-alive",
b"User-Agent":USER_AGENT.encode("ascii"),
client_headers.update(headers)
self._headers=client_headers
that is, there is a default request header in the requests library and httpx library, which is characterized in that the user-agent has a default value, and similarly, the bottom layer of the request library encapsulates and sends a default value even if the user does not transfer the fields such as accept.
The server can directly take the user-agents as wind control points, and the user-agents are the places where the manufacturers detect the head most at present, and only need to shield the user-agents. However, the behaviors such as crawlers can set user-agent by themselves instead of using self-contained server, and the server can further check the request header by using signature more hidden. When the method is specifically designed, only a few changes are needed on the http frame structure, the header does not transmit the accept when the client sends the package, and the header is added when the client calculates the signature. Thus, even if the crawler calculates the same signature, the default band of the framework used in the sending of the package is accept: * The request header of/, our server will still recognize the abnormal signature.
Based on the above method, an ampere Zhuo Duan anti-climbing device in this embodiment includes: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor is configured to invoke the machine-readable program to perform an ampere Zhuo Duan anti-crawling method.
The above-mentioned specific embodiments are merely specific examples of the present invention, and the scope of the present invention includes, but is not limited to, the above-mentioned specific embodiments, any suitable changes or substitutions made by one of ordinary skill in the art, which are consistent with an ampere Zhuo Duan anti-climbing method and apparatus claims of the present invention, shall fall within the scope of the present invention.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (2)

1. A security Zhuo Duan reverse climbing method is characterized in that firstly, in a data encryption mode, an asymmetric encryption algorithm RSA is selected, and reverse climbing wind control is carried out according to a default filling mode which is An Zhuoduan different from a standard jdk;
carrying out one-step data compression before data encryption, selecting an http2.0 frame when carrying out an http or https request, and carrying out anti-climbing wind control according to the difference of different http frames;
encrypting is achieved in the android client through a cipher. GetInstance, the android system uses a dalvik virtual machine, and when encrypting through a cipher. GetInstance method, wind control identification is carried out according to the difference between a default filling mode of RSA under the android and a standard jdk;
when the black ash is generated and is reversely output from an encryption protocol, the encryption is carried out by the same method of cipher. Getinstance and the request is sent, jdk based on SUN standard is used, and the default filling algorithm of RSA is PKCS1Padding;
after receiving the data reversely output by the black ash production, the server side can generate error of Java, crypto, badPaddingException, namely Decryption error when analyzing the data, and the other side can not request success;
in a data compression mode, a compression algorithm selects a gzip algorithm in data transmission, and anti-climbing wind control is performed according to characteristics of gzip libraries under different platforms;
the file characteristic of Gzip is 1f8b, the server detects the ignored field of the compressed data head, to assist in distinguishing abnormal behavior request;
when an http or https request is carried out, the server side marks packets sent by other different packages as abnormal requests through packets sent by an http frame of An Zhuoduan;
directly taking a user-agent as an air control point at a server, checking a request head by using a signature, wherein a header does not transmit an accept when the http frame is wrapped, and adding the header when the client calculates the signature;
even though the crawler has computed the same signature, the default band of the framework used in the sending of the package is accept: * The server also recognizes the abnormal signature for the request header.
2. An ampere Zhuo Duan reverse climbing device, comprising: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor configured to invoke the machine readable program to perform the method of claim 1.
CN202211156703.4A 2022-09-22 2022-09-22 Method and device for preventing climbing of An Zhuo Duan Active CN115632817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211156703.4A CN115632817B (en) 2022-09-22 2022-09-22 Method and device for preventing climbing of An Zhuo Duan

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211156703.4A CN115632817B (en) 2022-09-22 2022-09-22 Method and device for preventing climbing of An Zhuo Duan

Publications (2)

Publication Number Publication Date
CN115632817A CN115632817A (en) 2023-01-20
CN115632817B true CN115632817B (en) 2023-09-05

Family

ID=84903646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211156703.4A Active CN115632817B (en) 2022-09-22 2022-09-22 Method and device for preventing climbing of An Zhuo Duan

Country Status (1)

Country Link
CN (1) CN115632817B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446068A (en) * 2016-09-06 2017-02-22 北京邮电大学 Directory database generation and query methods and apparatuses
WO2017190641A1 (en) * 2016-05-03 2017-11-09 北京京东尚科信息技术有限公司 Crawler interception method and device, server terminal and computer readable medium
WO2018120722A1 (en) * 2016-12-30 2018-07-05 上海壹账通金融科技有限公司 Asynchronous interface testing method, terminal, device, system, and storage medium
CN110636064A (en) * 2019-09-23 2019-12-31 浪潮软件集团有限公司 High-speed encrypted data synchronization method and system based on GZIP compression
CN111241541A (en) * 2019-12-04 2020-06-05 珠海横琴电享科技有限公司 System and method for preventing crawling insects according to request data
CN111817845A (en) * 2019-04-11 2020-10-23 亿度慧达教育科技(北京)有限公司 Anti-crawler method and computer storage medium
CN112134905A (en) * 2020-11-20 2020-12-25 深圳市房多多网络科技有限公司 Android system based signature method, device and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7610400B2 (en) * 2004-11-23 2009-10-27 Juniper Networks, Inc. Rule-based networking device
US7634572B2 (en) * 2004-12-22 2009-12-15 Slipstream Data Inc. Browser-plugin based method for advanced HTTPS data processing
US11463242B2 (en) * 2020-05-19 2022-10-04 International Business Machines Corporation Padding oracle elimination in RSA encryption

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017190641A1 (en) * 2016-05-03 2017-11-09 北京京东尚科信息技术有限公司 Crawler interception method and device, server terminal and computer readable medium
CN106446068A (en) * 2016-09-06 2017-02-22 北京邮电大学 Directory database generation and query methods and apparatuses
WO2018120722A1 (en) * 2016-12-30 2018-07-05 上海壹账通金融科技有限公司 Asynchronous interface testing method, terminal, device, system, and storage medium
CN111817845A (en) * 2019-04-11 2020-10-23 亿度慧达教育科技(北京)有限公司 Anti-crawler method and computer storage medium
CN110636064A (en) * 2019-09-23 2019-12-31 浪潮软件集团有限公司 High-speed encrypted data synchronization method and system based on GZIP compression
CN111241541A (en) * 2019-12-04 2020-06-05 珠海横琴电享科技有限公司 System and method for preventing crawling insects according to request data
CN112134905A (en) * 2020-11-20 2020-12-25 深圳市房多多网络科技有限公司 Android system based signature method, device and equipment

Also Published As

Publication number Publication date
CN115632817A (en) 2023-01-20

Similar Documents

Publication Publication Date Title
CN106506440B (en) Method for verifying data integrity
CN107749848B (en) Internet of things data processing method and device and Internet of things system
CN107579991B (en) Method for performing cloud protection authentication on client, server and client
CN105530253B (en) Wireless sensor network access authentication method under Restful framework based on CA certificate
US10869198B2 (en) Wireless system access control method and device
EP3157195B1 (en) Communication protocol testing method, and tested device and testing platform thereof
US11303453B2 (en) Method for securing communication without management of states
CN109714360B (en) Intelligent gateway and gateway communication processing method
EP1523149A2 (en) Encryption error monitoring system and method for packet transmission
CN107360187A (en) A kind of processing method of network abduction, apparatus and system
Velasco et al. Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs
US20010043616A1 (en) Transcoding in data communications
CN112699374A (en) Integrity checking vulnerability security protection method and system
CN114244530A (en) Resource access method and device, electronic equipment and computer readable storage medium
TWI820064B (en) Securing digital data transmission in a communication network
CN114978637A (en) Message processing method and device
CN115632817B (en) Method and device for preventing climbing of An Zhuo Duan
CN113726895A (en) File transmission method and device and network KTV system
CN116405734B (en) Data transmission method and system for ensuring data security
CN110417804B (en) Bidirectional identity authentication encryption communication method and system suitable for single-chip microcomputer implementation
CN112583807A (en) Verification method, verification device, electronic equipment and storage medium
US11463872B2 (en) Singularisation of frames to be transmitted by a connected object and blocking of frames retransmitted over a low-power wireless communication network
CN106789076B (en) Interaction method and device for server and intelligent equipment
CN116032548A (en) Access authentication method and device of Internet of things, terminal equipment and gateway equipment
CN114978769A (en) Unidirectional lead-in device, method, medium, and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant