Method and device for identifying malicious resource access

A technology for resource access and resource access request, applied in transmission systems, electrical components, etc., can solve problems such as insufficient protection methods, and achieve the effect of preventing malicious access

Active Publication Date: 2020-11-27
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this protection method is not comprehensive enough, and illegal attackers still have ways (such as overcoming the key generation algorithm) to bypass the authentication of the scheduler, so as to achieve the purpose of its abnormal access
Moreover, illegal users may bypass the scheduler and directly access the cache machine to download resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying malicious resource access
  • Method and device for identifying malicious resource access
  • Method and device for identifying malicious resource access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0048] see figure 1 , is a schematic diagram of resource access control implementation in the prior art.

[0049] Step (1): the client requests the address of the dispatcher to the VPS;

[0050] Step (2): the client accesses the scheduler to obtain the address of the cache machine corresponding to Fragment 1;

[0051] Step (3): the client downloads fragment 1 according to the address of the cache machine corresponding to fragment 1;

[0052] The download of each other segment needs to repeat steps 2-3.

[0053]Wherein, in step 1, what the client requests from the VPS is the address of the scheduler; and then in step 2, according to the address of the scheduler, the client accesses the scheduler to obtain the address of the cach...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for identifying malicious resource access, which are used for determining a malicious resource access request at a download server, wherein the method comprises the following steps: receiving a resource access request of a client, analyzing the resource access request to obtain a uri corresponding to the resource; calculating a download address corresponding to the uri according to the uri; comparing the calculated download address with the ip address of the download server; if the download address is consistent with the ip address, providing resources to the client according to the resource access request; if the download address is inconsistent with the ip address, the resource access request being determined as a malicious resource access request. According to the method and the device in the invention, malicious access of illegal users who bypass the scheduler authentication or directly access the cache can be identified.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for identifying malicious resource access. Background technique [0002] At present, the playback process of online on-demand video and other resources is mainly controlled by the collaborative control of the video analysis server (VideoPlay Service, VPS), video scheduling server (scheduler for short), and video download server (cache for short) on the network side. [0003] For example, when a user watches a certain episode of a movie or a TV series, the storage of the video on the server side is not a whole file, but a slice, which may be divided into 10, 20 or more small files. files (called file shards). Taking 10 as an example, when the user accesses, first obtain the address list for downloading each segment, a total of 10 addresses correspond to 10 segments, and then download each file in order for playback; the server that stores this address lis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/1416H04L63/1441H04L67/06
Inventor 丁浩吴岩胡文
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products