×

Detecting network attacks based on a hash

  • US 9,473,516 B1
  • Filed: 09/29/2014
  • Issued: 10/18/2016
  • Est. Priority Date: 09/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • providing, by a computer system to a client device, a network-based document comprising an annotated portion and an object, the object configured to cause the client device to hash the annotated portion of the network -based document based at least in part on an access of the client to the network-based document over a data network, the access facilitated based at least in part on a domain name system record of the network-based document, the domain name system record available from a recursive name server of an Internet service provider;

    receiving, from the client device, a client hash of the annotated portion of the network-based document based at least in part on an instantiation of the object by the client device;

    generating, by the computer system, a trusted hash based at least in part on hashing a trusted version of the annotated portion of the network-based document;

    comparing, by the computer system, the client hash and the trusted hash;

    determining, based at least in part on the comparing, that the access of the client device to the network-based document involved an unauthorized redirection to the network-based document through the data network;

    generating a flag indicative of the unauthorized redirection;

    determining whether a number of unauthorized redirections through the data network exceeds a threshold based at least in part on the flag; and

    determining that the domain name system record of the network-based document available from the recursive name server of the Internet service provider has been altered based at least in part on the number of unauthorized redirections exceeding the threshold.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×