| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/safe_browsing/browser_feature_extractor.h" | 5 #include "chrome/browser/safe_browsing/browser_feature_extractor.h" |
| 6 | 6 |
| 7 #include <map> | 7 #include <map> |
| 8 #include <utility> | 8 #include <utility> |
| 9 | 9 |
| 10 #include "base/bind.h" | 10 #include "base/bind.h" |
| (...skipping 25 matching lines...) Expand all Loading... |
| 36 | 36 |
| 37 namespace safe_browsing { | 37 namespace safe_browsing { |
| 38 | 38 |
| 39 namespace { | 39 namespace { |
| 40 | 40 |
| 41 const int kMaxMalwareIPPerRequest = 5; | 41 const int kMaxMalwareIPPerRequest = 5; |
| 42 | 42 |
| 43 void FilterBenignIpsOnIOThread( | 43 void FilterBenignIpsOnIOThread( |
| 44 scoped_refptr<SafeBrowsingDatabaseManager> database_manager, | 44 scoped_refptr<SafeBrowsingDatabaseManager> database_manager, |
| 45 IPUrlMap* ips) { | 45 IPUrlMap* ips) { |
| 46 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 46 DCHECK_CURRENTLY_ON(BrowserThread::IO); |
| 47 for (IPUrlMap::iterator it = ips->begin(); it != ips->end();) { | 47 for (IPUrlMap::iterator it = ips->begin(); it != ips->end();) { |
| 48 if (!database_manager.get() || | 48 if (!database_manager.get() || |
| 49 !database_manager->MatchMalwareIP(it->first)) { | 49 !database_manager->MatchMalwareIP(it->first)) { |
| 50 // it++ here returns a copy of the old iterator and passes it to erase. | 50 // it++ here returns a copy of the old iterator and passes it to erase. |
| 51 ips->erase(it++); | 51 ips->erase(it++); |
| 52 } else { | 52 } else { |
| 53 ++it; | 53 ++it; |
| 54 } | 54 } |
| 55 } | 55 } |
| 56 } | 56 } |
| (...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 172 DCHECK(tab); | 172 DCHECK(tab); |
| 173 } | 173 } |
| 174 | 174 |
| 175 BrowserFeatureExtractor::~BrowserFeatureExtractor() { | 175 BrowserFeatureExtractor::~BrowserFeatureExtractor() { |
| 176 weak_factory_.InvalidateWeakPtrs(); | 176 weak_factory_.InvalidateWeakPtrs(); |
| 177 } | 177 } |
| 178 | 178 |
| 179 void BrowserFeatureExtractor::ExtractFeatures(const BrowseInfo* info, | 179 void BrowserFeatureExtractor::ExtractFeatures(const BrowseInfo* info, |
| 180 ClientPhishingRequest* request, | 180 ClientPhishingRequest* request, |
| 181 const DoneCallback& callback) { | 181 const DoneCallback& callback) { |
| 182 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 182 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 183 DCHECK(request); | 183 DCHECK(request); |
| 184 DCHECK(info); | 184 DCHECK(info); |
| 185 DCHECK_EQ(0U, request->url().find("http:")); | 185 DCHECK_EQ(0U, request->url().find("http:")); |
| 186 DCHECK(!callback.is_null()); | 186 DCHECK(!callback.is_null()); |
| 187 // Extract features pertaining to this navigation. | 187 // Extract features pertaining to this navigation. |
| 188 const NavigationController& controller = tab_->GetController(); | 188 const NavigationController& controller = tab_->GetController(); |
| 189 int url_index = -1; | 189 int url_index = -1; |
| 190 int first_host_index = -1; | 190 int first_host_index = -1; |
| 191 | 191 |
| 192 GURL request_url(request->url()); | 192 GURL request_url(request->url()); |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 241 base::Bind(&BrowserFeatureExtractor::StartExtractFeatures, | 241 base::Bind(&BrowserFeatureExtractor::StartExtractFeatures, |
| 242 weak_factory_.GetWeakPtr(), | 242 weak_factory_.GetWeakPtr(), |
| 243 base::Passed(&req), | 243 base::Passed(&req), |
| 244 callback)); | 244 callback)); |
| 245 } | 245 } |
| 246 | 246 |
| 247 void BrowserFeatureExtractor::ExtractMalwareFeatures( | 247 void BrowserFeatureExtractor::ExtractMalwareFeatures( |
| 248 BrowseInfo* info, | 248 BrowseInfo* info, |
| 249 ClientMalwareRequest* request, | 249 ClientMalwareRequest* request, |
| 250 const MalwareDoneCallback& callback) { | 250 const MalwareDoneCallback& callback) { |
| 251 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 251 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 252 DCHECK(!callback.is_null()); | 252 DCHECK(!callback.is_null()); |
| 253 | 253 |
| 254 // Grab the IPs because they might go away before we're done | 254 // Grab the IPs because they might go away before we're done |
| 255 // checking them against the IP blacklist on the IO thread. | 255 // checking them against the IP blacklist on the IO thread. |
| 256 scoped_ptr<IPUrlMap> ips(new IPUrlMap); | 256 scoped_ptr<IPUrlMap> ips(new IPUrlMap); |
| 257 ips->swap(info->ips); | 257 ips->swap(info->ips); |
| 258 | 258 |
| 259 IPUrlMap* ips_ptr = ips.get(); | 259 IPUrlMap* ips_ptr = ips.get(); |
| 260 | 260 |
| 261 // The API doesn't take a scoped_ptr because the API gets mocked and we | 261 // The API doesn't take a scoped_ptr because the API gets mocked and we |
| (...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 295 request); | 295 request); |
| 296 } | 296 } |
| 297 if (info.http_status_code != 0) { | 297 if (info.http_status_code != 0) { |
| 298 AddFeature(features::kHttpStatusCode, info.http_status_code, request); | 298 AddFeature(features::kHttpStatusCode, info.http_status_code, request); |
| 299 } | 299 } |
| 300 } | 300 } |
| 301 | 301 |
| 302 void BrowserFeatureExtractor::StartExtractFeatures( | 302 void BrowserFeatureExtractor::StartExtractFeatures( |
| 303 scoped_ptr<ClientPhishingRequest> request, | 303 scoped_ptr<ClientPhishingRequest> request, |
| 304 const DoneCallback& callback) { | 304 const DoneCallback& callback) { |
| 305 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 305 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 306 history::HistoryService* history; | 306 history::HistoryService* history; |
| 307 if (!request || !request->IsInitialized() || !GetHistoryService(&history)) { | 307 if (!request || !request->IsInitialized() || !GetHistoryService(&history)) { |
| 308 callback.Run(false, request.Pass()); | 308 callback.Run(false, request.Pass()); |
| 309 return; | 309 return; |
| 310 } | 310 } |
| 311 GURL request_url(request->url()); | 311 GURL request_url(request->url()); |
| 312 history->QueryURL(request_url, | 312 history->QueryURL(request_url, |
| 313 true /* wants_visits */, | 313 true /* wants_visits */, |
| 314 base::Bind(&BrowserFeatureExtractor::QueryUrlHistoryDone, | 314 base::Bind(&BrowserFeatureExtractor::QueryUrlHistoryDone, |
| 315 base::Unretained(this), | 315 base::Unretained(this), |
| 316 base::Passed(&request), | 316 base::Passed(&request), |
| 317 callback), | 317 callback), |
| 318 &cancelable_task_tracker_); | 318 &cancelable_task_tracker_); |
| 319 } | 319 } |
| 320 | 320 |
| 321 void BrowserFeatureExtractor::QueryUrlHistoryDone( | 321 void BrowserFeatureExtractor::QueryUrlHistoryDone( |
| 322 scoped_ptr<ClientPhishingRequest> request, | 322 scoped_ptr<ClientPhishingRequest> request, |
| 323 const DoneCallback& callback, | 323 const DoneCallback& callback, |
| 324 bool success, | 324 bool success, |
| 325 const history::URLRow& row, | 325 const history::URLRow& row, |
| 326 const history::VisitVector& visits) { | 326 const history::VisitVector& visits) { |
| 327 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 327 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 328 DCHECK(request); | 328 DCHECK(request); |
| 329 DCHECK(!callback.is_null()); | 329 DCHECK(!callback.is_null()); |
| 330 if (!success) { | 330 if (!success) { |
| 331 // URL is not found in the history. In practice this should not | 331 // URL is not found in the history. In practice this should not |
| 332 // happen (unless there is a real error) because we just visited | 332 // happen (unless there is a real error) because we just visited |
| 333 // that URL. | 333 // that URL. |
| 334 callback.Run(false, request.Pass()); | 334 callback.Run(false, request.Pass()); |
| 335 return; | 335 return; |
| 336 } | 336 } |
| 337 AddFeature(features::kUrlHistoryVisitCount, | 337 AddFeature(features::kUrlHistoryVisitCount, |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 384 callback), | 384 callback), |
| 385 &cancelable_task_tracker_); | 385 &cancelable_task_tracker_); |
| 386 } | 386 } |
| 387 | 387 |
| 388 void BrowserFeatureExtractor::QueryHttpHostVisitsDone( | 388 void BrowserFeatureExtractor::QueryHttpHostVisitsDone( |
| 389 scoped_ptr<ClientPhishingRequest> request, | 389 scoped_ptr<ClientPhishingRequest> request, |
| 390 const DoneCallback& callback, | 390 const DoneCallback& callback, |
| 391 bool success, | 391 bool success, |
| 392 int num_visits, | 392 int num_visits, |
| 393 base::Time first_visit) { | 393 base::Time first_visit) { |
| 394 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 394 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 395 DCHECK(request); | 395 DCHECK(request); |
| 396 DCHECK(!callback.is_null()); | 396 DCHECK(!callback.is_null()); |
| 397 if (!success) { | 397 if (!success) { |
| 398 callback.Run(false, request.Pass()); | 398 callback.Run(false, request.Pass()); |
| 399 return; | 399 return; |
| 400 } | 400 } |
| 401 SetHostVisitsFeatures(num_visits, first_visit, true, request.get()); | 401 SetHostVisitsFeatures(num_visits, first_visit, true, request.get()); |
| 402 | 402 |
| 403 // Same lookup but for the HTTPS URL. | 403 // Same lookup but for the HTTPS URL. |
| 404 history::HistoryService* history; | 404 history::HistoryService* history; |
| (...skipping 10 matching lines...) Expand all Loading... |
| 415 callback), | 415 callback), |
| 416 &cancelable_task_tracker_); | 416 &cancelable_task_tracker_); |
| 417 } | 417 } |
| 418 | 418 |
| 419 void BrowserFeatureExtractor::QueryHttpsHostVisitsDone( | 419 void BrowserFeatureExtractor::QueryHttpsHostVisitsDone( |
| 420 scoped_ptr<ClientPhishingRequest> request, | 420 scoped_ptr<ClientPhishingRequest> request, |
| 421 const DoneCallback& callback, | 421 const DoneCallback& callback, |
| 422 bool success, | 422 bool success, |
| 423 int num_visits, | 423 int num_visits, |
| 424 base::Time first_visit) { | 424 base::Time first_visit) { |
| 425 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 425 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 426 DCHECK(request); | 426 DCHECK(request); |
| 427 DCHECK(!callback.is_null()); | 427 DCHECK(!callback.is_null()); |
| 428 if (!success) { | 428 if (!success) { |
| 429 callback.Run(false, request.Pass()); | 429 callback.Run(false, request.Pass()); |
| 430 return; | 430 return; |
| 431 } | 431 } |
| 432 SetHostVisitsFeatures(num_visits, first_visit, false, request.get()); | 432 SetHostVisitsFeatures(num_visits, first_visit, false, request.get()); |
| 433 callback.Run(true, request.Pass()); | 433 callback.Run(true, request.Pass()); |
| 434 } | 434 } |
| 435 | 435 |
| (...skipping 30 matching lines...) Expand all Loading... |
| 466 } | 466 } |
| 467 } | 467 } |
| 468 DVLOG(2) << "Unable to query history. No history service available."; | 468 DVLOG(2) << "Unable to query history. No history service available."; |
| 469 return false; | 469 return false; |
| 470 } | 470 } |
| 471 | 471 |
| 472 void BrowserFeatureExtractor::FinishExtractMalwareFeatures( | 472 void BrowserFeatureExtractor::FinishExtractMalwareFeatures( |
| 473 scoped_ptr<IPUrlMap> bad_ips, | 473 scoped_ptr<IPUrlMap> bad_ips, |
| 474 MalwareDoneCallback callback, | 474 MalwareDoneCallback callback, |
| 475 scoped_ptr<ClientMalwareRequest> request) { | 475 scoped_ptr<ClientMalwareRequest> request) { |
| 476 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 476 DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| 477 int matched_bad_ips = 0; | 477 int matched_bad_ips = 0; |
| 478 for (IPUrlMap::const_iterator it = bad_ips->begin(); | 478 for (IPUrlMap::const_iterator it = bad_ips->begin(); |
| 479 it != bad_ips->end(); ++it) { | 479 it != bad_ips->end(); ++it) { |
| 480 AddMalwareIpUrlInfo(it->first, it->second, request.get()); | 480 AddMalwareIpUrlInfo(it->first, it->second, request.get()); |
| 481 ++matched_bad_ips; | 481 ++matched_bad_ips; |
| 482 // Limit the number of matched bad IPs in one request to control | 482 // Limit the number of matched bad IPs in one request to control |
| 483 // the request's size | 483 // the request's size |
| 484 if (matched_bad_ips >= kMaxMalwareIPPerRequest) { | 484 if (matched_bad_ips >= kMaxMalwareIPPerRequest) { |
| 485 break; | 485 break; |
| 486 } | 486 } |
| 487 } | 487 } |
| 488 callback.Run(true, request.Pass()); | 488 callback.Run(true, request.Pass()); |
| 489 } | 489 } |
| 490 | 490 |
| 491 } // namespace safe_browsing | 491 } // namespace safe_browsing |
| OLD | NEW |