Forgery website monitoring method and system thereof

A technology for counterfeiting websites and monitoring systems, applied in transmission systems, digital transmission systems, data exchange networks, etc.

Inactive Publication Date: 2009-12-02
DONGGUAN SOUTH CHINA DESIGN INNOVATION INST
View PDF1 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when an Internet browsing user clicks a fake website, it will inevitably send a lot of requests (HTTP Request) for some resources (such as LOGO pictures, user agreements, help pages, etc.) in the real website, and now there is no way to know The site / page from which this request for a resource on the real site was made, and therefore the URLs of these sites / pages are suspicious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Forgery website monitoring method and system thereof
  • Forgery website monitoring method and system thereof
  • Forgery website monitoring method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions of the present invention will be further described in more detail in conjunction with the accompanying drawings and specific embodiments.

[0060] In one embodiment of the present invention, the present invention assumes that most fake websites contain many resources in real websites (which in fact is true in a large number of instances). In this way, when an Internet browsing user clicks a fake website, it will inevitably send a lot of requests (HTTP Request, referred to as HTTP in this manual) to some resources (such as LOGO pictures, user agreements, help pages, etc.) in the real website. request, including HTTP request header information), and in the request header information (header), there is an HTTP referrer (that is, HTTP Referer, which is a part of the HTTP request header information. When the browser sends a request to the Web server, it usually contains There is real referrer information, which tells the Web server the URL of the webp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a forgery website monitoring method and a system thereof. The method comprises the following steps: 1. HTTP request in a Web server is monitored so as to obtain HTTP request information; 2. according to an introducer parameter in the HTTP request information and a Url parameter in the HTTP request line, URL to which the introducer points is filtered to obtain a suspicious website; 3. similarity between the suspicious website and the real webpage to be protected is calculated to obtain a assessment result and send out a relevant notice. The invention can realize the monitoring to forgery websites.

Description

technical field [0001] The invention relates to a counterfeit website monitoring technology, in particular to a counterfeit website monitoring method and system thereof. Background technique [0002] With the rapid development of the Internet, its security issues continue to emerge. In addition to viruses and hacker attacks, websites (especially online financial websites such as banks) are faked to trick customers into providing personal (identity) confidential information such as passwords or credit card numbers. Also more and more. [0003] At present, there are some anti-spoofing technologies and strategies, but after analysis, it is not difficult to find that the known technologies and strategies generally have some defects and deficiencies that greatly restrict the efficiency and reliability of the anti-spoofing process. For example, some anti-spoofing technologies and strategies mainly focus on processing the "bait" used for spoofing-that is, the invitation emails sen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24
Inventor 刘文印邱彼特张加龙
Owner DONGGUAN SOUTH CHINA DESIGN INNOVATION INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products