Method and system for detecting web page horse hanging

A webpage hanging horse and detection method technology, applied in the transmission system, special data processing applications, instruments, etc., can solve the problems of dangerous data detection, low efficiency, low accuracy, etc., and achieve the effect of accurate detection

Inactive Publication Date: 2011-02-02
NSFOCUS INFORMATION TECHNOLOGY CO LTD
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] It can be seen that although the prior art provides a variety of ways to detect web page Trojans, these methods all have the problems of low efficiency, low accuracy and inability to comprehensively detect various dangerous data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting web page horse hanging
  • Method and system for detecting web page horse hanging
  • Method and system for detecting web page horse hanging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0027] figure 1 A method for detecting a webpage trolling horse according to an embodiment of the present invention is shown, which is used for detecting whether dangerous data is contained in a webpage.

[0028] At step S110, web page content is acquired. The webpage content can be obtained in various known ways, for example, by constructing a client following HTTP or HTTPS to obtain the webpage content.

[0029] Then at step S120, static analysis is performed on the acquired webpage content, so as to detect HTML objects that may contain dangerous data. The content of the web page includes multiple HTML objects, such as table, title, or img, and so on. The applicant of the present invention found that dangerous data usually appears in specific HTML objects, such as iframes, frames, URL addresses referencing javascript scripts, ActiveX contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting web page horse hanging. The method is applied to detecting whether web pages contain dangerous data or not, and comprises the following steps of: acquiring web page contents; statically analyzing the acquired web page contents so as to detect web page objects which possibly contain the dangerous data; acquiring the object contents of the detected web page objects; and determining whether the object contents contain the dangerous data or not. The invention also discloses a corresponding device for detecting the web page horse hanging. The method and the system for detecting the web page horse hanging can efficiently and accurately detect whether horses are hung on the web pages or not by statically analyzing the web page contents and dynamically explaining the object contents which are executed dubiously.

Description

technical field [0001] The invention relates to the field of computer malicious code inspection, in particular to a detection method and system for detecting whether a webpage contains dangerous data, that is, whether the webpage is linked to a horse. Background technique [0002] Computer viruses, Trojan horses, spyware and malicious codes are the most important security threats to computer networks. Among the propagation paths of computer viruses, Trojan horses, spyware and malicious codes, an important path is to spread viruses, Trojan horses, spyware and malicious codes to the computers of users who visit the webpages by constructing special web pages. In the technical field, this special webpage is referred to as a webpage linked to a horse. Web page Trojan refers to the purposeful use of existing system vulnerabilities such as third-party controls or browser vulnerabilities to construct web pages containing dangerous data that can trigger vulnerabilities. When a user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/30G06F21/00G06F21/56
Inventor 温玉杰王晓明
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products