Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing baleful website library

A malicious URL library and processing method technology, applied to electrical components, transmission systems, etc., can solve the problem of low detection efficiency of malicious URLs, achieve wide coverage and improve detection efficiency

Inactive Publication Date: 2011-05-04
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF2 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for processing a malicious URL database, to solve the defect of low detection efficiency of malicious URLs detected by malicious URL databases in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing baleful website library
  • Method and device for processing baleful website library
  • Method and device for processing baleful website library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0031] figure 1 It is a flow chart of the processing method of the malicious URL library provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the processing method of the malicious URL library in this embodiment may specifically include:

[0032] Step 100, obtaining a malicious URL;

[0033] Specifically, the malicious...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for processing a baleful website library. The method comprises the following steps: acquiring a baleful uniform resource locator; taking a second-level domain or a third-level domain of the baleful uniform resource locator as a first uniform resource locator segment; calculating the hash value of the first uniform resource locator segment; acquiring at least one second uniform resource locator segment according to the baleful uniform resource locator; respectively calculating the hash value of the at least one second uniform resource locator segment; and storing the hash value of the first uniform resource locator segment and the hash value of the at least one second uniform resource locator segment to the baleful website library. By adopting the technical scheme of the invention, the coverage range of the hash values stored in the baleful website library is wide, so that the probability that the baleful uniform resource locator is detected in the baleful website library can effectively be increased when the paths or parameters of the baleful uniform resource locator are changed, and the efficiency of detection on the baleful uniform resource locator can be improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of network technology, and in particular, to a method and device for processing a malicious URL library. Background technique [0002] With the rapid development of the Internet, the Internet is becoming more and more important to people's lives, but various malicious websites emerge in an endless stream, such as webpage Trojans, phishing websites and so on. Malicious websites directly threaten the safety of users, so it is imperative to strengthen the monitoring of malicious websites. [0003] In the prior art, the monitoring method of malicious Uniform Resource Locator (Uniform Resource Locator; URL) is mainly to detect based on the malicious URL library formed by the hash value of the existing malicious URL. Detect malicious URLs by using the malicious URL library of malicious URLs on the client, browser, security device, and mobile phone terminal of a personal computer (Person Computer; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 马勺布郭辉吴朝花
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD