Malicious website detection method and device

A malicious website and detection method technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of timeliness and accuracy rate decline, and achieve the effect of reducing the possibility of false positives, low efficiency, and high accuracy rate

Active Publication Date: 2015-09-30
BEIJING KNOWNSEC INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For malicious codes embedded in popular malicious websites, static feature matching technology can be used to quickly detect, but this method often has the problem of decreased accuracy due to lack of timeliness, so we need to develop a combination of In addition to static features, it can also detect unknown Trojan page technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website detection method and device
  • Malicious website detection method and device
  • Malicious website detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Specific examples of the present invention will be described in detail below, but the present invention is not limited to the following specific examples.

[0051] First, the technology adopted in the present invention is introduced.

[0052] ·Honeypot Technology

[0053] Honeypot technology is essentially a derivative developed due to the development of virtual machine technology. For example, the VMWARE virtual machine software produced by the famous VMware virtual machine technology company. Its characteristic is that it can build a technology that can be controlled without affecting the real machine but can be restored to the normal state arbitrarily according to the needs of users. Using the technology of virtual machine, when the operation that may affect the real machine, the virtual machine technology will be used to build the honeypot.

[0054] ·Sandbox technology

[0055] Sandbox technology, English name sandbox. This technology is now used in computer se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious site detection method and device. The malicious site detection method comprises the steps of: acquiring a URL (Uniform Resource Locator) to be accessed; capturing a page pointed by the URL; carrying out static characteristic analysis on the data of the captured page; and if the static characteristic analysis shows that dangerous characteristics exist, carrying out dynamic behavior analysis in a Honeynet cluster. The malicious site detection device comprises an acquiring device used for acquiring the URL to be accessed, a capturing unit used for capturing the page pointed by the URL, a static analyzing unit used for carrying out static characteristic analysis on the data of the captured page, and a dynamic analyzing unit used for carrying out dynamic behavior analysis in the Honeynet cluster if the static analyzing unit shows that the dangerous characteristics exist. By adopting the technical scheme of the invention, complete website security detection can be carried out.

Description

technical field [0001] The present invention generally relates to computer network security, in particular to a malicious website detection method and device. Background technique [0002] With the development of computer and network technology, the Internet has penetrated into all aspects of people's work and life. But the security problems that follow have greatly troubled network users. There are more and more malicious acts against the Internet, which are gradually refined and form a huge black industry chain. The current overall security situation on the Internet is worrying. Among the malicious behaviors against the Internet, hanging horses on websites is one of the main malicious behaviors. The website hanging horse means that the source code content (including HTML, CSS, JS) of the website itself is embedded with malicious script codes by hackers. The strategy was breached, and Trojan horse virus programs were installed on the computers of netizens. [0003] At ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
Inventor 杨冀龙
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products