Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying phishing website

A phishing website and identification method technology, which is applied in the Internet field, can solve the problems of missed website judgment, poor identification flexibility, and low phishing identification accuracy, and achieve the effects of improving robustness, solving poor flexibility, and improving judgment accuracy

Inactive Publication Date: 2011-12-14
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned recognition technology has the following technical defects: the keyword matching recognition technology relies solely on keywords for identification, and phishing attackers can use the method of changing the description method of the language or adding noise words to make the entire page evade detection, which leads to the detection of the website. Missed judgments make the current phishing recognition accuracy rate low, and the recognition flexibility is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying phishing website
  • Method and device for identifying phishing website
  • Method and device for identifying phishing website

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 2 It is a schematic flow diagram of an embodiment of a method for identifying a phishing website in the present invention, such as figure 2 As shown, the method may include the following steps:

[0031] Step 101, the identification device of the phishing website analyzes the page information of the target website to be visited by the user to obtain the text content to be analyzed;

[0032] For example, the analysis and filtering interface module in the device for identifying phishing websites may perform the above analysis work. Wherein, the method for obtaining the page information of the target website may be as follows:

[0033] The analysis and filtering interface module can receive a phishing identification request instruction from an upper layer module or device. The upper module or device, for example, can be set in figure 1 In the server 13, it can be an upper-level user program, a gateway-side monitoring program, or an anti-phishing interface of ot...

Embodiment 2

[0051] image 3 It is a schematic flowchart of Embodiment 2 of the method for identifying a phishing website of the present invention. This embodiment takes the identification of a winning website as an example to describe the method for identifying a phishing website of the present invention in detail.

[0052] Wherein, the following steps of the recognition method of this embodiment use the semantic element knowledge base and the semantic frame knowledge base. In order to make the following description of the method steps of the present embodiment clearer, the structures of the above two knowledge bases are first described as follows: see Figure 4 , Figure 4 It is a schematic diagram of the data structure in the semantic element knowledge base in Embodiment 2 of the identification method for phishing websites of the present invention.

[0053] Specifically, the semantic element knowledge base stores many words and attributes corresponding to the words, and the semantic f...

Embodiment 3

[0091] Image 6 It is a structural schematic diagram of Embodiment 1 of an identification device for phishing websites of the present invention. The identification device can execute the method described in any embodiment of the identification method for phishing websites of the present invention. This embodiment briefly introduces the structure of the device, and the specific working method can be See the description of the method examples.

[0092] Such as Image 6 As shown, the identification device of this embodiment may include: an analysis and filtering interface module 41, a semantic extraction module 42, a fishing identification module 43, a semantic element knowledge base 44 and a semantic frame knowledge base 45; the semantic extraction module 42 includes a semantic element analysis unit 421 and semantic frame matching unit 422 .

[0093] Wherein, the analysis and filtering interface module 41 is used to analyze the page information of the target website to be visi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for identifying a phishing website, aiming to improve the judgment accuracy rate of the phishing website. The method comprises the following steps: analyzing the page information of a target website to which a user wants to access so as to obtain a text content to be analyzed; carrying out sentence and word segmentation processing on the text content to obtain the sentences in the text content and the words in each sentence; searching a preset semantic element knowledge base, wherein the semantic element knowledge base comprises words and attributes corresponding to the words, and acquiring the attributes of the words in the text content; taking a sentence as a unit, matching the sentence with the acquired each logical relation in the semantic element knowledge base, wherein the content to be matched in each logical relation at least comprises the sequence of the words, the attribute of each word and the content of at least one word; determining the sentence to hit the logical relation if the sentence is matched with the logical relations in the semantic element knowledge base; and calculating the hitting rate of the text content, and determining the target website to be a phishing website if the hitting rate is greater than or equal to a preset hitting threshold.

Description

technical field [0001] The invention relates to Internet technology, in particular to a method and device for identifying phishing websites. Background technique [0002] With the popularization of the Internet, more and more Internet businesses have developed accordingly. In the use of the Internet, some criminals deceive users by imitating real websites, that is, construct fake phishing websites. When users enter sensitive information such as user name passwords, bank card account numbers and passwords on phishing websites, the phishing websites will steal And illegally use the information entered by the user, thereby causing huge damage to the user. [0003] In the commonly used phishing website identification technology in the prior art, for example, keyword matching and identification technology can be used to extract keywords in page information, perform similarity calculation with existing keyword templates, and identify whether the website is a phishing website. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L29/08G06F21/00G06F21/56
Inventor 张健毅邵军义王骞
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products