Network fishing detection method and apparatus thereof

A technology of phishing and detection methods, which is applied in the field of network security, can solve problems such as being unable to cope with phishing attacks, and achieve the effect of improving detection efficiency

Active Publication Date: 2012-01-11
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a phishing detection method and device to solve the problem in the prior art that relying on user-triggered passive detection cannot cope with increasingly rampant and common phishing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network fishing detection method and apparatus thereof
  • Network fishing detection method and apparatus thereof
  • Network fishing detection method and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] In the process of realizing the present invention, the inventors found that more than 90% of the current phishing attacks are still in the traditional mode by analyzing the actual phishing report data, that is, by adopting the Uniform Universal Resource Locator (URL) that counterfeit the phishing target. , referred to as URL) and its corresponding webpage to attract and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network fishing detection method and an apparatus thereof. The method comprises the following steps: acquiring a suspected fishing host name matching a fishing object keyword; acquiring a fishing Uniform Resource Locator (URL) path corresponding to a fishing object; jointing the suspected fishing host name and the fishing URL path to form a suspected fishing URL; detecting the suspected fishing URL, and determining whether the suspected fishing URL is a fishing URL or not. According to an embodiment of the invention, through a technique of actively acquiring the suspected fishing host name matching the fishing object keyword and the fishing URL path corresponding to the fishing object, jointing them to form the suspected fishing URL, detecting the suspected fishing URL, and determining whether the suspected fishing URL is a fishing URL or not, a problem that in the prior art passive detection triggered by a user can not deal with more and more rampant and general fishing attack is overcome, early discovery of a fishing website is realized, and fishing website detection efficiency is raised.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a phishing detection method and device. Background technique [0002] Phishing refers to lure recipients to a carefully designed phishing website that is very similar to the target organization’s website by sending spam emails, etc., and obtain sensitive personal information entered by recipient users on this phishing website of cybercrime. Due to the popularity and development of e-commerce and Internet applications, the losses caused by phishing are becoming more and more serious. [0003] At present, many technical means for detecting and judging phishing attacks can be mainly divided into three categories: blacklist technology, heuristic feature detection technology and detection technology based on pattern recognition. The blacklist technology is to maintain a constantly updated list of phishing websites through user reports or comments, thereby preventing more us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12G06F17/30
CPCH04L29/06938H04L29/06G06F17/30H04L63/1483H04L29/12
Inventor 洪博耿光刚王利明肖雅丽
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products