Webpagehanging trojan detecting and protecting method and system as well as method for extracting corresponding code

A webpage hanging horse and protection system technology, applied in the field of network security, can solve problems such as difficult to extract tag codes, and achieve the effect of improving performance

Inactive Publication Date: 2012-07-04
BEIJING VENUS INFORMATION TECH +1
View PDF6 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] An object of the present invention is to provide a method for extracting the code of the label associated with the web page hang

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpagehanging trojan detecting and protecting method and system as well as method for extracting corresponding code
  • Webpagehanging trojan detecting and protecting method and system as well as method for extracting corresponding code
  • Webpagehanging trojan detecting and protecting method and system as well as method for extracting corresponding code

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0110]The present embodiment relates to a method for extracting the code of the label related to the web page hanging horse in the web page, including:

[0111] Step 10, the network security protection system (also referred to as the system in the text) injects a section of script code for automatically extracting tags into the intercepted Web page, and then sends the Web page to the client;

[0112] Wherein, the above-mentioned script code is configured as follows: when the client opens the injected web page, the script code is triggered to run automatically, and the code of the label related to the webpage hanging horse is extracted from the web page, and the code of the extracted label is combined with the code of the web page The URL itself is sent to the system, where the code of the extracted tag contains the URL to be detected.

[0113] The above script code may include startup extraction code and label extraction code, wherein:

[0114] The tag extraction code include...

no. 2 example

[0125] This embodiment relates to the detection of a web page Trojan, mainly for detecting the URL in the code of the tag related to the web page Trojan extracted from the web page, and judging its security level.

[0126] Usually, the system sets multiple security levels for URLs. When there are only two security levels, it is equivalent to only judging whether the URL is safe or not. When there are more than three security levels, a more precise indication of the security level of the URL can be made. For example, in one example, 5 security levels, security level 1 to security level 5, are set for the URL. Security level 1 has the highest security level, that is, the safest, and security level 5 has the lowest security level, that is, the least safe or the most dangerous.

[0127] Part of the security level can be set to indicate that the URL is safe, and another part of the security level can be set to indicate that the URL is not safe, such as being set by the administrat...

no. 3 example

[0185] This embodiment relates to a method for detecting and protecting a Trojan on a web page. Wherein, the webpage Trojan detection adopted may be the same as that in the second embodiment. This embodiment mainly discusses how to start the detection of Trojan Trojans on webpages, so as to avoid frequent detections that occupy too many computing resources, or failure to detect Trojan Trojans on webpages in time.

[0186] After the network security protection system detects the web page Trojan, it also records the identification information of the Web page, the security level related to the web page and Trojan, and the detection time in the Web page security level table, and the Web page can The URL of the Web page itself can be identified. In the Web page security level table, unsafe URLs in the Web page or URLs other than safe URLs can also be recorded. Then use the Web page security level table to realize security protection.

[0187] Such as Figure 4 As shown, the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a webpagehanging trojan detecting and protecting method and a webpagehanging trojan detecting and protecting system, as well as a method for extracting a corresponding code. The system injects a section of script code for automatically extracting a tag into an intercepted Web page and sends the Web page to a client side; the client side runs the script code, extracts the code of the tag related to the webpage hanging horse, and sends the code and a URL (Uniform Resource Locator) of the Web page to the system; and the system can match a URL to be detected with a safe URL in a corresponding baseline, if match is failed, abnormal detection is carried out on the URL to be detected, so that the security level is confirmed. The webpagehanging trojan detecting and protecting method and the webpagehanging trojan detecting and protecting system as well as the method for extracting the corresponding code have small dependence on the environment, failure in report can be reduced, and the code of the tag can be effectively extracted.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for detecting and protecting webpage trojans, a method for extracting tag codes related to webpage trojans, and a webpage trojan detection system. Background technique [0002] Trojans on web pages are the most important means of spreading malware. [0003] After nearly two decades of development, the current scale of the Internet has become very large, especially the Web business, which is one of the main services of the Internet, has achieved rapid development, which has brought great convenience for people to obtain information. At the same time, the security status of those Web sites that provide Web services to people is worrying, and the most common security problem is that the web pages of the Web sites are hacked. At present, more than 90% of Trojan horses and viruses are transmitted by using webpages linked to horses. Early web page Trojans were implemented by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 肖小剑叶润国
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products