Detection method for phishing site

A phishing website and detection method technology, applied in the transmission system, electrical components, etc., can solve the problems of high false negative rate of detection and easy bypass of phishing website detection, and achieve the effect of increasing costs

Inactive Publication Date: 2012-07-11
PEKING UNIV
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to solve the problem that phishing website detection is easily bypassed in the prior art and the problem that the false negative rate of detection is too high, and proposes a phishing website detec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for phishing site
  • Detection method for phishing site
  • Detection method for phishing site

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0031] figure 1 It is a flow chart of the method for detecting a phishing website in this embodiment. The method can be divided into two stages: training process and detection process. In the training process stage, the credibility database is mainly established, and in the detection process stage, the detection of suspected websites is mainly completed. The method mainly includes three steps: extracting the network structure according to the seed set, obtaining the credibility database according to the pattern recognition method, and detecting phishing websites according to the credibility database. The specific implementation methods of the three steps are described below.

[0032] 1) Extract the network structure according to the seed set

[0033] Since the credibility and topology of the entire network are not known at the beginning, it is necessary to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a detection method for a phishing site. The method comprises the following steps of: firstly, extracting a backward link set of a known trusted site set and a backward link set of a known phishing site set through a backward link, and forming a network topology structure set by using each set; secondly, calculating the credibility of a site in the network topology structure set by combining a PageRank-based web page credibility algorithm and a mode recognition method to obtain a credibility database; thirdly, extracting a backward link set of a site to be detected, and searching for the credibility of a web page in the backward link set of the site to be detected from the credibility database to obtain the credibility of the site to be detected; and finally, determining the site to be detected as the phishing site if the credibility of the site to be detected is lower than a preset threshold value. According to the method, an interconnection relationship between the sites is utilized, the phishing site can be effectively detected in real time, and the method is difficult to break by malicious attacks.

Description

Technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a method for detecting phishing websites. Background technique [0002] Phishing is the criminal fraudulent process of attempting to obtain sensitive personal information such as usernames, passwords and credit card details from electronic communications by masquerading as a reputable legal entity. A typical phishing attack is to send fraudulent spam emails claiming to be from a certain bank, luring recipients to click on a webpage pretending to be the bank, and asking users to enter personal information such as user name, password, bank account number or credit card password. [0003] Since the emergence of phishing attacks, the number of phishing attacks has continued to increase rapidly in recent years, the scope has continued to rapidly expand, and the types have emerged in an endless stream, causing rapid expansion of damage. Phishing sites hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 韦韬张利华
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products