Method and device for detecting black chain

A black chain, waiting to be detected technology, applied in the field of black chain detection, can solve problems such as difficulty in timely and effective detection, waste of human resources, and inability to realize automatic detection of black chains

Active Publication Date: 2012-08-01
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above black chain detection methods all require a lot of manual operations. On the one hand, human resources are wasted, and higher requirements are placed on the black chain knowledge of we

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting black chain
  • Method and device for detecting black chain
  • Method and device for detecting black chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1The flow chart of the method for detecting black links provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method may include the following steps:

[0054] Step 101: Match the URL of the webpage to be detected with the existing whitelist database, if the webpage to be detected exists in the whitelist database, determine that there is no black link in the webpage to be detected, and end the process; otherwise, execute step 102.

[0055] When performing black chain detection, you can first call the whitelist database for detection. In the embodiment of the present invention, the urls of the confirmed webpages that are not linked to black links can be stored in the whitelist database in advance, and the whitelist database can be a dynamically updated database, which can be added manually or in In step 104 of this embodiment, when it is determined that a hyperlink is safe, the hyperlink is added to the whitelist database.

[0056] Th...

Embodiment 2

[0078] figure 2 The flow chart for detecting the visual feature parameters of hyperlinks provided by Embodiment 2 of the present invention, such as figure 2 As shown, the process may specifically include the following steps:

[0079] Step 201: Obtain color setting parameters of hyperlinks.

[0080] Step 202: Determine whether the color setting parameter is consistent with the webpage background color setting of the detected webpage, if yes, determine that the hyperlink is a suspicious link; otherwise, execute step 203.

[0081] If the color setting of the hyperlink is consistent with the background color setting of the webpage it is linked to, in this case, the hyperlink is not easy to be detected, and it is likely to be a black link. The implementation code of this black chain is:

[0082] Keywords

[0083] Step 203: Obtain the font size (font-size) parameter and font height (line-size) parameter of the hyperlink.

[0084] This step is to obtain the font parameters of ...

Embodiment 3

[0134] In this embodiment, the mining process of the malicious feature database is mainly described. First, the mining source of the malicious database is explained. There are mainly two sources here:

[0135] The first source: other hyperlinks in web pages containing black links. If it is determined that a certain link is a black link, it means that there is a loophole in the web page where the link is linked, and other black links are likely to be linked. Therefore, the web page containing the link in the malicious feature database can be obtained from the web page library. , the other hyperlinks in the webpage are executed one by one in the method of detecting black links described in step 103 to step 106 in the first embodiment of the present invention to detect whether other hyperlinks are black links. Of course, as described in Embodiment 1, only the method of step 103 may be used to detect black links, or steps 103 to 104 may be used to detect black links. If it is det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for detecting a black chain, which includes extracting hyperlinks of a webpage to be detected and executing the black chain detection process on obtained hyperlinks one by one. The black chain detection process comprises judging whether vision characteristic parameter of the hyperlinks meets requirements of preset invisible characteristics, determining that the hyperlink is the black chain on yes judgment and automatically achieving black chain detection without manual operation by being further combined with detection modes of outer chain citation times and malice characteristic databases. The method and the device are not limited by grasp degree of a webpage administrator on black chain knowledge and can timely and effectively find emerging black chains.

Description

【Technical field】 [0001] The invention relates to the technical field of computer security, in particular to a method and device for detecting black chains. 【Background technique】 [0002] Black links, also known as dark links and hidden links, are quite common methods in black hat techniques. They refer to the reverse links of other web pages obtained by abnormal means. The most common black links are obtained through various web program loopholes. The management authority code (Webshell) of a webpage with a higher search engine weight or page rank (PR), and then link your own webpage on the hacked webpage. This method is one of the most effective and fastest methods of cheating in search engines, and it is especially used in profiteering industries, such as games, cheats, ring tones and other businesses. [0003] Existing black chain detection methods mainly include the following: [0004] First, the website administrator checks whether the webpage is linked to a black l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F21/00G06F21/56
Inventor 周向荣
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products