A method and device for detecting black chains

A black chain, to-be-detected technology, applied in the field of black chain detection, can solve the problems of difficulty in timely and effective detection, waste of human resources, and inability to realize automatic detection of black chains.

Active Publication Date: 2017-12-12
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above black chain detection methods all require a lot of manual operations. On the one hand, human resources are wasted, and higher requirements are placed on the black chain knowledge of website managers, which makes automatic detection of black chains impossible; on the other hand, for newly emerging black chains Chain cheating method, it is difficult to find out in time and effectively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for detecting black chains
  • A method and device for detecting black chains
  • A method and device for detecting black chains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1The flow chart of the method for detecting black links provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method may include the following steps:

[0054] Step 101: Match the URL of the webpage to be detected with the existing whitelist database, if the webpage to be detected exists in the whitelist database, determine that there is no black link in the webpage to be detected, and end the process; otherwise, execute step 102.

[0055] When performing black chain detection, you can first call the whitelist database for detection. In the embodiment of the present invention, the urls of the confirmed webpages that are not linked to black links can be stored in the whitelist database in advance, and the whitelist database can be a dynamically updated database, which can be added manually or in In step 104 of this embodiment, when it is determined that a hyperlink is safe, the hyperlink is added to the whitelist database.

[0056] Th...

Embodiment 2

[0078] figure 2 The flow chart for detecting the visual feature parameters of hyperlinks provided by Embodiment 2 of the present invention, such as figure 2 As shown, the process may specifically include the following steps:

[0079] Step 201: Obtain color setting parameters of hyperlinks.

[0080] Step 202: Determine whether the color setting parameter is consistent with the webpage background color setting of the detected webpage, if yes, determine that the hyperlink is a suspicious link; otherwise, execute step 203.

[0081] If the color setting of the hyperlink is consistent with the background color setting of the webpage it is linked to, in this case, the hyperlink is not easy to be detected, and it is likely to be a black link. The implementation code of this black chain is:

[0082] keywords

[0083] Step 203: Obtain the font size (font-size) parameter and font height (line-size) parameter of the hyperlink.

[0084] This step is to obtain the font parameters o...

Embodiment 3

[0134] In this embodiment, the mining process of the malicious feature database is mainly described. First, the mining source of the malicious database is explained. There are mainly two sources here:

[0135] The first source: other hyperlinks in web pages containing black links. If it is determined that a certain link is a black link, it means that there is a loophole in the web page where the link is linked, and other black links are likely to be linked. Therefore, the web page containing the link in the malicious feature database can be obtained from the web page library. , the other hyperlinks in the webpage are executed one by one in the method of detecting black links described in step 103 to step 106 in the first embodiment of the present invention to detect whether other hyperlinks are black links. Of course, as described in Embodiment 1, only the method of step 103 may be used to detect black links, or steps 103 to 104 may be used to detect black links. If it is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and device for detecting black links, wherein the method includes: extracting hyperlinks of webpages to be detected, and performing a black link detection process for the obtained hyperlinks one by one, and the black chain detection process includes: judging the hyperlink Whether the visual feature parameters meet the preset invisible feature requirements, if so, determine that the hyperlink is a black link, and further combine the number of external link references and the detection method of the malicious feature database to automatically realize black link detection without manual operation , is no longer limited by the webmaster’s knowledge of black links, and can discover new black links in a timely and effective manner.

Description

【Technical field】 [0001] The invention relates to the technical field of computer security, in particular to a method and device for detecting black chains. 【Background technique】 [0002] Black links, also known as dark links and hidden links, are quite common methods in black hat techniques. They refer to the reverse links of other web pages obtained by abnormal means. The most common black links are obtained through various web program loopholes. The management authority code (Webshell) of a webpage with a higher search engine weight or page rank (PR), and then link your own webpage on the hacked webpage. This method is one of the most effective and fastest methods of cheating in search engines, and it is especially used in profiteering industries, such as games, cheats, ring tones and other businesses. [0003] Existing black chain detection methods mainly include the following: [0004] First, the website administrator checks whether the webpage is linked to a black l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/56
Inventor 周向荣
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products