Method for finding landing page from phishing page

A technology for phishing web pages and finding targets, applied in the field of information security

Inactive Publication Date: 2012-08-08
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is only based on the content of the webpage, and it will be powerless for a webpage with few texts and many pictures, or a webpage with text in pictures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for finding landing page from phishing page
  • Method for finding landing page from phishing page
  • Method for finding landing page from phishing page

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The purpose of the present invention is to provide a method for finding target webpages from phishing webpages. First, keywords are extracted from known phishing webpages to form a vocabulary signature; According to the results of the engine, select the most relevant ones as candidate webpages; then save the candidate webpages in the form of pictures, extract the image perception hash sequence, and calculate the Hamming distance between these webpage pictures and the phishing webpage pictures, according to the size of the distance One or more target web pages of the phishing web page may be selected.

[0055] The method by which a phishing page finds its target page requires the following steps:

[0056] Step 1) Extract the text from the webpage title, the main body and the webpage image respectively, synthesize these words, and then calculate the word frequency-inverse document frequency TF-IDF value of these words, and form a vocabulary signature from the top 5 words ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for finding a landing page from a phishing web page. The method comprises the followings: firstly, keywords are extracted from web page text and web graphics, so as to form the lexical signature of the phishing web page, then searching for the lexical signature is performed on a plurality of search engines, the front K most relevant web pages are found out by synthesizing the results of those search engines, the K web pages and the phishing web pages are kept in a picture form, an image perception hash sequence is extracted, finally, the Hamming distances between the K web graphics and the phishing web graphics can be respectively calculated, and one or more lawful web pages simulated by the phishing web page can be selected according to the sizes of the distances.

Description

technical field [0001] The invention relates to a method for searching a target webpage from a phishing webpage, which mainly searches for the target webpage from the similarity between text and image features between the phishing webpage and the corresponding target webpage, so as to update the white list required for phishing detection, It belongs to the field of information security. [0002] Background technique [0003] Phishing website is an online fraud that has become extremely rampant with the popularity of the Internet and the increase in online transactions. Phishing websites are fraudulent websites made by criminals imitating legitimate webpages. Phishing websites are usually almost identical to banking websites or other well-known websites, thereby luring website users to submit sensitive information on phishing websites, such as: user name, password, bank information, etc. Account or credit card details, etc. [0004] The most typical phishing attack process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 张卫丰田先桃张迎周周国强王慕妮周国富许碧欢陆柳敏顾赛赛
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products