Method for establishing malicious website database, method and device for identifying malicious website
A malicious website and establishment method technology, applied in the direction of electrical digital data processing, computer security devices, special data processing applications, etc., can solve the problems of poor timeliness, low detection efficiency, false positives, etc., to reduce false negatives, high detection accuracy efficiency, improving timeliness and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] figure 1 It is a flow chart of the establishment method of the malicious URL database provided by this embodiment, such as figure 1 As shown, the method includes:
[0060] Step S101 , associating each website domain name with corresponding site attribute information in advance, and constructing a site information association database.
[0061] A website usually includes many webpages, and each webpage has a corresponding URL, and the URL is usually expressed by url (uniform resource locator, uniform resource locator), generally in the form of access protocol + domain name. For example, the Baidu website includes many webpages, the url of the Baidu homepage is "http: / / www.baidu.com", and the domain name is "baidu.com". Because the domain name of the website is unique, a website can be represented by the domain name of the website.
[0062] For a domain name, using tools such as whois, you can query the registration information of the website corresponding to the domai...
Embodiment 2
[0105] figure 2 It is a flow chart of the method for identifying malicious URLs provided in this embodiment, such as figure 2 As shown, the method includes:
[0106] Step S201. Obtain the url to be detected, and analyze the site attribute information of the url to be detected.
[0107] For the url to be detected, extract the corresponding domain name, use whois and other tools to query the site attribute information of the url to be detected, including website name, website owner, website owner email, company name, IP address, ICP number and other information.
[0108] Step S202 , using the site attribute information obtained through parsing, to search for a malicious URL having the same attribute information as the URL to be detected in a malicious URL database, the malicious URL database is established by the method described in Embodiment 1.
[0109] In the malicious URL database constructed in the first embodiment, the site attribute information of the URLs to be detec...
Embodiment 3
[0118] image 3 It is a schematic diagram of an apparatus for establishing a malicious website database provided in this embodiment. Such as image 3 As shown, the device includes:
[0119] The site information associating module 301 is used for associating each website domain name with corresponding site attribute information in advance to build a site information associating database.
[0120] The site information associating module 301 utilizes the site attribute information of the websites existing on the Internet in advance to build a site information associating database for inquiring about the relationship between various websites.
[0121] Specifically, when constructing the site information association database, the whois tool is used to collect the registration information of the websites existing on the Internet, including the website name, website owner, contact information of the website owner, company information, IP address information, etc. . Then use web c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 