Web search results security sorting method based on Hits algorithm

A technology of search results and sorting methods, which is applied in the field of network security, can solve problems such as endangering the information security of users' computer terminals, reduce the probability of accessing unsafe web pages, and enhance Web security.

Inactive Publication Date: 2012-09-12
FUJIAN NORMAL UNIV
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These webpages adopt cheating means and take advantage of the limitations of search engines, so that some malicious pages are hidden in the top positions of the search results, which may greatly endanger the information security of users' computers and other terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web search results security sorting method based on Hits algorithm
  • Web search results security sorting method based on Hits algorithm
  • Web search results security sorting method based on Hits algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention is based on the Hits algorithm-based Web search result security sorting method, and establishes a malicious feature library F ( f 1 , f 2 , f 3 , … , f n ), the malicious signature database contains n A network virus, a Trojan horse, and a feature code that appear in a web page, and each feature code of the malicious feature database f i represented by m The vector form composed of components, namely f i =( f i1, f i2 , f i3 , … , f im ),in i ∈{1,2,…, n}, f i ∈ F ; Then, based on the Hits algorithm, the security ranking of webpages is performed according to the following steps:

[0022] Step 1: Submit the search topic to the text-based search engine, and take the top page from the set of returned result pages t A collection of web pages, denoted as the root set R ; to the root set R root set R Referrers and Referrer Root Sets R web pages, after processing internal links and irrelevant links, the root set R ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, specifically to a Web search results security sorting method based on a Hits algorithm. The method comprises the following steps: establishing a malicious feature library F (f1, f2, f3, ..., fn), wherein the malicious feature library comprises n types feature codes that network virus, trojan and bugs are appeared in webpages; expressing each feature code of the malicious feature library as a vector form composed of m components, namely fx= (fx1 fx2, fx3, ..., fxm), wherein x belongs to a set of (1, 2,..., n), and fx belongs to F; the weight of each component is expressed by f'x; then, combining a vector space model with a malicious feature library so as to sorting webpage search results security. According to the web search results security sorting method provided by the invention, sorting of malicious webpages in the search results is reduced, therefore, probability of accessing insecure webpages is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a security sorting method for Web search results based on the Hits algorithm. Background technique [0002] With the rapid development of the Internet, the exponential growth of Web resources makes the management of Web resources more difficult. Today, a large number of malicious webpages hiding programs such as Trojan horses, viruses, and illegal advertisements are flooding the Web network. These webpages adopt cheating means and take advantage of the limitations of search engines, so that some malicious pages are hidden in the top positions of the search results, which may greatly endanger the information security of users' computers and other terminals. It can be seen that it is imminent to solve and improve the problem of Web security. Contents of the invention [0003] The purpose of the present invention is to provide a security sorting method of Web search res...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L29/06
Inventor 陈志德郭扬富许力
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products