Whois information-based phishing website gathering, identification method and system
A technology for phishing websites and identification methods, applied in transmission systems, electrical components, etc., can solve the problem that cloud-based scanning and killing technology cannot meet the needs of security software manufacturers to provide faster and more complete protection solutions, and achieve rapid search and identification Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] A method for collecting and identifying phishing websites based on whois information mainly includes the following steps:
[0030] 1) Extract the whois information from the whois information server according to the domain name information of known phishing websites.
[0031] Obtain the website that has been judged as a phishing website from some protection software or other antivirus software, extract the domain name information of the phishing website, and extract the whois information of the phishing website from the whois information server according to the domain name information. The whois information in the whois information server includes registrant name information, registrant email information, registrant address information, registrant contact number and other information. Among them, according to the summary of anti-virus experience, virus creators fill in the registrant’s name information and registrant’s email information consistently, that is, virus creat...
Embodiment 2
[0042] A system for collecting and identifying phishing websites based on whois information, comprising a Whois information server 1, an extraction module 2, an acquisition module 3, a judging module 4, a phishing judging module 5, a suspicious website domain name database 6, a trusted website domain name database 7, a phishing Website domain name database8.
[0043] Whois information server 1 is used for storing whois information. Whois information includes registrant name information, registrant email information, registrant address information, registrant contact number and other information. Among them, according to the summary of anti-virus experience, virus creators fill in the registrant’s name information and registrant’s email information consistently, that is, virus creators create multiple phishing websites that use the same registrant’s name information or registrant’s email address. Therefore, the phishing website created by the virus maker can be found according...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 