Method and device for collecting keyword related URL (uniform resource locator) by search engine
A search engine and collection device technology, applied in the computer field, can solve problems such as user poisoning and user security threats, and achieve the effects of reducing losses, protecting system security, and improving operating efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] This embodiment discloses a method for collecting URLs related to keywords by using a search engine, which mainly includes the following steps:
[0031] 1) Search keywords to obtain the URL of the web page corresponding to the keywords.
[0032] Specifically, the keyword to be searched at the beginning is a preset keyword, and the preset keyword can be manually collected and input, and the collected keyword is generally a hot word on the Internet. Malicious websites mostly use hot words on the Internet to increase their click-through rate. For example: mobile phones, recharge cards, games or currently popular keywords, etc. By inputting these hot words on the Internet and using commonly used search engines, users can obtain multiple web page search results. According to the matching degree of the search results and the ranking factors of each search engine, the ranking position of the URL of each web page is different. Users generally only look at the first ten pages...
Embodiment 2
[0044] This embodiment includes a device for collecting URLs related to keywords using a search engine. The device includes a search module 1 for searching for keywords and obtaining URLs of webpages corresponding to keywords; judging and extracting for judging that the obtained webpage URLs are malicious URLs or trustworthy URLs or suspicious URLs and extracting webpage content Module 2; a keyword judging module 3 for judging whether any malicious URL webpage content has the same keyword, and if so, the keyword is an associated keyword. It also includes a blacklist database 4 for storing pre-malicious URLs, a whitelist database 5 for storing trusted URLs, and a keyword database 6 for storing keywords.
[0045] The keywords stored in the keyword database 6 are manually collected and input or obtained through searching. The preset keywords are generally hot words on the Internet. Malicious websites mostly use hot words on the Internet to increase their click-through rate. Fo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 