Comprehensive detection method and system for page tampering

A comprehensive detection and page technology, applied in the field of computer security, can solve the problems of page tampering, false positives and missed negatives, etc., achieve accurate detection results, and reduce false positives and false negatives.

Active Publication Date: 2013-02-20
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a comprehensive detection method and system for page

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Comprehensive detection method and system for page tampering
  • Comprehensive detection method and system for page tampering
  • Comprehensive detection method and system for page tampering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] figure 1 A schematic flowchart of a comprehensive detection method for page tampering provided by Embodiment 1 of the present invention, as shown in figure 1 Described, the comprehensive detection method of described page tampering may comprise the steps:

[0017] Step 101, acquiring attribute information of the currently detected page;

[0018] Step 102, if the attribute information of the currently detected page does not match the preset malicious attribute rules, then respectively perform page element matching, page change rate and page content detection on the currently detected page, and respectively according to the page The detection results of element matching, page change rate and page content determine whether the currently detected page is a suspected tampered page;

[0019] Step 103, if at least two detection results determine that the currently detected page is a suspected tampered page, then determine that the currently detected page is a tampered page. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a comprehensive detection method and a system for page tampering. The method includes acquiring attribute information of a current detected page; determining whether the attribute information of the current detected page matches with a prestored malicious attribute rule, if no, performing page element matching, page change rate and page content detections respectively on the current detected page, and determining whether the current detected page is a suspected tampering page according to the results of the page element matching, page change rate and page content detections; and determining the current detected page to be a tampering page if the current detected page is determined to be a suspected tampering page according to at least two detection results. According to the method and the system, multi-aspect and multi-angle detection can be performed on pages, therefore false and negative reports for page tampering are reduced, and the detection result of the page tampering can be more accurate.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a comprehensive detection method and system for page tampering. Background technique [0002] With the continuous development of Internet technology, the Internet has become an indispensable tool for people to obtain and exchange information, thus bringing a lot of convenience to people's work and life. But at the same time, Internet sites are also easy targets for hackers, and incidents of website pages being tampered with by hackers happen from time to time. Once the tampered pages are opened, it is easy to be infected with viruses on the website. [0003] At present, the monitoring technology for page tampering usually uses text similarity detection, and the text similarity detection mainly compares the text of the page to be detected with the text of the pre-stored normal page, and judges whether the page to be detected is a tampered page by setting a threshold. Fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F17/30
Inventor 张鸿勋王帅卢梁
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products