Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device, method and system for detecting spamming links

A malicious link and malicious technology, which is applied in the field of network security management equipment to detect malicious links, can solve the problems of the detection system, the failure to detect the website linked to the horse, and the failure to return the URL to achieve the effect of rapid detection

Active Publication Date: 2013-04-03
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this detection system based on client-side detection, because the malicious attack code embedded in the hacker can stop at any time, it is often impossible to detect malicious behavior, and it is impossible to return the attacked URL to the server-side detection system. The detection method is relatively passive
Therefore, this solution cannot quickly discover and detect as many websites that hang horses as possible, and also cannot detect as many websites that hang horses as possible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device, method and system for detecting spamming links
  • Device, method and system for detecting spamming links
  • Device, method and system for detecting spamming links

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0031] Embodiments of the invention may be applied to computer systems / servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and / or configurations suitable for use with computer systems / servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device, a method and a system for detecting spamming links. The device comprises a second behavior detector, a second obtainer and a second link detector, wherein, the second behavior detector is configured for detecting suspicious behaviors on network resources, and transmitting detected suspicious behaviors to a server device for further detection, the second obtainer is configured for obtaining a dangerous spamming website host name collection and a dangerous spamming link collection which are determined by the server device on the basis of the suspicious links provided by the second behavior detector, the second link detector is configured for detecting new suspicious links according to the dangerous spamming website host name collection and the dangerous spamming link collection which are obtained by the second obtainer, and transmitting the new suspicious links to the server device to detect and renew relevant spamming values, and other links embedded in the new suspicious links hit the dangerous spamming website host name collection or the dangerous spamming link collection.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network security management device, detection device, method and system for detecting malicious links. Background technique [0002] With the development of the Internet, the attack methods of various computer malicious programs are becoming more and more endless. For example, there are various methods of attacking malicious programs like hanging horses, such as SQL (StructuredQuery Language) injection, website sensitive file scanning, server vulnerabilities, website program 0day and other methods to obtain the website administrator account, Then log in to the background of the website, and obtain a webshell (script attack tool for web intrusion) through database backup / restore or uploading vulnerabilities. Use the obtained webshell to modify the content of the website page, and add malicious redirection code to the page. It is also possible to directly obtain the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 李晓波刘起
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products