Detection method and device for network phishing attacks
A technology of phishing and detection methods, applied in the Internet field, can solve problems such as inability to identify phishing websites, limit anti-phishing attacks, and fail to detect phishing websites
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0082] Based on the first embodiment of the detection device for phishing attacks of the present invention, the detection device for phishing attacks further includes:
[0083] The request processing module 50 is configured to perform corresponding processing on the web access request requested by the client.
[0084] After comparing whether the user request domain name and the response domain name are the same, and detecting whether there is a phishing attack in the response webpage according to the comparison result, the request processing module 50 further determines the web access requested by the client according to the different detection results Request the corresponding processing separately.
[0085] In this embodiment, the request processing module 50 is used to:
[0086] When it is determined that there is a phishing attack in the response webpage, the connection of the response webpage is blocked or redirected according to the user's configuration;
[0087] When it is deter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 