Method and device for detecting phishing attack
A technology of phishing and detection methods, applied in the Internet field, can solve the problems of non-detection of phishing websites, inability to identify phishing websites, limitation of anti-phishing attacks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0082] Based on the first embodiment of the device for detecting phishing attacks of the present invention, the device for detecting phishing attacks further includes:
[0083] The request processing module 50 is configured to process correspondingly the web access request requested by the client.
[0084] After comparing whether the domain name requested by the user is consistent with the domain name of the response, and detecting whether there is a phishing attack in the response web page according to the comparison result, the request processing module 50 further determines that the web access requested by the client is required according to different detection results. Request the corresponding processing performed separately.
[0085] In this embodiment, the request processing module 50 is used for:
[0086] When it is determined that there is a phishing attack in the answering webpage, the connection to the answering webpage is blocked or redirected according to the use...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 