Method and device for identifying malicious website

A malicious website and identification method technology, applied in the direction of platform integrity maintenance, etc., can solve the problem that malicious websites cannot be identified and processed, and achieve the effect of improving identification efficiency

Inactive Publication Date: 2013-12-18
BEIJING QIHOO TECH CO LTD +1
View PDF9 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, both of the above two technologies are based on URL comparison, which requires pre-obtaining and storing URLs of malicious websites. Therefore, only known malicious websites can be identified and filtered, and unknown malicious websites cannot be identified and filtered. deal with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying malicious website
  • Method and device for identifying malicious website
  • Method and device for identifying malicious website

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] This embodiment is a specific application scenario of the present invention. Through this embodiment, the method provided by the present invention can be described more clearly and specifically.

[0099] figure 1 A flow chart of a method for identifying a malicious website according to an embodiment of the present invention is shown. The method specifically includes steps S101 to S106.

[0100] S101. Obtain the website name and website list page name of the website to be visited by the user.

[0101] In this embodiment, the website name and website list page name are identification information of the website, which represent the function or content of the website. When developers name a website, they generally name it according to the function or content it contains. In addition, when a user visits a certain website, the website will display multiple content-categorized pages to the user through the website list page, so that the user can select the link of interest ...

Embodiment 2

[0147] This embodiment is another specific application scenario of the present invention. Through this embodiment, the method provided by the present invention can be described more clearly and specifically.

[0148] image 3 A flow chart of a method for identifying a malicious website according to another embodiment of the present invention is shown. The method specifically includes steps S301 to S306.

[0149] Step S301, obtaining the name of the website or the name of the website list page to be visited by the user.

[0150] The name of the website or the name of the website list page in this embodiment has been introduced in detail in the first embodiment above, and will not be repeated here.

[0151] It should be noted that when the obtained website identification information is only the website name or only the name of the website list page, the malicious website identification method adopted in this embodiment is the same. In order to introduce the method provided by...

Embodiment 3

[0178] Figure 5 A block diagram of an apparatus for identifying a malicious website according to another embodiment of the present invention is shown. The device 600 includes:

[0179] The memory 601 is configured to store a keyword library containing malicious keywords;

[0180] a user input interface 602 configured to receive an instruction from a user to visit a website;

[0181] An information acquirer 603, coupled to the user input interface 602, configured to acquire identification information of the website to be visited;

[0182] The information matcher 604 is coupled with the above-mentioned memory 601 and the information acquirer 603, configured to read the memory 601 and the information acquirer 603, and match the identification information with the malicious keywords in the keyword library;

[0183] The malicious website identifier 605 is coupled with the information matching unit 604 and is configured to identify the website as a malicious website if the infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for identifying a malicious website. The method comprises the steps of obtaining identity information of a to-be-accessed website; matching the identity information with malicious key words in a pre-stored key word bank; in the case of successful matching, identifying the website as the malicious website. No matter whether the malicious website is known or unknown, the malicious website can be identified through the method and the device for identifying the malicious website; the defect that only the known websites can be identified in the prior art is overcome.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for identifying a malicious website. Background technique [0002] Malicious websites are illegal websites such as viruses, worms, and Trojan horses that intentionally perform malicious tasks on a computer system. These types of websites all have a common feature, they usually allow people to browse the content of the page normally in the form of a certain web page, and at the same time illegally obtain various data in the user's computer. Nowadays, malicious websites are the main factor affecting the user's network environment, and their identification has become one of the important tasks to ensure network security. At present, the following two technologies are usually used to identify malicious websites. [0003] The first type is to store the IP (Internet Protocol, protocol for interconnection between networks) address of the malicious website and the corresp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 朱珊珊林英杰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products