Method, terminal and server for detecting phishing attack

A technology of phishing and detection methods, which is applied in the field of computer security, can solve problems such as difficulty in ensuring coverage and poor detection effect, and achieve the effects of easy maintenance and optimization, low computational complexity, and high detection coverage

Inactive Publication Date: 2014-01-08
HUAWEI TECH CO LTD
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of computer technology, new phishing links emerge in an endless stream. This dete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal and server for detecting phishing attack
  • Method, terminal and server for detecting phishing attack
  • Method, terminal and server for detecting phishing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0061] Phishing attacks generally attempt to attack in two ways:

[0062] First, the attacker, such as a hacker, sends a disguised email to the attacked person, such as a network user, in which there is a hidden link for downloading malicious software placed by the hacker. After the network user is induced to click the link, it will automatically download the malware to the local and run it. The malware will add a self-starting item to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for detecting a phishing attack. The method comprises the following steps of recording the occurrence time of a communication application operating event and the occurrence time of a new self-starting item event of an operating system by a terminal; computing the time difference between the occurrence time of the new self-starting item event and the occurrence time of the communication application operating event; judging that the communication application operating event is a phishing attack event if the communication application operating event occurs before the new self-starting item event and the time difference between the occurrence time of the communication application operating event and the occurrence time of the new self-starting item event is smaller than a preset time threshold value. According to the scheme, computation and judgment are performed by using the occurrence time dimensions of the communication application operating event and the self-starting item event of the operating system, and therefore, the phishing attack can be comprehensively detected, the detecting coverage is high, the computation complexity is low, and maintenance and optimization are easy.

Description

Technical field [0001] The invention relates to the field of computer security, in particular to a method, terminal and server for detecting phishing attacks. Background technique [0002] Phishing attack refers to an electronic attack method in which the attacker defrauds the trust of the attacked person in electronic communication with the attacked person (commonly such as emails, instant messages, etc.), thereby obtaining the attacked person’s private information, a common one. Called a phishing link attack, the attacker will place a link to download malware in the content. After being induced to click on the link, the attacked will download the malware to the attacked client’s client and run it, and then the malware will pass Add self-start items to achieve long-term survival. The attacker communicates with the malware remotely to collect the local private information of the attacked. [0003] At present, the technology used to detect phishing attacks is generally based on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 杨鹏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products