Method and system for rapidly detecting fishing website

A technology for phishing websites and websites, applied in transmission systems, special data processing applications, instruments, etc., can solve the problem of unable to download webpage content with accurate webpage content, etc., and achieve the effect of fast and accurate detection.

Inactive Publication Date: 2014-05-14
ZHUHAI JUNTIAN ELECTRONICS TECH +3
6 Cites 8 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0013] Although the above detection method combines the advantages of the two methods, new problems have also arisen, that is, some phishing web...
View more

Abstract

The invention belongs to the computer defense technology field and specifically discloses a method and a system for rapidly detecting a fishing website. The method comprises steps that: URL of a website accessed by a client at present is transmitted to a server end for website safety property query, and a query result is fed back to the client; the website can not be recognized through query, the client is instructed to transmit webpage contents corresponding to the URL of the unrecognized website to the server end; the server end is instructed to determine website safety property according to the webpage contents. The method integrates two advantages of website safety property detection in the prior art and settles a problem caused by a web spider, and thereby more rapid and accurate detection can be realized through the method.

Application Domain

TransmissionSpecial data processing applications

Technology Topic

Web pageWeb crawler +2

Image

  • Method and system for rapidly detecting fishing website
  • Method and system for rapidly detecting fishing website

Examples

  • Experimental program(1)

Example Embodiment

[0041] Such as figure 1 As shown, this embodiment discloses a quick detection method for phishing websites, which is characterized by including the following steps:
[0042] Step1: Instruct the client to transmit the URL of the website currently visited to the server;
[0043] Step2: Instruct the server to query in its black and white list database according to the URL. The black list database stores the URLs of confirmed phishing websites, and the white list database stores the URLs of verified safe websites;
[0044] Step3A: In the blacklist database, feedback the client to intercept or prompt the phishing website, that is, if the query result is a phishing website, it will intercept the user's continued access behavior or prompt the user that the website is a phishing website. The user decides whether Continue to visit
[0045] Step3B: If in the whitelist database, the feedback client allows the user to continue to visit the current website, that is, if the query result is a safe website, so-called safe websites such as some common government websites, portal websites, etc., they are phishing The possibility of a website is very small;
[0046] Step3C: If the query cannot be recognized, the client is instructed to upload the webpage content corresponding to the URL to the server. The webpage content includes title, description, keywords, and body ;
[0047] Step4: Instruct the server to determine the security nature of the website according to the content of the webpage. The specific judgment rules can adopt existing judgment rules, such as the scheme mentioned in the background art, to extract some characteristic data from the webpage content, and according to these pre- The established rules and the extracted characteristic data are used for the determination. Since there are many existing technical means, the present invention will not be described here.
[0048] Such as figure 2 As shown, this embodiment also discloses a quick detection system for phishing websites corresponding to the above method, which includes the following modules:
[0049] Quick query module 1, which is used to transmit the URL of the website currently accessed by the client to the server to query the security nature of the website, and feed the query results back to the client;
[0050] The web content uploading module 2 instructs the client to upload the web content corresponding to the URL to the server for a website that is not recognized by the query;
[0051] The quick judgment module 3 instructs the server to judge the security nature of the website according to the content of the webpage.
[0052] Among them, the quick query module specifically includes the following sub-modules:
[0053] The client uploading submodule 11 instructs the client to transmit the URL of the website currently visited to the server;
[0054] The server-side query sub-module 12 instructs the server-side to query in its black and white list database according to the URL. The blacklist database stores the URLs of confirmed phishing websites, and the white list database stores the information of verified safe websites. URL; if it is in the blacklist database, the feedback client will intercept or prompt the phishing website; if it is in the whitelist database, the feedback client will allow the user to continue to access the current website; if the query cannot be identified, it will be executed in sequence Next steps.
[0055] Wherein, the webpage content includes title, description, keywords, and main body.
[0056] Using the method or system of this embodiment, the black and white list database can be used to quickly query and judge the confirmed phishing websites and safe websites, and the client can be made to upload its webpage content to the server according to the existing rules for the newly generated website. Quickly determine, thereby improving the detection efficiency and accuracy of the present invention.
[0057] The preferred embodiments of the present invention have been described in detail above, and it should be understood that many modifications and changes can be made according to the concept of the present invention without creative work by ordinary technologies in the art. Therefore, all technical solutions that can be obtained by those skilled in the art through logical analysis, reasoning or limited experiments based on the concept of the present invention on the basis of the prior art should fall within the protection scope determined by the claims.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Method for detecting Solanum rostratum Dunal by PCR (Polymerase Chain Reaction) primer

InactiveCN102094086AStrong specificityQuick check
Owner:ANIMAL & PLANT & FOOD INSPECTION CENT OF TIANJIN ENTRY EXIT INSPECTION & QUARANTINE BUREAU

Resistance spot welding quality detection device and method

InactiveCN112285211APoor decouplingQuick check
Owner:JILIN UNIV

Classification and recommendation of technical efficacy words

  • Quick check
  • Accurate detection
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products