Method and system for identifying malicious web sites

A malicious URL and URL technology, applied in the computer field, can solve the problem of low efficiency in identifying malicious URLs, and achieve the effect of reducing the number of times of calculation and identification, reducing the number of times, and improving efficiency.

Active Publication Date: 2014-05-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a method and system for identifying malicious URLs with higher identification efficiency for the problem of low efficiency in identifying malicious URLs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying malicious web sites
  • Method and system for identifying malicious web sites
  • Method and system for identifying malicious web sites

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Now surfing the Internet with computers and mobile phones has become a common behavior. As long as you surf the Internet, you will come into contact with websites. Some websites spread some bad information, and even steal visitors’ personal information, spread viruses and damage the system, etc. We put such URLs are called malicious URLs. The following embodiments disclose a method and system for identifying malicious web addresses. For ease of understanding, descriptions are now made in conjunction with mobile phone browser browsing web addresses.

[0022] Such as figure 1 As shown, a method for identifying malicious URLs includes steps:

[0023] Step S110, filter the pre-connected URL through the local URL filtering list: if the pre-connected URL is a URL allowed in the local URL filtering list, allow the pre-connected URL to connect, if the pre-connected URL When filtering the prohibited URLs in the local URL list, the pre-connected URLs are blocked. The URLs adde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for identifying malicious web sites. The method comprises the steps of filtering web addresses to be connected through a local web site filtering list; filtering the web addresses to be connected through a server web site filtering list if the web addresses to be connected are not in the local web site filtering list. The invention further discloses a system for identifying malicious web sites. By means of the method and the system, networking identification times of malicious web site are effectively reduced, calculation identification times through network servers are reduced, and accordingly, while the identification speed is improved, the internet traffic is reduced, and the malicious web site identification efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method and system for identifying malicious web addresses. Background technique [0002] Nowadays, with the rapid development of network technology, more and more people have come into contact with the Internet, and a large number of web pages have given users many choices. However, there are many malicious URLs in the URLs in the network, so that network users often encounter problems such as fraudulent deductions, false phishing, and system poisoning when surfing the Internet. [0003] The general method of identifying malicious URLs is to establish a URL database through the operating service provider, collect known malicious URLs and safe URLs as much as possible, and then let the client access the URL database, perform calculation and identification through the network server, and then send the identification result to the client . [0004] The traditional methods for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1425
Inventor 区小东汤文亮陈就标蔡颖星
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products