Malicious message cloud detection method and server

A server and cloud detection technology, applied in the communication field, can solve problems such as low coverage rate and slow response speed, and achieve the effect of improving processing speed

Inactive Publication Date: 2014-07-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF2 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The processing of malicious messages in the existing technology requires manual operation. Users are required to actively collect message interception rules and which messages under which website to intercept. This is a challenge for non-technical users. The coverage of message collection rules is low. A small amount of malicious messages can be covered, and the response speed is slow. Malicious messages can easily bypass interception by changing links and implanting methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious message cloud detection method and server
  • Malicious message cloud detection method and server
  • Malicious message cloud detection method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] An embodiment of the present invention provides a method for detecting a malicious message cloud, wherein the malicious message in this embodiment may specifically be a malicious advertisement, but is not limited to the advertisement. Such as figure 1 As shown, the method includes:

[0038] Step S100, obtaining the address of the webpage that needs to be authenticated. Specifically, the web page address may be a Uniform Resource Locator (URL, Uniform / Universal Resource Locator). The server may receive the URL sent by other devices and needs to identify whether it is a malicious message, or obtain the address of the webpage in other ways. Usually, the server may acquire a lot of webpage addresses at the same time, so the method may preferably include prioritizing the acquired webpage addresses, and the server may subsequently perform priority identification processing on webpage addresses with high priority.

[0039] Step S102, crawling data in the webpage from the ac...

Embodiment 2

[0053] The embodiment of the present invention provides a malicious message cloud detection method, which is similar to the first embodiment and is based on the same inventive concept. The difference is that a specific method for identifying a message in a URL as malicious is described in this embodiment. The scheme of the message is easy to understand. Such as figure 2 As shown, the method includes:

[0054] Step S200, receiving the address of the webpage that needs to be identified (it can be specifically the receiving URL);

[0055] Step S202, distributing the webpage address to the corresponding crawler module in the server according to the priority of the webpage address. The server may include multiple crawler modules, and each crawler module may independently analyze data in the webpage.

[0056] Step S204, the crawler module in the server crawls the data in the webpage according to the address of the webpage. Among them, the data in the crawled web pages can at le...

Embodiment 3

[0062] The embodiment of the present invention provides a malicious message cloud detection method. This method is similar to Embodiments 1 and 2 and is based on the same inventive concept. The difference is that another specific method for identifying URLs in the URL is described in this embodiment. Scenarios in which the message is malicious. Such as image 3 As shown, the method includes:

[0063] Step S300, receiving the address of the web page that needs to be identified (it can be specifically the receiving URL);

[0064] Step S302, distributing the webpage address to the corresponding crawler module in the server according to the priority of the webpage address. The server may include multiple crawler modules, and each crawler module may independently analyze data in the webpage.

[0065] Step S304, the crawler module in the server crawls the data in the webpage according to the address of the webpage. Among them, the data in the crawled web pages can at least inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and server for performing cloud detection for malicious information is provided to rapidly detect malicious information without manual operations. An address of a web page to be identified is obtained, data of the web page from the address of the webpage is crawled, the data of the web page is parsed and data for identification is obtained, the web page is determined as malicious information according to the data for identification, and the malicious information is intercepted.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a malicious message cloud detection method and server. Background technique [0002] As one of the most important profit models of the Internet, data business income is the main source of income for most Internet companies, and has become the basis for the survival of most Internet companies. In recent years, with the rapid development of the Internet, data services have flooded every corner of the Internet. [0003] Data services, especially advertising, as the basis for the survival of some Internet companies, have become popular with the vigorous development of the Internet. This is understandable. However, with the rapid development of the market and the lack of supervision, some small and medium-sized The content of advertisements lacks supervision and filtering, and more and more false advertisements and malicious advertisements begin to appear. These advertisements...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F17/30G06F40/143
CPCG06F2221/2119G06F17/30G06F21/56G06F21/563G06F21/566H04L63/1483G06F16/951G06F40/143G06F40/134G06F40/221H04L63/14
Inventor 陶思南
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products