Phishing webpage detection method

A technology for phishing web pages and detection methods, applied in special data processing applications, instruments, platform integrity maintenance, etc., can solve problems such as low efficiency, difficult application, and complex computing.

Active Publication Date: 2014-10-08
BEIHANG UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this scheme is that the calculation is co...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phishing webpage detection method
  • Phishing webpage detection method
  • Phishing webpage detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] See figure 1 — Figure 4, the present invention proposes a method for detecting phishing webpages, which detects phishing webpages by comparing the similarity of webpage styles of two webpages. The method is divided into four steps: web page style feature extraction, web page style feature screening, web page style similarity calculation and result judgment. The method will be described in detail below.

[0067] Step 1: Web page style feature extraction

[0068] ● Document tree extraction. To extract the document tree with the body element as the root node in the DOM of the page, it is necessary to ensure that each element in the document tree is an object of type Element. Because the .children() method extracts all Element objects, use the .children() method to extract the child elements of each element in the document tree. Each node in the document tree needs to store the name (tagName), class name (class) and ID (id) of the element.

[0069] ● CSS text extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A phishing webpage detection method comprises a first step of performing webpage style feature extraction: extracting document tree structures and CSS texts of a suspicious webpage (Ps) and a webpage visible part of a target webpage (Pi); a second step of webpage style characteristic screening: screening elements in Tree (Ps) and Tree (Pi), analyzing the CSS texts of the suspicious webpage (Ps) and the target webpage (Pi), obtaining corresponding rule object sets, and screening all rule objects; a third step of performing webpage similarity calculation: respectively calculating webpage style complexity C(Ps) and C(Pi) and webpage style matching degree M(Ps, Pi) of the suspicious webpage (Ps) and the target webpage (Pi); and a fourth step of performing result judgment: judging whether the Ps is a phishing webpage according to calculation results obtained in the third step and domain names of the suspicious webpage (Ps) and the target webpage (Pi).

Description

technical field [0001] The invention provides a phishing webpage detection method, which specifically relates to a phishing webpage detection method based on webpage style similarity, and belongs to the field of computer Internet (Web) security. Background technique [0002] Phishing webpages fake the uniform resource locator (Uniform Resource Locator, URL) and page features of the real webpage, construct a page that is visually similar to the real webpage, or use the server vulnerability of the real webpage to inject dangerous hypertext markup language (Hypertext Markup Language) Text Markup Language (HTML) codes to defraud users of personal information (such as credit card account numbers, passwords, and ID numbers, etc.) to achieve the purpose of obtaining economic benefits. In recent years, the number of phishing webpages has continued to grow rapidly, causing huge economic losses to users every year, and has become one of the main security threats to the Internet. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/56G06F17/30
Inventor 毛剑李佩李腾陈岳马寒军刘建伟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products