Anti-phishing method based on multi-factor comprehensive assessment method

A comprehensive evaluation, multi-factor technology, applied in special data processing applications, instruments, electrical and digital data processing, etc., can solve problems such as high false alarm rate, single method, insufficient power, etc., to achieve high accuracy and comprehensive effect.

Inactive Publication Date: 2014-12-10
XIDIAN UNIV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, security software has a single method for identifying phishing websites based on URL, which does not involve the essence of phishing websites; black and white list identification is lagging, and phishing websites frequently change URLs. This method is a passive anti-phishing method that sacrifices the interests of some users. ; The efficiency and speed of recognition bas

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing method based on multi-factor comprehensive assessment method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0049] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0050] see figure 1 As shown, it is a flowchart of the anti-phishing method based on the multi-factor comprehensive evaluation method of the present invention, wherein:

[0051] Step a, establish a black and white list library of URLs, and process the target URL to determine whether the processed URL is in the black / white list, if it is in the list library, execute step d, and directly feed back the result to the user; if not list library, then execute step b to perform subsequent detection of the website.

[0052] In step b, during the detection process, the URL angle recognition is performed first, because the execution speed of this part is relatively fast, and there is no need to set up a special thread for wasting overhead; after that, three threads are used to detect the remaining three asp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-phishing method based on a multi-factor comprehensive assessment method. The method comprises the following steps: step a, establishing a blacklist and whitelist library of URL (uniform resource locator), and processing a target URL, judging whether the processed URL is in the blacklist/whitelist, if so, executing the step d, directly feeding back a result to the user; otherwise, executing the step b, subsequently detecting the website; step b, detecting four aspects of the website: URL angle recognition, website behavior and detail feature recognition, server angle recognition and crawler angle recognition; step c, summarizing and affirming the feedback result; and step d, displaying a result. The method provided by the invention can be used for assessing in many ways with strict procedure; the consideration is comprehensive and the accuracy is high; the hit suspects and corresponding weight value, searched webpage link, website file and judgment criterion are displayed in a graphical interface in a simple and clear mode , the result is available for related professional for examining while being fed back to the user.

Description

technical field [0001] The invention relates to an evaluation method for preventing phishing attacks, in particular to an anti-phishing method based on a multi-factor comprehensive evaluation method. Background technique [0002] At present, Internet fraud incidents occur frequently, threatening the privacy and security of users. According to statistics, in the first half of 2010 alone, direct and indirect economic losses caused by phishing to the public and society exceeded 12 billion yuan. How to prevent phishing attacks (Phishing attack) is imminent. At present, security software has a single method for identifying phishing websites based on URL, which does not involve the essence of phishing websites; black and white list identification is lagging, and phishing websites frequently change URLs. This method is a passive anti-phishing method that sacrifices the interests of some users. ; The efficiency and speed of recognition based on page features are very low, and it i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30
Inventor 胡建伟崔艳鹏李英胥红艳李蕊许乐
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products