Method and device for website hijacking detection
A website and website access technology, applied in the field of network security, can solve problems that affect user experience, damage the legitimate interests of browsers, etc., and achieve the effect of improving recognition rate and reducing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 3
[0125] Such as Figure 6 As shown, in one embodiment, the above step S302 also includes step S601:
[0126] In step S601, when the probability P of a jump URL, the access time interval T between the last access time and the current access time, the weight M of the probability P of the jump URL, the access time interval T and the maximum access time Interval T max The weight N of the ratio and the safe jump threshold Q, when the following conditions are met, the redirect URL is determined as a secure redirect URL:
[0127] Wherein, for example, the safety jump threshold is 0.5, the probability of a jump URL is 0.4, its weight M is 0.6, T is 12 hours, and T max is 24 hours, and its weight N is 0.4, then it is calculated according to the above formula: 0.5*0.6+(1-12 / 24)*0.4=0.5, then the redirect URL can be considered as a safe redirect URL. Among them, the greater the probability of the redirect URL and the shorter the access time interval, the greater the possibility that ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


