Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious link rapid interception method

A malicious link, fast technology, applied in electrical components, transmission systems, etc., can solve problems such as occupation of computer resources, computer poisoning, and loss of netizens, and achieve the effect of efficient interception and fast update.

Inactive Publication Date: 2015-12-30
CHENGDU QIULEI TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some malicious link information is pushed by continuously opening webpages. A large number of windows make netizens very upset. These links contain a lot of fraudulent information and illegal links, which will bring losses to netizens.
A large number of malicious link information will occupy more computer resources, and may also poison the computer, resulting in fast opening of web pages and bringing a lot of cache garbage to the computer
With the continuous improvement and implantation of malicious links, the blocking functions of browsers and antivirus software have become difficult to cope with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0020] A method for quickly intercepting malicious links, characterized in that it comprises the following steps:

[0021] The server collects malicious links from the whole network, establishes a database of malicious links, conducts data processing and analysis, and constructs blocking rules;

[0022] The server monitors the web page status of each client, automatically records web page information and link information, and detects malicious behavior;

[0023] If the webpage is found to have the same or similar link as the malicious link database, the webpage will be marked, and the webpage information and connection feature information will be transmitted to the server, and the server will conduct a further comprehensive analysis of this link and other links on the webpage;

[0024] If the server analyzes it as a normal link, the user is allowed to open the link;

[0025] If the server analyzes a malicious link, it will evaluate the risk level. If the risk level is higher ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious link rapid interception method comprising the following steps that a server collects malicious links throughout the whole network, establishes a malicious link database, performs data processing and analysis and constructs interception rules; the server monitors the webpage state of each user side, automatically records webpage information and link information, and performs malicious behavior detection; and if a situation that the webpages have links which are the same with or similar to the malicious link database is discovered, the webpages are marked and the webpage information and the link characteristic information are transmitted to the server, and the server performs comprehensive analysis on the links and other links of the webpages further. The beneficial effects of the malicious link rapid interception method are that the whole network is monitored, database updating is rapid, the interception rules are updated in real time, the malicious links can be rapidly intercepted, the webpages of the user side are enabled to be more pure, the malicious links can be comprehensively collected and the more comprehensive database can be established.

Description

technical field [0001] The invention relates to a method for quickly intercepting malicious links. Background technique [0002] With the rapid development of Internet technology and the increasing number of Internet users, Internet users mainly access various network information through web pages. As the number of web page views increases, more and more links are promoted on web pages. It is undeniable that many promotions are beneficial and can give users a lot of beneficial information. However, some malicious link information is pushed by continuously opening webpages. A large number of windows make netizens very upset. These links contain a lot of fraudulent information and illegal links, which will bring losses to netizens. A large amount of malicious link information will occupy more computer resources, and may also poison the computer, resulting in fast opening of web pages and bringing a large amount of cache garbage to the computer. With the continuous improvemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1466
Inventor 黄雷
Owner CHENGDU QIULEI TECH