Malicious link rapid interception method
A malicious link, fast technology, applied in electrical components, transmission systems, etc., can solve problems such as occupation of computer resources, computer poisoning, and loss of netizens, and achieve the effect of efficient interception and fast update.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
specific Embodiment approach
[0020] A method for quickly intercepting malicious links, characterized in that it comprises the following steps:
[0021] The server collects malicious links from the whole network, establishes a database of malicious links, conducts data processing and analysis, and constructs blocking rules;
[0022] The server monitors the web page status of each client, automatically records web page information and link information, and detects malicious behavior;
[0023] If the webpage is found to have the same or similar link as the malicious link database, the webpage will be marked, and the webpage information and connection feature information will be transmitted to the server, and the server will conduct a further comprehensive analysis of this link and other links on the webpage;
[0024] If the server analyzes it as a normal link, the user is allowed to open the link;
[0025] If the server analyzes a malicious link, it will evaluate the risk level. If the risk level is higher ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More