Method and device for detecting malicious website

A malicious website and detection method technology, applied in the computer field, can solve problems such as timely and effective, low detection efficiency of detection technology, limited auditors, etc., and achieve the effect of improving efficiency

Inactive Publication Date: 2016-02-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because the first type of scheme adopts the method of manual review, the quality of the review depends on the professionalism of the reviewers, so the accuracy has relatively large limitations; Very long lag, unable to guarantee timely and effective URL identification
Although the second type of scheme can effectively identify websites with obvious keyword characteristics such as pornography and gambling, it is difficult to automatically identify false information released by hackers.
Therefore, the detection efficiency of existing malicious website detection technology is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious website
  • Method and device for detecting malicious website
  • Method and device for detecting malicious website

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] The malicious website detection method provided by the first embodiment of the present invention can be applied to a user terminal to realize the detection of malicious websites. User terminals can include such as image 3 The system architecture shown. like image 3 As shown, the system can be composed of a database of malicious contact information, a detection module and a database of malicious URLs.

[0039] Wherein, the malicious contact database may include, but is not limited to: a malicious phone database, a malicious email database, and a malicious instant messaging account database. The malicious call database stores the information and data of phone numbers determined to be malicious and fraudulent through various news releases, user reports, or collected through various tools and software, such as: through Tencent Mobile Manager, Sogou Number Link, Baidu Mobile Manager, 360 Mobile Malicious and fraudulent phone numbers collected by tool software such as De...

no. 2 example

[0053] Figure 5 It is a flow chart of the malicious website detection method provided by the second embodiment of the present invention. The malicious website detection method provided in this embodiment can be applied to a user terminal to detect malicious websites. like Figure 5 As shown, the malicious website detection method provided in this embodiment includes the following steps:

[0054] Step S21, obtaining the target URL of the target website, querying the database of malicious URLs, and obtaining target information data matching the target URL;

[0055] Information data of URLs determined to be malicious websites are stored in the malicious URL database. Specifically, the user terminal acquires the target website address of the target website to be visited included in the website access instruction triggered by the user, and queries the malicious website database for target information data matching the target website address.

[0056] Step S22, when the target ...

no. 3 example

[0069] Figure 7 It is a schematic structural diagram of a malicious website detection device provided in the third embodiment of the present invention. The malicious website detection apparatus provided in this embodiment can run in the user terminal 100, and is used for the malicious website detection method in the foregoing embodiments. like Figure 7 As shown, the malicious website detection device 30 includes: an extraction module 31 , an acquisition module 32 and a determination module 33 .

[0070] Wherein, the extracting module 31 is used to obtain the target webpage pointed to by the target URL of the target website to be visited, and extract the contact information in the target webpage;

[0071] An acquisition module 32, configured to query a database of malicious contact information, and obtain target information data matching the contact information in the target web page, the malicious contact information database stores information data of contact information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting a malicious website. The method comprises the steps that a target webpage pointed to by a target web address of a target website to which a user has access is acquired, and a contact way in the target webpage is extracted; a malicious contact way database is searched for target information data matched with the contact way in the target webpage, wherein information data determined as a malicious contact way are stored in the malicious contact way database; when the target information data matched with the contact way in the target webpage are acquired, the target website is determined as the malicious website, and the target website is written into a malicious web address database. In addition, the invention provides a device for detecting the malicious website. According to the method and device for detecting the malicious website, the efficiency of detecting the malicious website can be improved.

Description

technical field [0001] The invention relates to computer technology, in particular to a malicious website detection method and device. Background technique [0002] The rapid development of Internet technology has brought more and more convenience to people's life. Through the Internet, people can conveniently share and download various materials, obtain various important information, and pay bills online. At the same time, the security situation of the Internet is not optimistic. Various types of Trojan horse viruses pretend to be normal files and spread wantonly, and phishing websites imitating normal websites to steal user account passwords are intensifying. [0003] In the prior art, there are usually two schemes for identifying and combating malicious websites: one is based on user reporting and manual review, such as PhishTank (http: / / www.phishtank.com / ), users can Submit a suspicious Uniform Resource Locator (UniformResourceLocator, URL), which will be added to Phis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F17/30
Inventor 刘健
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products