Defense method and apparatus for malicious URL in microblog network with HUB node
A microblog network and malicious technology, applied in the direction of instruments, electrical components, data processing applications, etc., can solve the problems of large amount of calculation, occupying a lot of resources, etc., and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The basis of this embodiment is that Twitter network data containing 4000 nodes are obtained in advance, and 4000 nodes can satisfy the defense against malicious URLs.
[0033] The HUB node is a type of node that naturally exists in many microblog network communities, and it is not artificially set. First, through the G-N algorithm, the Twitter network is divided into communities, a certain network community is randomly selected, and the HUB nodes in the community are confirmed according to the characteristics of the HUB nodes. And randomly select an ordinary node in the community, marked as node a, and a certain fan node b of node a.
[0034] When a microblog user clicks on a malicious URL, most of the malicious URLs will automatically appear in the user's blog post, so that fans can see and click on it, so as to realize the malicious spread of the malicious URL in the microblog network. Start with node a, when node a clicks and confirms a link is recorded as LINK i ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 