Unlock instant, AI-driven research and patent intelligence for your innovation.

Defense method and apparatus for malicious URL in microblog network with HUB node

A microblog network and malicious technology, applied in the direction of instruments, electrical components, data processing applications, etc., can solve the problems of large amount of calculation, occupying a lot of resources, etc., and achieve the effect of improving security

Inactive Publication Date: 2016-06-22
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The phishing detection technology based on visual similarity mainly compares and analyzes the similarity between the phishing website and the original website, so as to find the phishing website. The original website needs to be recorded, and an additional storage device is required to store the characteristics of the protected target website webpage, which takes up a lot of resources and a large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method and apparatus for malicious URL in microblog network with HUB node
  • Defense method and apparatus for malicious URL in microblog network with HUB node
  • Defense method and apparatus for malicious URL in microblog network with HUB node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The basis of this embodiment is that Twitter network data containing 4000 nodes are obtained in advance, and 4000 nodes can satisfy the defense against malicious URLs.

[0033] The HUB node is a type of node that naturally exists in many microblog network communities, and it is not artificially set. First, through the G-N algorithm, the Twitter network is divided into communities, a certain network community is randomly selected, and the HUB nodes in the community are confirmed according to the characteristics of the HUB nodes. And randomly select an ordinary node in the community, marked as node a, and a certain fan node b of node a.

[0034] When a microblog user clicks on a malicious URL, most of the malicious URLs will automatically appear in the user's blog post, so that fans can see and click on it, so as to realize the malicious spread of the malicious URL in the microblog network. Start with node a, when node a clicks and confirms a link is recorded as LINK i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a defense method for malicious URL propagation in a microblog network. On the basis of the characteristic of the great influence of the HUB node in the microblog social network, when a common node obtains malicious URL warning information, the warning information is sent to the HUB node in a private letter node; and because of the great influence of the HUB node, the malicious URL warning information is spread throughout the network in short time, so that propagation of the malicious URL in the network is prevented. Meanwhile, a comparison mechanism is also introduced to reduce redundant propagation of warning information in the network. In addition, the embodiment of the invention also provides a defense apparatus for malicious URL propagation in a microblog network. According to the technical scheme, malicious URL propagation in a microblog network can be defensed under the circumstance that no network load is increased, so that the microblog network security is improved.

Description

technical field [0001] The invention relates to a malicious URL defense method in a microblog network, in particular to a malicious URL defense method and a defense device in a microblog network with a HUB. Background technique [0002] With the rapid development of the Web and its wide application, malicious information is flooding day by day, which poses a great threat to the current network security. Weibo is a broadcasting platform for sharing real-time information. Because of its real-time and convenience, it has become the most popular social networking platform at present. Because of this, Weibo has also become the easiest information dissemination platform for current malicious information. The dissemination of malicious information in Weibo is one of the top tasks in dealing with network security issues. [0003] In the microblog network community, there are some nodes: these nodes have many fans, and in this network community, most of the community members follow ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q50/00
CPCH04L63/145G06Q50/01
Inventor 刘昕王丰杨阳王奕文邹苹钧
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)