Hidden hyperlink detection method based on stack

A dark chain detection and dark chain technology, applied in the field of network security, can solve the problem that website administrators cannot quickly and accurately detect and locate dark chains.

Inactive Publication Date: 2016-09-28
浙江乾冠信息安全研究院有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The main technical problem to be solved by the present invention is to propose a stack-based dark link based on the advantages of the basic stack matching technology and page rendering technology, aiming at the shortcomings of website managers who cannot quickly and accurately detect and locate hidden links in an open network. Detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden hyperlink detection method based on stack
  • Hidden hyperlink detection method based on stack
  • Hidden hyperlink detection method based on stack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] First, send an HTTP request to the web site server to be detected, such as figure 2 As shown, then utilize multi-threaded web crawler technology to grab the Web page to be detected, and the Web page to be detected returns page data; the part of the returned page data is as follows image 3 shown;

[0054] Secondly, use the interfaceless browser to render the page data, obtain the rendered web page, and complete the rendering by executing the JS and CSS codes on the page;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hidden hyperlink detection method based on a stack. The method comprises the steps of 1, defining a hidden hyperlink in advance; 2, sending an HTTP request to a to-be-detected Web server, capturing a to-be-detected Web page by use of a multi-thread web crawler technology, and returning page data by the to-be-detected Web page; 3, rendering the page data by use of a non-interface browser, thereby obtaining the rendered Web page, wherein the rendering is specifically finished by performing JS and CSS codes on the page; 4, detecting hyperlinks in the page based on the stack; and 5, obtaining page hidden hyperlink data by directly checking a hidden hyperlink keyword feature library. According to the method, the location of the possible hidden hyperlink is rapidly and accurately detected and located through adoption of a stack data structure and a headless browser page rendering mode; the operation is more simple and clear; and the hidden hyperlink after a hacker intrudes into a network or the hidden hyperlink imbedded by a web application development manufacturer can be detected.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a stack-based dark link detection method. The invention is a stack-based dark link detection method aimed at the Web service platform. Background technique [0002] In the early days, hanging horses on webpages was a common attack technique. Attackers inserted a piece of malicious script (Javascript) code into normal webpages. Once the client browser accesses the malicious page, the malicious code execution may be implanted into a Trojan horse or a spy program. In recent years, with the attention of relevant national departments to Internet security incidents and the improvement of security awareness of some software developers, the once-popular "horse hanging" attack method has been gradually reduced, but the black industry is gradually developing in the direction of dark chains. [0003] "Dark link" is a means of search engine optimization, which is used to improve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/955
Inventor 董超蒋希敏鲁友炳
Owner 浙江乾冠信息安全研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products