Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious url detection intervention method, system and device

A malicious and malicious access technology, applied in the field of computer communication, can solve problems such as inability to update, occupy terminal resources, and uncontrollable number of URLs, and achieve the effects of reducing missed detection, improving security, and saving mobile terminal resources

Active Publication Date: 2019-05-03
BEIJING KNOWNSEC INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution depends on the user's own security awareness, and needs to install relevant software on the mobile terminal, occupying terminal resources; in addition, because the number of URLs accessed by end users is uncontrollable and there are a lot of repetitions, and the terminal detection program cannot occupy mobile terminal resources. System resources screen it, so these data cannot be used to drive the update of the cloud malicious URL library, and eventually there are still a large number of malicious URLs that are not in the library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious url detection intervention method, system and device
  • Malicious url detection intervention method, system and device
  • Malicious url detection intervention method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0030] Domain name resolution service is not only used to solve the problem of address correspondence, but also the foundation of various applications and website construction. Domain name is a necessary condition for addressing and access, and it is the core of various Internet applications. Once the domain name resolution service is maliciously used, it will cause immeasurable losses to the entire Internet. Therefore, there is an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious URL detection intervention system. The system comprises a DNS proxy device, a credit evaluation device and a traffic intervention device, wherein the DNS proxy device is suitable for receiving a domain name resolution request, requesting a domain name credit evaluation device for the credit of a domain name, and returning back an IP address of the traffic intervention device to a user if the credit indicates that the domain name has security risks; the credit evaluation device comprises a domain name credit library, and is suitable for returning back the credit of the domain name in response to the request of the credit of the domain name; and the traffic intervention device is suitable for receiving an access request from the user and performing protocol identification for the access request, and is also suitable for extracting a URL from the access request which is identified as a request of a HTTP or HTTPS protocol, matching the URL with a malicious RUL library, and if matching is failed, being used as a reverse proxy to realize communication of the user and a destination server. The invention also discloses a corresponding domain name credit determining apparatus, a corresponding domain name credit library establishing apparatus and methods.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a malicious URL detection intervention method, system and device. Background technique [0002] With the rapid development of network communication technology, the continuous deepening of Internet applications, and the increasingly rich information carried, the Internet has become an important infrastructure of human society. At the same time, network security problems are becoming more and more serious. In particular, with the continuous development of mobile data services and online payment, personal information is bound to mobile terminals, and telecommunications fraud is becoming more and more serious. Therefore, it is imperative to perform targeted detection of mobile Internet malicious URLs and malware. [0003] At present, most users choose to install security detection software on the terminal side to defend against malicious URLs and malware, such as the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1441
Inventor 杨旭蔡自彬
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products