Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious advertisement attack detection method

A malicious advertisement and attack detection technology, applied in the network field, can solve problems such as strong mutation, multiple sources of malicious advertisement, and user loss, and achieve the effect of improving detection efficiency, good detection effect, and unified detection

Inactive Publication Date: 2016-12-07
合肥酷睿网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, malicious advertisements may also come from the website itself. For some unknown small websites, unsafe third-party advertising links are used for profit. These link advertisements are easy to inject malicious attack codes
It is precisely because of the many sources of malicious advertisements and the strong mutation characteristics that malicious advertisement attacks have occurred frequently in recent years. These attacks have caused losses to users and at the same time attracted more and more attention.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] A malicious advertisement attack detection method, comprising the steps of:

[0023] (1) URL extraction

[0024] Obtain all suspicious URL collections related to advertisements in the website to be tested, use it as the collection to be tested, and use the open source crawler Nutch to extract the URL information in the website to be tested, as described;

[0025] (2) Request initiated

[0026] The URLs in the collection to be tested are sent to their corresponding servers, and then the response information is directed to the filter module

[0027] (3) Combined filtering

[0028] Responsible for detecting the request response information of the URL set. If the response information is injected with malicious code, when the server’s response information returns to the sending module, deploy the combined filtering module in the response path, so that all response information can be detected. Module, the legal response information will pass, and the illegal response will ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious advertisement attack detection method. URL information in a to-be-detected website is extracted by utilizing an open-source crawler Nutch; compared with a commercial search engine, the Nutch can grab billions of web pages per month and provide high-quality retrieval results; only URL links related to advertisements are extracted in URL extraction; the detection efficiency can be improved; phishing detection is realized through a Google Safe Browser API; a to-be-detected URL is sent to the API for performing verification; whether the URL is secure or not can be judged according to response information; a library is realized by Google search and an international anti-phishing union, is very huge in scale and can detect a large amount of attack behaviors; for an attack URL confirmed by the API, the URL needs to be extracted from a to-be-detected set and information of the URL is recorded in a log file; the log record of the URL information is realized through Log4j; a flexible record way is provided; an output position, an output format and a log level of a log can be configured separately; malicious advertisement attack behaviors detected in log analysis are displayed in the form of a pie chart and a bar chart, so that a detection result can be vividly displayed; and the detection method is complete in rule, is based on a client, and not only realizes unified detection of malicious advertisement attacks but also has a good detection effect.

Description

technical field [0001] The invention belongs to the field of network methods, and more specifically, the invention relates to a malicious advertisement attack detection method. Background technique [0002] With the advent of the times, the Internet has become an inseparable part of people's lives. People can obtain various free services through the Internet every day. While many companies provide free services to Internet users, advertising has become their main source of income. At present, online advertising (1) has formed a huge business of tens of billions of dollars, and formed a complete industrial chain, which is mainly supported by multi-level large-scale infrastructure. Online advertising, originally served solely by advertisers with high-traffic websites, has evolved into the form of ad networks. Malicious advertisement attacks mainly refer to attacks on users using advertisements as carriers. This type of attack has the characteristics of large variability and s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
CPCG06F16/9566
Inventor 董雄飞
Owner 合肥酷睿网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products