Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hosts file detection method and device

A file detection and file technology, applied in the field of network security, can solve the problems of the cloud server being unable to collect URLs and the detection accuracy being low.

Active Publication Date: 2018-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem in the prior art that the cloud server cannot collect all URLs that may be hijacked by virus programs, resulting in low detection accuracy, the embodiment of the present invention provides a Hosts file detection method and device, and the technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hosts file detection method and device
  • Hosts file detection method and device
  • Hosts file detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0031] figure 1 It is a flow chart of a method for detecting a Hosts file according to an exemplary embodiment. The method can be used in a computer device that has a website access function and contains a Hosts file in the system. For example, the computer device can be a personal computer, Smartphones, tablets, e-book readers, and more. Such as figure 1 As shown, the Hosts file detection me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for detecting a Hosts file, which belong to the technical field of network security. The method comprises steps: the attribute information of the Hosts file is acquired, wherein the attribute information is used for indicating the corresponding relationship between each website in the Hosts file and an IP (Internet Protocol) address, the blank line number in the Hosts file and the data amount of the Hosts file; according to the attribute information, whether the Hosts file meets at least one selected from a first preset condition and a second preset condition is detected; and if yes, the website in the Hosts file is determined to have a hijacked risk, and on the basis of detecting whether the Hosts file contains the website in a preset website set and in combination of the corresponding relationship between each website in the Hosts file and the IP address, the blank line number and the data amount of the Hosts file, whether the website in the Hosts file has a hijacked risk is detected, and the detection accuracy is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting a Hosts file. Background technique [0002] At present, many virus programs can affect the normal network access of the browser by hijacking the URLs in the Hosts file. Therefore, detecting whether the website address in the Hosts file has the risk of being hijacked is an important means to ensure the security of the computer network. [0003] The existing technology mainly detects whether there is a hijacked website in the Hosts file through the cloud check detection method. Specifically, the cloud server collects and maintains a collection of URLs, which contain virus programs that may hijack URLs, usually websites with high versatility, such as train ticket buying websites, antivirus software official websites, and well-known websites. For anti-virus related websites, etc., when the terminal detects the Hosts file, it sends each URL...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCG06F2221/2119H04L63/145H04L63/1466H04L67/10
Inventor 苏蒙屈亚鑫
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products