Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious uniform resource locator recognition method and device

A technology of resource locator and identification method, which is applied in special data processing applications, instruments, electronic digital data processing, etc., and can solve the problems of slow update of malicious URL feature database, missed killing, and inability to identify in time

Active Publication Date: 2017-07-07
BEIJING FEINNO COMM TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The malicious URL signature database only saves the existing malicious URLs, so the update of the malicious URL signature database is slow, the response to new malicious URLs is slow, and it cannot be identified in time. Moreover, the exact matching mode is used for identification, which is prone to missed killing problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious uniform resource locator recognition method and device
  • Malicious uniform resource locator recognition method and device
  • Malicious uniform resource locator recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0055] figure 1 is a flow chart of a method for identifying a malicious URL according to an exemplary embodiment, such as figure 1 As shown, the method includes the following steps:

[0056] In step 101, a first URL to be identified is acquired.

[0057]In step 102, if the first URL is not included in the preset first URL set, the preset first character in the first URL is acquired....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious uniform resource locator (URL) recognition method and device and belongs to the fields of computer network security and communication. The malicious URL recognition method comprises the steps that a first URL to be recognized is acquired, if the first URL is not included in a preset first URL set, a first character preset in the first URL is acquired, the first character in the first URL is replaced with a second character in a preset similar relation with the first character, a second URL is obtained, and if the second URL is included in the preset first URL set, the first URL is recognized as a malicious URL. Through the malicious URL recognition method and device, the problem that a new malicious URL cannot be recognized in time is solved, and the problem that the malicious URL cannot be recognized in an off-line state is also solved; the effect of increasing the recognition rate of the malicious URL is achieved.

Description

technical field [0001] The present disclosure relates to the field of computer network security and communication technologies, and in particular to a method and device for identifying a malicious Uniform Resource Locator (Uniform Resource Locator, URL). Background technique [0002] With the development of the Internet, the Internet has brought a lot of convenience to people. However, while the Internet has brought many conveniences to people, its security issues have also greatly troubled network users. For example, some malicious URLs induce users to visit malicious websites such as fraudulent websites, websites linked to horses, and virus websites. Therefore, it is necessary to identify malicious URLs to improve the security of the Internet. [0003] At present, the following method is usually used to identify malicious URLs: collect existing malicious URLs to form a malicious URL feature library, when malicious URL identification is required, obtain the URL to be ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/9566
Inventor 咸德玉
Owner BEIJING FEINNO COMM TECH