Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for intercepting malicious website access

A malicious URL and purpose technology, applied in the Internet field, can solve the problems of difficulty in extracting URLs and inapplicability, and achieve the effect of improving security performance, preventing malicious network access behaviors, and avoiding malicious URL access behaviors

Active Publication Date: 2017-07-07
ALIBABA GRP HLDG LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The inventor found in the process of implementing the present invention that the scope of application of the above-mentioned method 1 is limited due to the need to obtain Root authority; A piece of fake red envelope information, which will display the webpage corresponding to the malicious URL inside WeChat after the information is clicked; in addition, the log generated by the operating system will change due to the version of the operating system and the model of the intelligent electronic device, which will make It is difficult to accurately extract the URLs that need to be accessed; the third method above is also not applicable to application scenarios that do not need to use browser applications to open corresponding webpages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for intercepting malicious website access
  • Method and device for intercepting malicious website access
  • Method and device for intercepting malicious website access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1. A method for intercepting malicious website access.

[0038] figure 1 It is a flow chart of the method for intercepting malicious website access in this embodiment. Such as figure 1 As shown, the method of this embodiment mainly includes: step S100, step S110 and step S120. The method described in this embodiment is usually executed in smart electronic devices. Preferably, the method described in this embodiment is usually executed in smart electronic mobile devices such as smart mobile phones and tablet computers (ie user mobile devices). .

[0039] next to figure 1 Each step is described in detail.

[0040] S100. Analyzing IP (Internet Protocol, Internet Protocol) data packets.

[0041] Specifically, the IP data packet in this embodiment includes the IP data packet at the virtual network card place. Further, the IP data packet in this embodiment includes the IP data packet at the virtual network card place based on VPN (Virtual Private Network, vir...

Embodiment 2

[0086] Embodiment 2, a method for intercepting malicious website access. The procedure of this method is as follows Figure 2-Figure 4 shown.

[0087] figure 2 In, S200, open the VPN service supported by the Andriod operating system in the intelligent electronic device, set the relevant parameters of the virtual network card, set the IP address of the virtual network card to be VirtualIP; set the proxy server in the intelligent electronic device, and set the proxy server The IP address and port are ProxyIp and ProxyPort respectively. to S210.

[0088] The proxy server in this embodiment is mainly used for listening to the socket connection request, and when listening to the socket connection request, agrees the socket connection or rejects the answer of the socket connection to the socket connection request; the proxy server is also used for agreeing the socket connection Afterwards, a TCP session (TCP session) is established for the socket connection, so that operations ...

Embodiment 3

[0116] Embodiment 3, the implementation device for intercepting malicious website access.

[0117] The structure of the implementation device for intercepting malicious website access in this embodiment is as follows: Figure 5-Figure 12 shown.

[0118] Figure 5 The device mainly includes: a resolution module 510, a domain name information comparison module 540, and an interception processing module 550. Optionally, the device may further include: any one or more of a reading module 500 , a first judging module 520 , a first transmission processing module 530 , a second transmission processing module 560 and a third judging module 570 .

[0119] The parsing module 510 is mainly used for parsing IP data packets. The parsing module 510 in this embodiment can be independent of Figure 12 The virtual network card packet processing module in the network can be set independently, of course, it can also be set in Figure 12 In the virtual network card packet processing module. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for intercepting malicious website access. The method comprises the following steps: analyzing an IP data packet, wherein the IP data packet includes an IP data packet at a virtual network card; when determining that the IP data packet contains domain name information, comparing the domain name information with the information in a malicious website set; when the comparison result shows that the domain name information matches the information in the malicious website set, intercepting the IP data packet. According to the scheme of the invention, the harmful effects of malicious network access behaviors can be prevented comprehensively and effectively, and the security performance of intelligent electronic equipment is improved. The method and the device have the characteristics of good applicability, easy popularization, and the like.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for intercepting access to a malicious website and a device for intercepting access to a malicious website. Background technique [0002] With the rapid development of Internet technology, especially mobile Internet technology, users can often use their smart electronic devices, especially smart mobile phones, to access the network anytime and anywhere. Since the access behavior of smart electronic devices (such as applications installed in smart electronic devices, etc.) to malicious websites often causes the leakage of users' personal information and even the loss of personal property, users pay more and more attention to network access security issues. [0003] Existing methods for preventing smart electronic devices from accessing malicious websites mainly include the following three methods: [0004] Method 1. Based on the Root technology, avoid the access of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0272
Inventor 王灏韩建兵
Owner ALIBABA GRP HLDG LTD