Malicious message recognition method, device and equipment and computer storage medium

An identification method and technology for message receivers, which are applied in the fields of equipment and computer storage media, devices, and malicious message identification methods, can solve problems such as failure, attack, and inability of the server to obtain information, and achieve rapid identification and high identification efficiency. Effect

Inactive Publication Date: 2017-09-19
ADVANCED NEW TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there may be problems with this solution: the link in the malicious message may become invalid within a short time after spreading, and the server may not be able to obtain the corresponding information after the invalidation; the link in the malicious message may be based on the visitor's IP information, access Targeted hiding of the device information used by the visitor, the time of the visitor's visit, etc., so that the link is normal when the server accesses it, but when the user accesses the link, it is tricked.
In addition, the corresponding Trojan horse in the malicious link may bypass the existing Trojan horse detection engine by packing, downloading attack code, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious message recognition method, device and equipment and computer storage medium
  • Malicious message recognition method, device and equipment and computer storage medium
  • Malicious message recognition method, device and equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0072] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious message recognition method, device and equipment and a computer storage medium. The method comprises steps of acquiring a to-be-recognized message; acquiring target features of the to-be-recognized message, wherein the target features at least comprise a message sender feature, a message receiver feature, a message content feature and a message spreading feature; and inputting the acquired target features into a preset malicious message recognition model, and using the malicious message recognition model to recognize whether the to-be-recognized message is a malicious message. According to the embodiment of the invention, rapid recognition of the malicious message can be achieved without depending on the fact whether the linkage in the message content is accessible and survives, or on a Trojan recognition result provided by a Trojan detection engine and without the need of access to an attacker server end, and the recognition efficiency is quite high.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a malicious message identification method, device, equipment and computer storage medium. Background technique [0002] With the rapid development of Internet technology, the invention of various communication systems has greatly facilitated the mutual communication between users. Users can use electronic equipment to establish a communication network connection, and can transmit communication messages including text, images, voice or video, etc. [0003] However, the ensuing malicious messages are also rapidly flooding, and a large number of malicious messages have brought troubles to users. For example, malicious messages often carry the contact information of criminals to induce users to visit a certain phishing link to contact criminals, query illegal information, download Trojan horses or transfer money. [0004] At present, more and more service provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/30H04W12/128
Inventor 赵豪
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products