Method and device for detecting phishing web pages
A technology of phishing webpages and detection methods, which is applied in transmission systems, electrical components, etc., can solve problems such as unrecognizable, undetectable phishing webpages, and inability to cope with new phishing webpages, so as to improve accuracy and reduce storage resources and processing resources. occupancy, saving hardware configuration and resource consumption effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of a method for detecting phishing webpages of the present application, which may specifically include the following steps:
[0062] Step 101, calling a web page rendering program to access the web page to be detected.
[0063] The embodiment of the present application calls the webpage rendering program to access the webpage to be detected, so that the phishing webpage can be opened normally in the rendering environment, and avoids the problem that the phishing webpage cannot be detected because the phishing webpage uses the webpage source file of the normal webpage.
[0064] The web page rendering program may be any program capable of rendering web pages, such as a browser or other APP capable of rendering web pages.
[0065] Step 102, during the process of rendering the webpage to be detected, send a user operation event to the webpage to be detected.
[0066] Webpage rendering is also called...
Embodiment 2
[0088] refer to figure 2 , which shows a flow chart of the steps of Embodiment 2 of a phishing web page detection method of the present application, which may specifically include the following steps:
[0089] Step 201, calling a web page rendering program to access the web page to be detected.
[0090] Step 202, during the process of rendering the webpage to be detected, send a user operation event to the webpage to be detected.
[0091] Step 203, extracting image features of the webpage to be detected.
[0092] Step 204, identifying whether the webpage to be detected is a phishing webpage based on the obtained image features.
[0093] In this embodiment, image features are preferably used to identify phishing webpages. Correspondingly, when identifying image features, if the display is based on the rendering result of the webpage to be detected, the preferred way to extract image features may be to take a screenshot of the rendered webpage to be detected; if it is not ba...
Embodiment 3
[0122] refer to Figure 4 , which shows a structural block diagram of an embodiment of a device for detecting phishing webpages of the present application, which may specifically include the following modules:
[0123] A webpage access module 301, configured to invoke a webpage rendering program to access a webpage to be detected;
[0124] An event sending module 302, configured to send a user operation event to the webpage to be detected during the process of rendering the webpage to be detected;
[0125] The rendered webpage detection module 303 is configured to detect phishing webpages based on the rendering results of the webpages to be detected.
[0126] In the embodiment of the present application, preferably, the web page rendering program is a real browser or a simulated browser supporting at least one network protocol.
[0127] In the embodiment of the present application, preferably, the web page rendering program is a real browser or a simulated browser written ba...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


