Malicious link detection method and system

A malicious link and detection method technology, applied in the computer field, can solve problems such as waste of system resources and low detection efficiency, and achieve the effect of saving system resources and high detection efficiency

Inactive Publication Date: 2018-05-04
广西塔锡科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing link detection method can only detect the links one by one after suspicious links are found, which has the disadvantage of low detection efficiency and wastes system resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious link detection method and system
  • Malicious link detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0038] Such as figure 1 As shown, it is a schematic flowchart of a malicious link detection method provided by an embodiment of the present invention, the method includes:

[0039] S1. Obtain a link to be detected.

[0040] S2, extract key characters of links to be detected according to preset extraction rules.

[0041] S3, generate a hash value based on key characters.

[0042] S4, matching the malicious link from the preset malicious link database according to the hash value.

[0043] S5, when a malicious link with the same hash value is matched, prompting that the link to be detected is a malicious link.

[0044] Preferably, it also includes:

[0045] When no malicious link with the same hash value is matche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious link detection method and system, and relates to the field of computer. The malicious link detection method comprises the steps of obtaining a to-be-detected link;extracting a key character of the to-be-detected link based on a preset extraction rule; generating a hash value based on the key character; matching a malicious link from a preset malicious link database based on the hash value; and when the malicious link with the same hash value is matched, indicating that the to-be-detected link is the malicious link. According to the malicious link detectionmethod and system provided by the invention, the malicious link can be detected rapidly by extracting the key character in the link, generating the hash value and matching the hash value directly withthe pre-stored hash value in the database; one-by one detection can be avoided during the link detection; and the malicious link detection method and system have the advantages of being high in detection efficiency and saving system resources.

Description

technical field [0001] The invention relates to the field of computers, in particular to a malicious link detection method and system. Background technique [0002] With the development of Internet technology, people will also encounter some problems when using the Internet. For example, when browsing the web, the entire screen is filled with web pages that appear continuously, or when browsing information on the Internet, clicking a web link , As a result, a virus or a lot of rogue software is installed. These links reduce the user's online experience and bring certain security risks to the user. [0003] At present, the existing link detection methods can only detect links one by one after suspicious links are found, which has the disadvantage of low detection efficiency and wastes system resources. Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a malicious link detection method and system for the deficiencie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416
Inventor 徐庆富
Owner 广西塔锡科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products