Method and related device for detecting malicious web pages
A malicious webpage and webpage technology, applied in the field of network security, can solve problems such as consuming a long time and system resources, and low detection efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] In order to enhance the concealment of malicious codes, attackers often use multiple redirection methods when implanting links in web page files. That is to say, when a user visits a modified normal webpage, through multiple redirections, the user is finally redirected to a webpage embedded with malicious codes provided by other webpage servers. Then the malicious code is downloaded into the terminal device used by the user without the user's knowledge. In comparison, when a user visits a normal web page that has not been modified, it is less likely that the user will be redirected multiple times.
[0039] In this embodiment of the application, a malicious webpage refers to a webpage that will cause damage to the terminal device used by the user after being accessed, specifically including webpages that have been embedded with malicious codes, and webpages that have been embedded with links although they have not been embedded with malicious codes. , where the implante...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


