Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious URL detecting method based on big data

A detection method and big data technology, applied in the field of network information security, can solve problems such as the inability to detect malicious URLs in depth, and achieve the effects of strong openness, added algorithms, and accurate detection results

Inactive Publication Date: 2018-10-30
北京东方通网信科技有限公司
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The present invention proposes a method for detecting malicious URLs based on big data, which solves the problem in the prior art that accurate and in-depth detection of malicious URLs in massive online data cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious URL detecting method based on big data
  • Malicious URL detecting method based on big data
  • Malicious URL detecting method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0033] The data characteristics used by the malicious URL detection method based on big data described in the present invention are specifically as follows:

[0034]

[0035]

[0036] The potential basis for using the above URL shape features and URL semantic features is as follows:

[0037]

[0038]

[0039] Potential grounds for using the above user behavior characteristics are as follows:

[0040]

[0041] Potential rationales for using the above URL network cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious URL detecting method based on big data. The method comprises the steps of extracting a profile feature, a semantic feature, a user behavior feature and a network feature of a URL; generating a classification model and an abnormity detecting model according to the profile feature, the semantic feature and partial user behavior feature of the URL; extracting the profile feature, the semantic feature and the partial user behavior feature of the URL from an Internet access log, performing detection on the features for generating a suspicious URL; extracting partial user behavior feature and the URL network feature, performing detection on the partial user behavior feature and the URL network feature, and generating the suspicious URL; performing combination,threshold determining and duplicate removing on the suspicious URLs generated in the two steps, and finally obtaining a final malicious URL. The method according to the invention has higher reliability than a single algorithm. A two-stage model system is combined with a classifying algorithm model and an abnormity detecting algorithm model so that higher accuracy of a malicious URL detecting result is realized. High openness is realized. Furthermore the algorithm can be flexibly added according to the trend change and technical development condition of the malicious URL.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method for detecting malicious URLs based on big data. Background technique [0002] In the field of network information security, it is often necessary to detect and report suspected malicious URLs (uniform resource locators) in online logs on the live network. At present, the detection of suspected malicious URLs mainly has the following problems: (1) It does not realize the detection of the entire network Statistical analysis of URLs only uploads relevant malicious URLs to the upper-level platform based on policies, and the source of malicious URL samples is too single; (2) In the face of massive data, the analysis speed of the traditional crawling research and judgment method is slow, and it is impossible to achieve effective analysis of the entire network log. To achieve the ideal governance effect; (3) The existing URL database does not have the abili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416G06F2221/2119H04L63/1425H04L63/1441
Inventor 黄永军
Owner 北京东方通网信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products