Fishing website detection method and device, computing device and computer storage medium

A phishing website and detection method technology, applied in the computer field, can solve the problems of low detection efficiency, poor real-time performance, spending a lot of time, energy and financial resources, and achieve the effect of saving investment and improving accuracy.

Active Publication Date: 2018-11-06
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +2
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of realizing the present invention, the inventors have found that there are at least the following problems in the prior art: blacklist matching detection technology, usually the blacklist database is not updated in time, which easily leads to missed reports and high false positive rates of new phishing websites The problem of phishing website detection based on URL features, because the detection data source is single, the probability of successfully identifying phishing websites is low; phishing detection technology based on machine learning usually needs to collect a large number of samples before learning the phishing website detection model Data, including a large number of phishing websites and legitimate website samples, and labeling the sample data requires a lot of time, energy and financial resources
And this phishing website detection method based on webpage similarity needs to collect enough legal websites, and needs a large number of calculations, and the detection efficiency is low; At the same time, due to the incomplete collection of legitimate websites, the selection of thresholds is not accurate enough, and the detection results have a high probability of false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fishing website detection method and device, computing device and computer storage medium
  • Fishing website detection method and device, computing device and computer storage medium
  • Fishing website detection method and device, computing device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A flow chart of a method for detecting a phishing website according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0026] Step S101, extracting multiple data sources from the source code of the web page of the website to be detected; performing cross processing on the multiple data sources to obtain a keyword group containing multiple keywo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fishing website detection method and device, a computing device and a computer storage medium. The fishing website detection method comprises the following steps: step S1, extracting a plurality of data sources from the web page source code of a website to be detected; performing cross-processing on the plurality of data sources to obtain a keyword group containing a plurality of keywords; step S2, extracting a plurality of registered domain names from the search results obtained by searching with the keyword group as the search criteria; and step S3, detecting whether the website to be detected is a suspicious website or not according to the plurality of registered domain names; and if so, detecting whether the suspicious website is the phishing website or not according to the main domain name corresponding to the plurality of registered domain names. By means of the scheme disclosed by the invention, the keyword group is extracted through performing cross-processing on the plurality of data sources, and the effective keywords of the website to be detected are obtained, therefore, the accuracy of the detecting results is improved; furthermore, it is not required to collect a large amount of sample data, and whether the website to be detected is the phishing website or not can be detected by means of the searched registered domain names, therefore, theinvestment is saved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a detection method, device, computing device and computer storage medium of a phishing website. Background technique [0002] Phishing refers to lure the victim to a fake website disguised as the target website, steal the user's user name, password, certificate number and other personal sensitive information, realize network fraud, and cause the user's personal information to be leaked and financial property to be lost Behavior. In recent years, with the development and popularization of e-commerce, phishing attacks have intensified, so the research on phishing detection technology is urgent. [0003] Currently, phishing detection technologies mainly include blacklist matching, detection methods based on URL features, and machine learning-based phishing detection technologies. However, in the process of realizing the present invention, the inventors have found that there are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F17/30
CPCH04L63/1416H04L63/1483
Inventor 汪德嘉柴倩沈杰张瑞钦
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products