Security evaluation method of darknet, server and computer-readable medium

A security, dark web technology, applied in the field of communication, can solve the problems related to the security of no dark web sites

Inactive Publication Date: 2018-11-13
PING AN TECH (SHENZHEN) CO LTD
View PDF16 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Darknet websites contain a large amount of important hidden data information. At present, there is no research related to the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security evaluation method of darknet, server and computer-readable medium
  • Security evaluation method of darknet, server and computer-readable medium
  • Security evaluation method of darknet, server and computer-readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates otherwise.

[0043] It should also be further understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security evaluation method of a darknet, a server and a computer-readable medium. The method comprises: accessing a darknet website corresponding to the darknet domain nameaccording to an obtained darknet domain name, and obtaining data information of the darknet website, wherein, the data information comprises text content information and network fingerprint information; determining a first similarity between the text content information and text content information of the darknet website in a history record, and detecting a vulnerability of the text content information according to the first similarity; determining a second similarity between the network fingerprint information and network fingerprint information of the darknet website in the history record, and detecting a vulnerability of the network fingerprint information according to the second similarity; and according to the detection result of vulnerability detection on the text content informationand the detection result of vulnerability detection on the network fingerprint information, generating a security evaluation report. The invention has the advantage that the security of the darknet website is evaluated.

Description

technical field [0001] The present invention relates to the field of communication technology, and in particular to a darknet security assessment method, server and computer-readable medium. Background technique [0002] The dark web refers to web pages whose content cannot be obtained through static links. These pages are currently web pages that cannot be directly crawled by search engines, and cannot be directly retrieved. Currently, users can use the anonymous network, namely the onion router, according to the dark web domain name. (The Onion Router, Tor) to enter the page of the darknet website. [0003] Darknet websites contain a large amount of important hidden data information, and there is currently no research related to the security of darknet websites, so it is of great research significance to detect and evaluate the security of darknet websites. Contents of the invention [0004] Embodiments of the present invention provide a darknet security assessment meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/14H04L63/1433
Inventor 朱士贺
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products