Use web search engines to correct domain names used for social engineering

A search engine, Internet search technology, applied in the field of using web search engines to correct domain names used for social engineering, to reduce security threats

Active Publication Date: 2022-05-10
MICROSOFT TECH LICENSING LLC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when an unsuspecting user selects a fraudulent link and visits a fraudulent website, the user may not realize that he is visiting a fraudulent website instead of a legitimate one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use web search engines to correct domain names used for social engineering
  • Use web search engines to correct domain names used for social engineering
  • Use web search engines to correct domain names used for social engineering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] According to some examples of the present disclosure, there are provided systems, methods, and methods for detecting hyperlinks associated with untrusted web resources using one or more search engines and replacing them with trusted hyperlinks associated with trusted web resources. Software Program Product.

[0019] Before explaining at least one of the illustrative examples in detail, it should be understood that the present disclosure is not necessarily limited to the construction and arrangement of components and / or methods given in the following description and / or illustrated in the drawings and / or examples detail. The disclosure is capable of other examples or of being practiced or carried out in various ways.

[0020] now refer to figure 1 , figure 1 is an example for detecting hyperlinks associated with untrusted web resources and replacing them with trusted hyperlinks associated with trusted web resources based on analysis of search engine results at a client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer-implemented method comprising: obtaining a first hyperlink associated with a first web resource accessible via a client terminal; converting one or more portions of the first hyperlink into a query comprising at least A search term derived in part from portions of the first hyperlink; submitting a query to a search engine configured to search for information via the Internet; receiving search results associated with the query from the search engine, the search results including one or more two hyperlinks; determining whether to replace the first hyperlink with a replacement hyperlink selected from the second hyperlinks based at least in part on the results of an analysis of the similarity of the first hyperlink compared to each second hyperlink link; and, based on the determination, causing the client terminal to access a first web resource associated with the first hyperlink or a second web resource associated with the replacement hyperlink.

Description

Background technique [0001] Phishing is a major security threat in the field of information security. Phishing may involve attempts to obtain sensitive information (such as personal details, usernames, passwords and / or credit card details) by masquerading as a trusted entity in an electronic communications environment (such as a website on the Internet), primarily for malicious purposes Purpose. Phishing can trick users into providing sensitive information by luring unsuspecting users to visit fraudulent websites that appear to be legitimate. [0002] Phishing attempts can use a variety of different mechanisms to lure unsuspecting users to fraudulent websites, such as fraudulent site links included in email messages or instant messages, embedded in digital media, and and / or deceptive site names obtained in response to search queries associated with public search engines. [0003] Any version of phishing may also rely, at least in part, on the concept of social engineering, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/953G06F16/958G06F16/906G06F40/30
CPCG06F16/9566H04L63/1416H04L63/1425H04L63/1483
Inventor A·阿哈隆
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products