Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, apparatus, server and readable storage medium for identifying suspicious target object

A targeted and suspicious technology, applied in the computer field, can solve problems such as inability to carry out early warning processing

Active Publication Date: 2018-12-25
BEIJING QIHOO TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, when identifying whether a target is a phishing target, it is usually identified manually, for example, by collecting feedback information from multiple end users to identify a phishing target, which can only be identified afterwards, not Early warning processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus, server and readable storage medium for identifying suspicious target object
  • Method, apparatus, server and readable storage medium for identifying suspicious target object
  • Method, apparatus, server and readable storage medium for identifying suspicious target object

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0042] See figure 1 According to the first aspect of the present invention, a method for identifying suspicious target objects is provided, which may specifically include the following steps:

[0043] S101. Extract at least one piece of file information of an access target object from an access log, where the target object includes IP and / or domain name;

[0044] S102. Filter all file names included in the at le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device, a server and a readable storage medium for identifying a suspicious target object. At least one file information of the access target object is extracted from the access log. Filtering all the file names contained in the at least one file information by using a filter feature thesaurus to obtain the file information corresponding to the unfiltered file names; according to the file information corresponding to the unfiltered file name, a target object corresponding to the unfiltered file name is taken as a suspicious target object. The invention discloses a method, a device, a server and a readable storage medium for identifying a suspicious target object, which can improve the accuracy of identifying the suspicious target object and realize the effect of early warning processing.

Description

Technical field [0001] The present invention relates to the field of computer technology, and in particular to a method, device, server and readable storage medium for identifying suspicious target objects. Background technique [0002] With the rapid development of Internet technology, there are more and more phishing programs appearing on the Internet. In the prior art, a link containing the phishing program is usually sent to the terminal through a target object such as an IP or domain name. After the link, a phishing program will be implanted in the terminal, and then the phishing program will be used to steal personal information such as qq, WeChat account password, bank or credit card account password and other online fraud. [0003] In the prior art, when identifying whether a target object is a phishing target object, it is usually recognized manually. For example, the phishing target object can be identified by collecting feedback information from multiple terminal users. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/1425H04L63/1441H04L63/1483
Inventor 彭力扬李丽平
Owner BEIJING QIHOO TECH CO LTD