Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Training method, a detection method and a system for a malicious webpage detection model

A malicious webpage and detection model technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of difficult rule update, high cost, and increased false detection rate, so as to improve prediction efficiency, reduce system resource consumption and time consumption, and artificial energy consumption. consumption, effects with generalization properties

Pending Publication Date: 2019-04-19
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The disadvantage of static detection technology is that in the face of a large number of new samples to be tested every day, simple feature distribution statistics and heuristic rules can no longer meet the needs. First, the false detection rate increases because of the limitations of heuristic rules and fuzzy matching technology. There are many normal samples that are misjudged as malicious samples because some code fragments match certain templates; secondly, the rule update of this scheme is difficult, and the extraction of rules depends on a lot of professional knowledge and manual summarization, so the rule update higher cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Training method, a detection method and a system for a malicious webpage detection model
  • Training method, a detection method and a system for a malicious webpage detection model
  • Training method, a detection method and a system for a malicious webpage detection model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below, specific embodiments of the present invention will be described in detail in conjunction with the accompanying drawings, but they are not intended to limit the present invention.

[0047] It should be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the following description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the disclosure.

[0048] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and, together with the general description of the disclosure given above and the detailed description of the embodiments given below, serve to explain the embodiments of the disclosure. principle.

[0049] These and other characteristics of the invention will become apparent from the following description of preferr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a training method, a detection method and a system for a malicious webpage detection model. The training method comprises the following steps of: obtaining a data set of a webpage and judgment result data of whether the webpage is a malicious webpage or not; Processing the data set; Establishing a training model architecture; And taking the processing result of the webpage data set as input data, and taking the judgment result as output data to train the training model architecture, so as to form a detection model capable of predicting whether the webpage is a malicious webpage based on the input webpage data processing result. According to the training method in the embodiment of the invention, the detection model for simply and efficiently predicting whether the corresponding webpage is the malicious webpage based on the input network data can be trained, so that the precision is higher when the webpage is predicted through the detection model, and meanwhile, the prediction operation of a user on the webpage is greatly simplified.

Description

technical field [0001] The embodiments of the present invention relate to the field of web page detection, and in particular to a malicious web page detection model training method, a malicious web page detection method and a system. Background technique [0002] With the development of Internet technology, more and more users obtain information through the Internet, creating new opportunities for collecting personal privacy information and organizing criminal activities. Such as all kinds of fraudulent and phishing websites, webpages containing malicious code, pornographic and gambling websites, etc. According to statistics from Kaspersky, malicious webpages appear and play a role in 87.36% of cyber attacks. According to Google's data, about 1.3% of Google's search results are linked to Trojan pages or phishing pages. It can be seen that malicious webpage attacks have surpassed traditional malicious attack forms and become the biggest challenge facing the current network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 潘季明贾蓉
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products