Malicious domain name detection method based on tag and attribute similarity of DOM tree

A DOM tree and domain name detection technology, applied in the field of malicious domain name detection of label and attribute similarity, can solve problems such as poor accuracy and low detection rate, and achieve the effects of high accuracy, improved accuracy, and high judgment efficiency

Inactive Publication Date: 2019-07-23
HARBIN INST OF TECH AT WEIHAI
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the technical problems of low detection rate and poor accuracy of existing malicious domain name detection methods, the present invention provides a high-accuracy, high-efficiency malicious domain name detection method based on DOM tree label and attribute similarity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious domain name detection method based on tag and attribute similarity of DOM tree
  • Malicious domain name detection method based on tag and attribute similarity of DOM tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with the examples.

[0031] figure 1 It shows the flow chart of the malicious domain name detection method based on the label and attribute similarity of the DOM tree. The process formed by the solid line in the figure is the processing process of the domain name set of known type, and the process formed by the dotted line in the figure is the malicious domain name of the unknown type. sex testing process.

[0032] By analyzing the DOM tree, it is found that the shallow nodes of the tree have a great influence on the structure of the web page: if the web pages are not similar, the shallow node information will be very different; if the web pages are similar, the shallow label information is close, but the deeper the level, the greater the difference . In order to measure the similarity of the webpage structure from the DOM tree structure of the malicious domain name, a detection method of malicious d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious domain name detection method based on tag and attribute similarity of a DOM (Document Object Model) tree, and solves the technical problems of low detection rate andpoor accuracy of an existing malicious domain name detection method. The method comprises the steps of collecting a malicious domain name set, converting the malicious domain name set into a binary string, and storing the binary string in a database; converting the domain name of the unknown type into a binary string; comparing the binary string corresponding to the unknown type domain name withthe binary string of the malicious type domain name set in the database, and judging the maliciousness of the unknown type domain name through the similarity between the binary string and the binary string. The method can be widely applied to a network security system.

Description

technical field [0001] The invention relates to a malicious domain name detection method, in particular to a malicious domain name detection method based on DOM tree label and attribute similarity. Background technique [0002] In recent years, the continuous increase in the number of various malicious domain names has posed a huge threat to the personal privacy, property safety, and even physical and mental health of users. The existence of malicious domain names has seriously hindered the healthy development of the Internet. Although the number of malicious domain names is huge, in reality, malicious domain name registrants will register a large number of different domain names in order to achieve the purpose of low-cost, fast and large-scale generation of malicious domain names, but the webpage structures of these domain names are the same or similar. [0003] At present, the malicious domain name detection method based on the research of the web page corresponding to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1441H04L61/4511
Inventor 张兆心刘晓燕程亚楠许海燕闫健恩
Owner HARBIN INST OF TECH AT WEIHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products