Search keyword-based malicious search detection system and method

A search method and keyword technology, applied in the field of malicious search detection, can solve problems such as the inability to quickly, accurately and universally detect malicious searches, and achieve the effects of easy implementation, improved running speed, and fast running speed

Active Publication Date: 2019-07-26
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The purpose of the present invention is to overcome the defects of the above-mentioned prior art that malicious searches cannot be detected quickly, accurately and universally, and propose a method and system for detecting malicious searches based on the time correlation of malicious search keywords. To start, you can take into account accuracy, ease of use, efficiency and universality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Search keyword-based malicious search detection system and method
  • Search keyword-based malicious search detection system and method
  • Search keyword-based malicious search detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present invention clearer, the method and system for detecting malicious search based on search keywords proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation methods described here are only used to explain the present invention, and are not intended to limit the present invention.

[0039] When researching methods for detecting malicious searches, the defects in the prior art are mainly due to the fact that malicious users’ behavior characteristics are mainly considered for detection without paying attention to the search keywords submitted by users. Since search keywords are the embodiment of users’ search purposes, after A study of search keywords submitted continuously by users in a short period of time found that the above defects can be solved by using the time correlatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a search keyword-based malicious search detection method, which comprises the following steps of: a correlation preliminary screening step: comparing the correlation between search keywords and seed words, and selecting a plurality of search keywords as first candidate words; a candidate word clustering step: converting the first candidate word into a vector, clustering the vector, and selecting a second candidate word from the clustered first candidate word; and a popular word removal step: constructing a search word graph by using the second candidate word, and removing the popular word in the search word graph according to the clustering characteristic of the malicious search keyword to screen out the malicious search keyword.

Description

technical field [0001] The invention relates to the technical field of computer network search, in particular to a method and system for detecting malicious search. Background technique [0002] Search engines provide a convenient and quick entry for Internet users to search for interesting content. Users search by submitting search keywords. After receiving the submitted search keywords, the search engine will search for many related web pages based on a series of ranking algorithms and rules. Give the ranking, and display the webpage on the search result page according to the ranking. [0003] Search engines often use the advertising model of paid search. Enterprises can participate in the bidding ranking. When users search for relevant keywords, the enterprise's advertisement will be displayed in the front position of the search result page. The common revenue model is that the enterprise clicks on the advertisement. The number of times you pay a search engine. This pai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06F17/27G06F16/9535
CPCG06F16/9535G06F40/216G06F18/23213
Inventor 杨东辉李振宇谢高岗
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products