A system and method for detecting malicious searches based on search keywords

A search method and keyword technology, applied in the field of malicious search detection, can solve problems such as the inability to detect malicious searches quickly, accurately, and universally, and achieve the effect of easy implementation, less requirements, and universal detection.

Active Publication Date: 2021-07-09
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The purpose of the present invention is to overcome the defects of the above-mentioned prior art that malicious searches cannot be detected quickly, accurately and universally, and propose a method and system for detecting malicious searches based on the time correlation of malicious search keywords. To start, you can take into account accuracy, ease of use, efficiency and universality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for detecting malicious searches based on search keywords
  • A system and method for detecting malicious searches based on search keywords
  • A system and method for detecting malicious searches based on search keywords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present invention clearer, the method and system for detecting malicious search based on search keywords proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementation methods described here are only used to explain the present invention, and are not intended to limit the present invention.

[0039] When researching methods for detecting malicious searches, the defects in the prior art are mainly due to the fact that malicious users’ behavior characteristics are mainly considered for detection without paying attention to the search keywords submitted by users. Since search keywords are the embodiment of users’ search purposes, after A study of search keywords submitted continuously by users in a short period of time found that the above defects can be solved by using the time correlatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting malicious search based on search keywords, comprising: a preliminary correlation screening step, comparing the correlation between search keywords and seed words, selecting multiple search keywords as first candidate words; candidate word clustering Step, clustering after converting the first candidate word into a vector, selecting a second candidate word from the first candidate word after clustering; popular word removal step, constructing a search term map with the second candidate word, according to The clustering characteristics of malicious search keywords, in which popular words are removed from the search word graph to filter out malicious search keywords.

Description

technical field [0001] The invention relates to the technical field of computer network search, in particular to a method and system for detecting malicious search. Background technique [0002] Search engines provide a convenient and quick entry for Internet users to search for interesting content. Users search by submitting search keywords. After receiving the submitted search keywords, the search engine will search for many related web pages based on a series of ranking algorithms and rules. Give the ranking, and display the webpage on the search result page according to the ranking. [0003] Search engines often use the advertising model of paid search. Enterprises can participate in the bidding ranking. When users search for relevant keywords, the enterprise's advertisement will be displayed in the front position of the search result page. The common revenue model is that the enterprise clicks on the advertisement. The number of times you pay a search engine. This pai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F40/216G06F16/9535
CPCG06F16/9535G06F40/216G06F18/23213
Inventor 杨东辉李振宇谢高岗
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products