Domain name recognition method and device, storage medium and electronic device

An identification method and domain name technology, which is applied in the computer field, can solve problems such as high analysis cost, no solution proposed, and lagging recognition results, and achieve the effect of overcoming lag and avoiding security threats

Active Publication Date: 2019-09-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method can only be analyzed after the malware samples are obtained. Not only the analysis cost is high, but also the identification results are l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Domain name recognition method and device, storage medium and electronic device
  • Domain name recognition method and device, storage medium and electronic device
  • Domain name recognition method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a domain name recognition method and device, a storage medium and an electronic device. The method comprises the steps of obtaining domain name access logs sent by all terminals, wherein the domain name access logs are used for recording the mapping relation between user accounts using the terminals and accessed domain names; performing grouping mapping processing on the domain names in the domain name access log by using a locality sensitive hashing method to obtain a mapping result in which object domain names contained in each group have relevance; and sequentially performing the following recognition processing on the domain name types of the object domain names in each group: under the condition that the current group contains a known domain name type, recognizing an unknown domain name type in the current group according to the known domain name type. The technical problem that at present, the malicious domain names recognized through a reverse analysis method have lagging is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a domain name identification method and device, a storage medium and an electronic device. Background technique [0002] Malicious domain names used for malicious activities often seriously threaten the user's network information security. Among them, malicious domain names include: malware download domain names, illegal website domain names, phishing website domain names, domain names connected to malware control and command servers, etc. [0003] At present, in order to maintain network security, network security experts usually conduct reverse analysis on software using malicious domain names, so as to achieve the purpose of identifying malicious domain names. However, this method can only be analyzed after the malware samples are obtained. Not only the analysis cost is high, but also the identification results are still lagging behind, which cannot guarantee timely identific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1441H04L61/4511
Inventor 邓永林智鑫廖湘平
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products