Malicious website recognition and interception technology based on communication operator network transmission layer

A technology for carrier networks and malicious URLs, applied in transmission systems, electrical components, etc., can solve problems that endanger users' online security, and achieve the effects of short feedback time, high efficiency and accuracy, and accurate collection

Pending Publication Date: 2020-04-21
多彩贵州印象网络传媒股份有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, with the strengthening of domestic Internet information content management, a large number of malicio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website recognition and interception technology based on communication operator network transmission layer
  • Malicious website recognition and interception technology based on communication operator network transmission layer
  • Malicious website recognition and interception technology based on communication operator network transmission layer

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0041] The present invention will be further clarified below in conjunction with the drawings and specific embodiments.

[0042] A malicious website identification and interception technology based on the network transport layer of communication operators, including system management center, malicious website blocking engine, intelligent detection engine, website collection module, cloud detection module, data management module, data statistics module, strategy Audit module and security management module; The management center provides interface-based integrated management and control methods for each engine module, configures and distributes a series of instructions so that each module can complete corresponding business operations;

[0043] It includes the following steps:

[0044] Step 1. Establish a database of local malicious URLs, support image recognition, keyword detection, and collect data from the Internet based on backlinks from existing data, and support data connection w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious website recognition and interception technology based on a communication operator network transmission layer, and the technology specifically comprises the steps: malicious website data collection: there are a large number of malicious websites in the Internet, the malicious websites are hidden in a large number of Internet, and the malicious websites are quickly found through the collection of user access traces; malicious website recognition and blocking: a malicious URL two-stage detection module mechanism ensures timeliness and accuracy, a local malicious website recognition module is established, and malicious website blocking can be quickly and effectively carried out; establishing a cloud malicious website recognition module, performing deep networking analysis on malicious websites which cannot be identified locally, and performing centralized processing to reduce resource consumption; malicious website recognition efficiency: malicious website recognition needs to compare and process massive website data, a powerful hardware system and algorithm optimization are established, and the recognition speed can reach milliseconds.

Description

technical field [0001] The invention belongs to the fields of communication technology, information technology and network security, and in particular relates to a malicious website identification and blocking technology based on communication operators. Background technique [0002] A large number of security incidents on the Internet are related to malicious network links, such as telecom fraud and malicious program embedding. Especially in recent years, phishing incidents carried out by counterfeit Internet palms have directly damaged the economic interests of a large number of mobile users, aroused bad public opinion in society, and in turn caused serious damage to the corporate image of China Telecom. Criminals spread malicious phishing websites by means of fake base stations to send spam messages, and use various methods such as charging phone charges, sending traffic, and redeeming points to lure users to click, defraud users of personal information such as bank card ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1416H04L63/1466H04L63/20
Inventor 邓利陈鹏朱坤康忠兴吴国文
Owner 多彩贵州印象网络传媒股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products