Malicious URL detection method based on URL imaging technology

A detection method and malicious technology, applied in the field of URL recognition, to achieve good image representation, accurate recognition results, and accelerated gradient update

Active Publication Date: 2020-05-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the above-mentioned deficiencies in the prior art, a method for detecting malicious URL based on URL imaging technology provided by the present invention solves the existing problems in existing malicious URL detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious URL detection method based on URL imaging technology
  • Malicious URL detection method based on URL imaging technology
  • Malicious URL detection method based on URL imaging technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0047] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] Such as figure 1 As shown, a malicious URL detection method based on URL imaging technology includes the following steps:

[0049] S1. Collecting URL strings and hashing them;

[0050]S2. Encode the hashed URL string by using the ASCII code, and normalize the encoded URL string;

[0051] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious URL detection method based on a URL imaging technology, and the method comprises the following steps: collecting a URL character string, and carrying out the hash processing of the URL character string; encoding the URL character string subjected to hash processing by using an ASCII code, and normalizing the encoded URL character string; converting the URL character string into a two-dimensional image by adopting a Grignard angle field according to the normalized URL character string; forming an inception CNN network according to the convolutional neural network, and training the inception CNN network; and inputting the two-dimensional image into the trained inception CNN network to obtain a judgment result of the malicious URL. By converting the URL into the two-dimensional image, the malicious URL can be accurately identified.

Description

technical field [0001] The invention belongs to the field of URL identification, and in particular relates to a malicious URL detection method based on URL imaging technology. Background technique [0002] The popularization of information technology has greatly promoted the development of online banking, e-commerce and social networks. More and more people complete social networking, shopping, and information acquisition through the Internet. The government is also promoting e-government through the Internet to enhance government transparency. and improve the quality of public decision-making. But at the same time, the Internet has also become an active platform for criminals, and a large number of cyber crimes have emerged. Cyber ​​attackers make illegal profits through phishing sites, spam ads, and malware promotions. Among these attacks, a considerable part is realized by means of malicious URLs. URL is the uniform resource locator, which is a concise representation o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/955G06N3/04
CPCG06F16/9566G06F16/9554G06N3/045
Inventor 刘瑶鲁俊良李佳洲娄云秦臻
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products