Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting malicious behavior of webpage

A behavior and webpage technology, applied in the field of detecting malicious behavior of webpages, can solve the problems of high identification costs, automatic pop-up windows, and error-prone interception, etc., to improve accuracy and reliability, improve efficiency and accuracy, avoid Effects of malicious behavior

Active Publication Date: 2020-05-15
PETAL CLOUD TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method needs to analyze the code, and the browser's processing capacity is limited, so it is more difficult to process.
Moreover, the general code has certain precautions, and the recognition model also needs to learn dynamically, which makes the cost of recognition higher
There is also identification through user feedback, but user feedback may contain errors and inaccurate information, which requires a lot of manpower to identify, and the cost is high
Moreover, many webpages not only have entrances manually operated by users, but also have automatic pop-up or jump behaviors, which cannot accurately identify the characteristics of malicious behavior of webpages, and are easy to be intercepted by mistake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting malicious behavior of webpage
  • Method and device for detecting malicious behavior of webpage
  • Method and device for detecting malicious behavior of webpage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them.

[0038] For ease of understanding, an application scenario of the embodiment of the present application is briefly introduced first.

[0039]A browser is an application program for retrieving and displaying Internet information resources, which can be web pages, pictures, audio and video or other content. When a user uses a browser application to browse a webpage, the browser creates an independent window view for the webpage that the user browses. Inside this window view, the browser is responsible for the network request, page rendering, and page interaction response operations that the user needs to browse the webpage. In addition to the user actively opening the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for detecting a malicious behavior of a webpage. The method comprises the steps that a browser opens a webpage according to a webpage access request of a user; the browser determines that the webpage has a suspicious behavior, wherein the suspicious behavior includes one or more of popup, skip, camera calling, file access, third-party application pulling,calling and SMS sending; the browser reopens the webpage in a sandbox; and if the webpage opened in the sandbox still has the suspicious behavior, the browser reports that the webpage has a maliciousbehavior to a server. According to the technical scheme of the embodiment of the invention, the malicious behavior is identified according to the replay of the webpage behavior in the sandbox, and the malicious behavior of the webpage can be accurately and efficiently identified.

Description

technical field [0001] The present application relates to the technical field of browser security, and more specifically, to a method and device for detecting malicious webpage behaviors. Background technique [0002] A browser is an application program for retrieving and displaying Internet information resources, which brings many rich experiences to users. However, the authors of some webpages and websites will embed malicious codes in the pages, and these malicious codes will cause the browser to produce behaviors that are not expected by users. For example, when a user visits certain web pages, a pop-up window for downloading software will pop up automatically or the behavior of automatically jumping out of the web page to open other application software. For these malicious behaviors, browsers need to block them both from the perspective of security and user experience. But there are also some web page behaviors such as pop-up windows and jumps that are the active beh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/56G06F21/53
CPCH04L63/1416H04L63/1441G06F21/53G06F21/566
Inventor 刘辉尹欣
Owner PETAL CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products