Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious webpage identification method

A malicious web page and identification method technology, applied in the field of Internet security, to achieve a high recognition rate

Active Publication Date: 2020-05-26
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is very dependent on experts in network security, and requires people who are very familiar with malicious web pages to perform manual feature extraction on malicious web page data sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious webpage identification method
  • Malicious webpage identification method
  • Malicious webpage identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious webpage identification method, which comprises the following steps: 1, acquiring the data set of a malicious webpage, and acquiring the training set and the test set of the malicious webpage through data preprocessing; 2, acquiring the character-level embedding of the training set and the test set by using a Char-CNN model; 3, constructing a BiLSTM-Attention neural network model; 4, training the BiLSTM-Attention neural network model constructed in the step 3 by utilizing the training set and the character-level embedding thereof, and static word embedding; 5, verifying the BiLSTM-Attention neural network model trained in the step 4 by utilizing the test set and the character-level embedding thereof, and static word embedding; and 6, after the verification in the step 5, performing malicious webpage identification on the webpage data accessed by a user by using the trained BiLSTM-Attention neural network model. According to the method, a bidirectionallong-short-term memory recurrent neural network based on an attention mechanism is adopted while a method of combining character-level embedding and static word embedding is also used, so that the purpose of malicious webpage identification is achieved.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a malicious webpage identification method. Background technique [0002] In recent years, with the continuous development of the Internet industry, the Internet has become an indispensable part of people's lives. But at the same time, malicious criminal activities using the Internet are also on the rise. Using malicious webpages to carry out phishing attacks, promote spam advertisements, and guide the download of malware are the main activities of Internet crimes. According to the <<Global Chinese Phishing Website Status Statistical Analysis Report (2016>>) and the report of the China Anti-Phishing Alliance in recent years, it can be seen that China is the country with the largest proportion of malicious web pages, and the number of malicious web pages is increasing rapidly year by year. How to quickly and effectively Identifying malicious webpages has bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/955G06N3/04G06N3/08
CPCG06F16/9566G06N3/049G06N3/08G06N3/045
Inventor 廖永建王勇王栋吴宇梁艺宽
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products