Unlock instant, AI-driven research and patent intelligence for your innovation.

Network link identification method, device, storage medium and electronic equipment

A network link and identification method technology, which is applied in the fields of network link identification, devices, storage media and electronic equipment, can solve the problems of time-consuming and labor-intensive, affecting the accuracy of malicious URL identification, and the accuracy of identification results cannot be guaranteed, and achieves the reduction of Labor cost and material cost, and the effect of improving detection accuracy

Active Publication Date: 2020-12-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the above malicious URL identification scheme, since the vocabulary feature template needs to be manually designed in advance based on experience, it is too cumbersome and time-consuming; in addition, once the URL to be identified contains words that are not involved in the vocabulary feature template, the accuracy of the recognition result The accuracy cannot be guaranteed, which will seriously affect the recognition accuracy of malicious URLs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network link identification method, device, storage medium and electronic equipment
  • Network link identification method, device, storage medium and electronic equipment
  • Network link identification method, device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0077] It can be understood that the terms "first", "second" and the like used in this application may be used to describe various concepts herein, but unless otherwise specified, these concepts are not limited by these terms. These terms are only used to distinguish one concept from another. Wherein, at least one refers to one or more than one, for example, at least one URL may be any integer number of URLs greater than or equal to one, such as one URL, two URLs, or three URLs. And multiple refers to two or more than two, for example, multiple URLs may be any integer number of URLs greater than or equal to two, such as two URLs or three URLs.

[0078] In addition, the URL data used for training the deep learning model in this e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network link identification method and device, a storage medium and electronic equipment, and belongs to the technical field of cloud. The method comprises the steps of obtaining a to-be-identified target URL; performing multi-granularity feature extraction on the target URL to obtain a word embedding feature, a character embedding feature and a domain name embedding feature of the target URL; performing feature fusion processing on the word embedding features and the character embedding features of the target URL; based on the obtained fusion feature sequence and domain name embedding features of the target URL, obtaining an untrusted score of the target URL; in response to the fact that the untrusted score of the target URL is greater than a target threshold, outputting a first identification result, wherein the first identification result is used for indicating that the target URL is an untrusted URL forbidden to be accessed. According to the method, no manual feature engineering is needed, semantic information and mode discrimination features in the URL text can be effectively captured, the manpower and material resource cost is reduced, and the detection accuracy of malicious URLs can be improved.

Description

technical field [0001] The present application relates to the field of cloud technology, and in particular to a network link identification method, device, storage medium and electronic equipment. Background technique [0002] In daily work and life, the existence of malicious URL (Uniform Resource Locator, Uniform Resource Locator) makes network users always suffer from the threat of network security issues. In a broad sense, malicious URLs generally refer to network links that users visit involuntarily. These network links are usually implanted with malicious codes (such as viruses). Malicious codes induce users to visit by pretending to be normal services. Once a user visits a malicious URL, he or she will face risks such as theft of personal information or loss of personal property. [0003] In order to identify malicious URLs, related technologies usually adopt a malicious URL identification scheme based on vocabulary filtering. Among them, this scheme needs to manual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/955
CPCG06F16/9566
Inventor 田帅
Owner TENCENT TECH (SHENZHEN) CO LTD