Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Malicious website identification method and device

A malicious website and identification method technology, applied in the direction of website content management, network data retrieval, data exchange network, etc., can solve the problems of slow identification speed, inability to identify malicious websites, low identification rate, etc. The effect of speed and recognition rate

Pending Publication Date: 2020-10-09
北京天空卫士网络安全技术有限公司 +1
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Malicious websites that have not been included in the evil chain database cannot be identified. Relevant threats need to be updated after the evil chain database is updated. The recognition speed is slow and the recognition rate is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website identification method and device
  • Malicious website identification method and device
  • Malicious website identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0050] As mentioned in the background, the prior art generally judges whether a certain website is a malicious website based on the evil link database, but this method cannot identify malicious websites that have not been included in the evil link database. For example, the following scenario: The attacker uses a newly registered website with a new domain name or a newly c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious website identification method and device, and relates to the technical field of network security. A specific embodiment of the method comprises the steps of extracting a URL address and page content of a to-be-identified website, and querying a URL classification library according to the URL address to obtain corresponding first website classification information; wherein the URL classification library stores a mapping relationship between a URL address sample and website classification information, and the first website classification information is determined from the website classification information; matching the page content with a pre-created content identification template, and determining second website classification information corresponding to the content identification template matched with the page content; and comparing whether the first website classification information is the same as the second website classification information ornot, and when the first website classification information is different from the second website classification information, judging that the to-be-identified website is a malicious website. Accordingto the embodiment, the malicious website can be identified before the URL address of the to-be-identified website is recorded, so that the identification speed and the identification rate of the malicious website are improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for identifying a malicious website. Background technique [0002] Malicious websites are illegal websites with viruses, worms and Trojan horses that intentionally perform malicious tasks on a computer system. This type of website is usually in the form of a certain web page, allowing people to browse the content of the page normally, and at the same time illegally obtain various data in the computer. With the popularization and development of Internet applications, the number of attacks from malicious websites has increased significantly, and the losses caused have become increasingly serious. It has become a major threat to current network security. How to accurately identify malicious websites has become a research hotspot in network security. [0003] For the identification of malicious websites, at present, it is generally based on the maliciou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/9532G06F16/955G06F16/958G06F40/289G06Q40/02H04L12/58H04L29/06
CPCG06F16/9532G06F16/9566G06F16/958G06F40/289H04L51/04H04L63/145H04L51/42G06Q40/03
Inventor 陈少涵刘茜谭振华
Owner 北京天空卫士网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products