Phishing mail detection method and device, equipment and storage medium

A detection method and phishing email technology, applied in electrical components, transmission systems, etc., can solve problems such as powerlessness and inability to detect, and achieve the effect of preventing infringement and improving security.

Pending Publication Date: 2021-10-26
SANGFOR TECH INC
View PDF20 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for some non-spliced ​​phishing emails, this solution is powerless
For example, this scheme cannot detect phishing emails using

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phishing mail detection method and device, equipment and storage medium
  • Phishing mail detection method and device, equipment and storage medium
  • Phishing mail detection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The core of this application is to provide a test method, device, electronic device, and computer readable storage medium for fishing emails to effectively detect a fishing message using non-spliced ​​confused camouflage means and improve mail security.

[0044] In order to more clear and completely, the technical solutions in the present application embodiment will be described in conjunction with the drawings in the present application embodiment. Based on the embodiments in the present application, one of ordinary skill in the art is in the scope of the present application without making creative labor premistence.

[0045] Fishing mail generally uses camouflage emails, deceives the recipient to reply to the specified recipient, or boot the recipient to the special web page, and these webpages are usually presented into and real-name. The same look, such as a web page, such as bank or financial management, to make the login letter to true, enter credit card or bank card ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a phishing mail detection method and device, electronic equipment and a computer readable storage medium. The method comprises the steps of extracting target fields related to domain names in mail data to form a field set; extracting target domain names in the field set to form a domain name set, wherein the target domain names comprise first-level domain names and/or sub-domain names; calling a domain name spelling error correction model to process the target domain names in the domain name set, wherein the domain name spelling error correction model is generated by pre-training based on a spelling error correction algorithm and is used for outputting a corresponding correctly spelled domain name after a mistakenly spelled domain name is input; and judging a mail corresponding to the target domain name which enables the output of the domain name spelling error correction model to be not empty as a phishing mail. According to the invention, the pre-trained domain name spelling error correction model is utilized, the phishing mails disguised by adopting non-splicing confusion means can be effectively identified, the user account is effectively prevented from being damaged by the phishing mails, and the use safety of the mails is greatly improved.

Description

Technical field [0001] The present application relates to the field of network security testing, and Background technique [0002] With the development of network information technology, network security issues are also endless. Many illegal people implement their online criminal activities by sending malicious messages to users, such as stealing users, and control user's computers. [0003] Among them, fishing mail is very harmful to users, and a fishing technique for use often uses dangerous operations such as landing, transfer, download malicious attachments by imitating well-known domain names. Therefore, it is very important to effectively detect fishing emails to avoid corresponding losses. [0004] The current method of detecting fishing emails is primarily based on splicing confusion; the program can detect results after stitching with other strings, such as Google-Id.com, baidu-app.com, etc. However, for some non-spliced ​​phishing mail, the program is in powerless. For ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1483H04L61/4511H04L2101/37
Inventor 宁阳闫凡郜振锋郑景中王雄许云中
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products