Malicious webpage identification and detection method based on static field, computer and storage medium
A technology for malicious web pages and detection methods, applied in the field of malicious web page identification and detection, can solve the problems of fingerprints occupying too much space resources, inability to apply real-time detection, and one-sided plain text information, etc. short time effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0053] Example 1, reference Figure 1-3 Illustrating the present embodiment, the present invention provides a malicious web page identification detection method based on a static domain, comprising the following steps:
[0054] Step 1: Listen to the web page traffic in real time and extract the URL address of the HTTP header;
[0055] Step 2: Match the URL address described in step 1 with the URL address stored in the blacklist database; if the match is successful, the traffic is blocked, and if the match fails, step 3 is performed;
[0056] Step three, the parsing matching failed web page traffic; the parsing method of the present invention can improve the efficiency of the web page parsing process, can be for the existence of grammar and format errors on the web page for a series of response processing and circumvention, but also by setting the maximum parsing depth to limit the program running time, as well as the deep node to dry. This includes the following steps:
[0057] Ste...
Example Embodiment
[0100] Example 2, a computer, the computer apparatus of the present invention may include a processor and a memory apparatus, such as a microcontroller comprising a central processor and the like. Further, the processor for executing a computer program stored in the memory when implementing the above steps of the preferred method of modifying the recommended data driven by the relationship based on the CREO software.
[0101] The alleged processor may be a central processing unit (CPU), may also be another general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), off-the-shelf programmable gate array ( Field-Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
[0102] The memory may mainly include a storage program ar...
Example Embodiment
[0103] Example 3, the computer-readable storage medium
[0104] The computer-readable storage medium of the present invention may be any form of storage medium read by the processor of the computer apparatus, including but not limited to nonvolatile memory, volatile memory, ferroelectric memory, etc., computer-readable storage medium stored on a computer program, when the processor of the computer apparatus reads and executes the computer program stored in the memory, the above-described step of the modeling method based on CREO software can be modified by the relationship-driven modeling data modeling method.
[0105] The computer program includes computer program code, the computer program code may be in source code form, object code form, executable file or some intermediate form and the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, disk disk, optical disk, compu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap