Precise collection method and system based on phishing website spread

A technology for phishing websites and collection systems, applied in transmission systems, electrical components, etc., can solve problems such as failure to prevent and reduce the detection rate of phishing websites, and achieve the effect of narrowing the scope and improving network security.

Inactive Publication Date: 2014-03-26
ZHUHAI JUNTIAN ELECTRONICS TECH +3
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods or devices may have certain effects in the initial stage, but as phishing website creators become familiar with and understand the detection rules, the new phishing websites they create can easily pass their detection. The detection rate of phishing websites will gradually decrease, gradually failing to prevent them
[0005] 2. Establish a phishing website database. When a phishing website is found, add the phishing website to the database, and check whether the website is a phishing website through the database. This method has a high detection rate and accuracy, but a difficulty of this method is , timely collection of phishing websites
The random method will do a lot of useless work if it is not targeted; according to the first rule to judge the collection, there will be the same problem, and the detection rate of phishing websites will gradually decrease

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Precise collection method and system based on phishing website spread
  • Precise collection method and system based on phishing website spread

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Such as figure 1 As shown, the present embodiment discloses a precise collection method based on phishing website propagation, comprising the following steps:

[0034] Step1: Within the preset time range, record the URLs of all websites queried on the server side and the number of queries; the server described in this step refers to the existing server used to query whether the website currently visited by the user is a phishing website. This step The purpose of this is to record the activity of URLs queried by the server for a period of time; the specific preset time can be set to different times according to the actual processing capacity of the server, that is, websites with high activity are collected within a certain reasonable time range. The present embodiment selects 24 hours;

[0035] Step2: According to the number of queries, obtain the URLs of websites with rankings within the preset range; the purpose of this step is to find highly active URLs, which are al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computer defense technologies, and particularly discloses a precise collection method and system based on phishing website spread. The precise collection method comprises the following steps: within a preset time range, recording the URLs(Uniform Resource Locators) of all the websites inquired on a server side and the inquiry times; acquiring the URLs of the websites ranking within a preset range according to the inquiry times; detecting whether hidden links exist in the webpages corresponding to the URLs or not, and if hidden links exist, acquiring the URLs of the hidden links; judging whether the websites corresponding to the URLs of the hidden links are phishing websites or not, and if phishing websites exist, adding the URLs corresponding to the phishing websites to a phishing website database. The precise collection system comprises an inquiry recording module, a ranking acquiring module, a hidden link detection module, a phishing website judging module, a phishing website collection module and the phishing website database, corresponding to the precise collection method. According to the invention, the phishing websites can be collected timely and precisely.

Description

technical field [0001] The invention belongs to the technical field of computer defense, and in particular relates to an accurate collection method and system based on phishing website propagation. Background technique [0002] Phishing website is a kind of network fraud, which means criminals use various methods to counterfeit the URL address and page content of the real website, or use the loopholes in the real website server program to insert dangerous HTML codes into some webpages of the site, so as to This will seriously affect the development of online financial services and e-commerce, endanger the public interest, and affect the fraudulent bank account. Public confidence in using the Internet. [0003] In order to prevent the harm of phishing websites, there are two current ideas: [0004] 1. Use a method or device to check phishing websites, such as a detection method and device for phishing websites in Chinese Patent No. 200910106659, a method and device for iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 潘建波彭仁诚
Owner ZHUHAI JUNTIAN ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products