Malvertising attack detection method

A malicious advertisement and attack detection technology, applied in the network field, can solve the problems of multiple malicious advertisement sources, strong mutation, user loss, etc., achieve good detection effect, improve detection efficiency, and achieve unified detection effect

Inactive Publication Date: 2016-11-09
HEFEI MINZHONGYIXING SOFTWARE DEV CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, malicious advertisements may also come from the website itself. For some unknown small websites, unsafe third-party advertising links are used for profit. These link advertisements are easy to inject malicious attack codes
It is precisely because of the many sources of malicious advertisements and the strong mutation characteristics that malicious advertisement attacks have occurred frequently in recent years. These attacks have caused losses to users and at the same time attracted more and more attention.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] A malicious advertisement attack detection method, comprising the steps of:

[0023] (1) URL extraction

[0024] Obtain all suspicious URL collections related to advertisements in the website to be tested, use it as the collection to be tested, and use the open source crawler Nutch to extract the URL information in the website to be tested, as described;

[0025] (2) Request initiated

[0026] The URLs in the collection to be tested are sent to their corresponding servers, and then the response information is directed to the filter module

[0027] (3) Combined filtering

[0028] Responsible for detecting the request response information of the URL set. If the response information is injected with malicious code, when the server’s response information returns to the sending module, deploy the combined filtering module in the response path, so that all response information can be detected. Module, the legal response information will pass, and the illegal response will ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malvertising attack detection method. An open source creeper Nutch is used for extracting URL information in a website to be detected, only URL links related to advertisements are extracted in URL extraction, and the detection efficiency can be improved; URL to be detected is sent to an API to be verified, and whether the URL is safe or not can be judged according to response information; a library is achieved through Google search and international anti-fishing alliance, the scale of the library is very huge, and a large number of attack behaviors can be detected. The attack URL confirmed by API needs to be extracted from a set to be detected, information of the URL is recorded to a log file, and the output position, the output format and the log level of logs can be configured respectively; the malvertising attack behavior detected in log analysis is displayed in pie chart and bar chart forms, and the detection results can be displayed visually. The detection method is complete in rule, based on a client side, uniform detection of malvertising attacks can be achieved, and a good detection effect is achieved.

Description

technical field [0001] The invention belongs to the field of network methods, and more specifically, the invention relates to a malicious advertisement attack detection method. Background technique [0002] With the advent of the times, the Internet has become an inseparable part of people's lives. People can obtain various free services through the Internet every day. While many companies provide free services to Internet users, advertising has become their main source of income. At present, online advertising (1) has formed a huge business of tens of billions of dollars, and formed a complete industrial chain, which is mainly supported by multi-level large-scale infrastructure. Online advertising, originally served solely by advertisers with high-traffic websites, has evolved into the form of ad networks. Malicious advertisement attacks mainly refer to attacks on users using advertisements as carriers. This type of attack has the characteristics of large variability and s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 董雄飞
Owner HEFEI MINZHONGYIXING SOFTWARE DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products