Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Illegal website identification system and method based on critical path

An identification system and critical path technology, which is applied in the field of illegal website identification system based on critical path, can solve the problems of insufficient detection of unknown illegal websites, insufficient accuracy of website clustering methods, inability to quickly identify illegal websites, etc.

Inactive Publication Date: 2017-05-31
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this indirect website clustering method is not accurate enough to achieve fast identification of illegal websites
In the professional field of automatic identification of illegal websites, existing researches are mainly based on three types of technologies: blacklist, static detection and dynamic detection. However, the workload and cost of establishing and maintaining blacklists are large, and static detection mostly obtains website static data through web crawlers. , the detection of unknown illegal websites is not timely enough, the implementation of dynamic detection is difficult, and it is mainly aimed at websites linked to horses, and the types of websites that can be identified are limited
To sum up, it can be seen that there are not many researches on identifying illegal websites through website similarity and website key path, especially the research on the key path of URL of illegal websites is still very little.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal website identification system and method based on critical path
  • Illegal website identification system and method based on critical path
  • Illegal website identification system and method based on critical path

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to better describe the technical solutions of the present invention, specific examples are given below for further illustration.

[0056] see figure 1 As shown, the critical path-based illegal website identification system includes user layer, application service layer, technical support layer and data storage layer. ,

[0057] see figure 2 As shown, the user layer is used to provide the main accounts of the system, including data preprocessing accounts, algorithm program management accounts, algorithm execution accounts and system management accounts, wherein:

[0058] The data preprocessing account is used to realize the development of the data processing program of the system, the operation of the data processing program and the management of the data obtained by the system after data processing. The algorithm program management account is used to realize the algorithm of the system development and maintenance, wherein the algorithm includes a similarity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an illegal website identification system and method based on a critical path. A system framework is divided into four layers, namely a user layer, an application service layer, a technical support layer and a data storage layer. The user layer provides a main account of the system; the application service layer provides a main function module of the system; the technical support layer comprises a relevant tool used in the system development process and a core algorithm program; the data storage layer provides data used in the system. According to the detailed functional division, the function module of the illegal website identification system based on the critical path comprises data preprocessing, website similarity calculation, website clustering, illegal website critical path extraction and illegal website identification. The system develops a similarity calculation program based on the Path through taking URL self characteristics as research start points, can accurately calculate the similarity among websites and obtain the effective URL critical path based on the website similarity and a Fast Unfolding clustering algorithm, and finally can discover illegal websites in unknown websites through the URL critical path.

Description

technical field [0001] The present invention relates to the field of website identification and classification, in particular to the technical field of illegal website identification, and specifically refers to an illegal website identification system and method based on a critical path. Background technique [0002] Identifying illegal websites is an important task in the field of network security, and the accuracy and timeliness of the identification method have higher requirements. At present, the existing website clustering research mostly starts from the perspective of user access behavior, and obtains the data of user access to the website from the Web log, including the user's access path, access frequency, access time, and access hobbies, etc., and establishes a user transaction matrix. Then cluster user groups and websites. However, this indirect website clustering method is not accurate enough to achieve fast identification of illegal websites. In the professiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F21/55G06K9/62
CPCG06F16/951G06F16/9566G06F21/552G06F18/23
Inventor 凡友荣王永剑曲洋杨涛姜国庆彭如香
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products