Phishing website processing method and device

A technology of phishing websites and processing methods, applied in the network field, can solve problems such as difficulty in participation, inability of websites to promptly and proactively discover phishing websites, information security and property security threats of enterprises and users phishing websites, and achieve the effect of improving security

Inactive Publication Date: 2017-06-13
CHINA MOBILE COMM GRP CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, the monitoring and detection methods for phishing websites have been withdrawn, but the counterfeit websites cannot promptly and actively discover the phishing websites as imitators, and it is also difficult to participate in timely reminders to users to be careful of phishing websites. Illegal activities have caused both enterprises and users to receive threats to information security and property security from phishing websites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phishing website processing method and device
  • Phishing website processing method and device
  • Phishing website processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 As shown, the present embodiment provides a method for processing phishing websites, the method comprising:

[0040] Step S110: Obtain traffic data of the website server;

[0041] Step S120: analyzing the traffic data of the website server, determining the domain name information of the website visited by the terminal and the communication identification of the terminal;

[0042] Step S130: Determine whether the website accessed by the terminal is a phishing website or a suspected phishing website according to the domain name information;

[0043] Step S140: If the website accessed by the terminal is the phishing website or a suspected phishing website, send reminder information to the terminal through the communication identifier.

[0044] The method for processing phishing websites described in this embodiment can be applied to enterprise servers or community servers that provide network services. For example, a bank server that provides banking se...

Embodiment 2

[0080] Such as image 3 As shown, the present embodiment provides a device for processing phishing websites, the device comprising:

[0081] An acquisition unit 110, configured to acquire traffic data of the website server;

[0082] The analysis unit 120 is configured to analyze the traffic data of the website server, determine the domain name information of the website visited by the terminal and the communication identification of the terminal;

[0083] A determining unit 130, configured to determine whether the website accessed by the terminal is a phishing website or a suspected phishing website according to the domain name information;

[0084] The sending unit 140 is configured to send reminder information to the terminal through the communication identifier if the website visited by the terminal is the phishing website or a suspected phishing website.

[0085] This embodiment provides that the device for processing phishing websites can be applied to various website s...

example 1

[0102] The present embodiment provides a kind of phishing website processing method, comprises the following steps:

[0103] Step 1: Remotely capture server-side traffic. When designing this phishing website monitoring and protection system, the traffic data of the website server is obtained through the front-end mirroring or splitting of the enterprise server traffic. The phishing website detection and protection system may be a system running on an enterprise server.

[0104] The second step: traffic data preprocessing. Analyze the acquired traffic data and parse it into recognizable formats and fields.

[0105] Step 3: Extract and analyze relevant fields, where the relevant fields may include referer field and x-up-calling-line-id field.

[0106] According to the access traffic generated by the converged access point name (APN) container, extract the relevant referer field for analysis, mainly extract, count and analyze the domain name information in the referer field in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a phishing website processing method and device. The method comprises the following steps: obtaining the traffic data of a website server; analyzing the traffic data of the website server, and determining the domain name information of the website accessed by the terminal and the communication identifier of the terminal; determining whether the website accessed by the terminal is a phishing website or a suspected phishing website according to the domain name information; and if the website accessed by the terminal is the phishing website or the suspected phishing website, sending a prompting message to the terminal through the communication identifier.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and device for processing phishing websites. Background technique [0002] With the development of network technology, users use the network to conduct bank checks, transfer accounts, purchase goods or send red envelopes. But at the same time, many phishing websites have appeared, trying to use phishing websites to obtain illegal benefits through phishing. Phishing is a kind of network fraud, which means criminals use various methods to counterfeit the URL address and page content of the real website, or use the loopholes in the real website server program to insert dangerous HTML codes into some web pages of the site, in order to This is to defraud the user's bank or credit card account number, password and other private information. [0003] Phishing mainly sends a large amount of deceptive information claiming to come from banks, Internet halls or well-known instit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/10
Inventor 付俊王坤舒有武张峰
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products