Malicious URL identification method and device

A malicious website and identification method technology, applied in the field of malicious website identification method and device, can solve problems such as potential safety hazards, achieve the effect of ensuring security and improving identification coverage

Active Publication Date: 2021-01-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that the terminal normally displays the webpage containing the packaged malicious URL, thereby causing potential safety hazards, the embodiment of the present invention provides a malicious URL identification method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious URL identification method and device
  • Malicious URL identification method and device
  • Malicious URL identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0029] The "plurality" mentioned herein means two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " generally indicates that the contextual objects are an "or" relationship.

[0030] For the convenience of understanding, the terms involved in the embodiments of the present invention are explained below.

[0031] Encapsulation carrier: An entity used to carry data, and the data carried in the encapsulation carrier cannot be directly identified. In each embodiment of the present invention, the data carried by the encapsu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application disclose a malicious web address identification method, a computer apparatus and a storage medium. The malicious web address identification method comprises: acquiring a web address to be identified; acquiring a referral web address corresponding to the web address to be identified, wherein the referral web address is in a first webpage content corresponding to the web address to be identified; detecting whether the first webpage content includes malicious content, and detecting whether a second webpage content corresponding to the referral web address includes malicious content; when it is detected that at least one of the first webpage content and the second webpage content includes a malicious content, determining that the web address has been identified as a malicious web address. In the embodiments of the present application, a malicious web address included in a normal webpage can be identified according to a referral relationship between web addresses and a user is restricted from visiting the normal webpage, thereby increasing the identification coverage of malicious web addresses and ensuring Internet access security.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, and in particular to a method and device for identifying a malicious website. Background technique [0002] While the Internet provides convenience for people's life, it also brings many security problems. For example, a large number of malicious URLs flooding the Internet bring huge security risks to user access. In order to prevent users from accessing malicious URLs, more and more applications start to have malicious URL identification functions. [0003] In the prior art, the process for an application program to identify a malicious website includes: the background server of the application program obtains the webpage content corresponding to the website address, and detects whether the webpage content contains preset keywords, and if it does, the background server adds the website address to the Malicious URL database. When subsequently receiving a webpage access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/955
CPCG06F16/9554G06F16/9566H04L63/1416H04L63/1441H04L63/1483
Inventor 刘健
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products