Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious website detection method and device and electronic equipment

A malicious URL and detection method technology, applied in network data retrieval, electrical components, other database retrieval and other directions, can solve the problems of increased query time, unable to detect unlisted, long time consuming, etc., to reduce the protection time, quickly malicious The effect of URL detection

Pending Publication Date: 2021-04-27
BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The blacklist URL library is often updated with a lag and cannot detect malicious URLs that are not included. Usually, after a new malicious URL comes out, the blacklist library cannot detect it within 1 to 3 days or even a week
If the blacklist URL library is queried in the cloud through the cloud, the local side needs to interact with the cloud network, which takes a long time
If the blacklist library is downloaded locally, the blacklist URL library will occupy a large amount of local storage space, and the local query time will increase with the increase of the blacklist library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious website detection method and device and electronic equipment
  • Malicious website detection method and device and electronic equipment
  • Malicious website detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] Please refer to figure 1 , the present embodiment provides a malicious website detection system, the system includes: a server 10 and a client 20, the server 10 is used to save and train a machine learning model capable of malicious website detection; the client 10 is used to prestore the The prediction function of the machine learning model, and the weight parameters of the model output function of the machine learning model trained by the server 10 and the pre-stored prediction function are used to detect malicious URLs locally on the client 20 .

[0073] Specifically, the server 10 is used for model training, parameter distribution and information collection. During model training, the URLs of malicious webpages and / or URLs of normal webpages can be used as training samples for machine learning model training to obtain a machine learning model that can identify whether a URL is a malicious webpage. The specific training method can use existing training method. Wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious website detection method and device and electronic equipment, and the method comprises the steps: obtaining a target URL corresponding to a webpage opening instruction when the webpage opening instruction is received; obtaining a URL feature value of the target URL, wherein the URL feature value corresponds to an input parameter of a machine learning model of a server; obtaining a weight parameter of a prediction function of the machine learning model after the training of the server is completed; based on the weight parameter, the URL feature value and a prediction function pre-stored in the client, performing calculation at the client to obtain a prediction value; judging whether the predicted value is within a preset range or not; and if the predicted value is not in the preset range, judging that the target URL is a malicious URL. By means of the scheme, prediction of the malicious website is achieved at the client side, comparison of a blacklist website library is not needed, a machine learning model does not need to be deployed at the client side, operations such as exporting, loading and starting of the model are avoided, and malicious website protection time is shortened.

Description

technical field [0001] The present invention relates to the technical field of software, in particular to a malicious website detection method, device and electronic equipment. Background technique [0002] With the development of Internet technology, browsers have brought a lot of convenience to users' lives. Users can browse the world at home through browsers, but it also brings some troubles to users. For example, improper protection of malicious URLs will not only waste The user's time may even lead to virus invasion and cause privacy leakage and property loss to the user. [0003] In the prior art, the URLs of malicious webpages, that is, the protection technology of malicious URLs, is mostly a blacklist database query. For example, for the URL "soxx678.com", to determine whether it is a malicious URL, you need to get "soxx5678.com" and the blacklist URL The list in the library matches. This blacklist URL library may be in the cloud, or it may be downloaded locally. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/955H04L29/06
CPCG06F16/9566H04L63/1416H04L63/1441H04L63/20H04L63/0236
Inventor 宋紫嫣范金松
Owner BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products