CN101539936A - Detecting method for sham websites and device thereof - Google Patents

Detecting method for sham websites and device thereof Download PDF

Info

Publication number
CN101539936A
CN101539936A CN200910083086A CN200910083086A CN101539936A CN 101539936 A CN101539936 A CN 101539936A CN 200910083086 A CN200910083086 A CN 200910083086A CN 200910083086 A CN200910083086 A CN 200910083086A CN 101539936 A CN101539936 A CN 101539936A
Authority
CN
China
Prior art keywords
visitor
information
network address
website
extracting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910083086A
Other languages
Chinese (zh)
Inventor
敦宏程
张爽
毕圣杰
王婕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN200910083086A priority Critical patent/CN101539936A/en
Publication of CN101539936A publication Critical patent/CN101539936A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a detecting method for sham websites and a device thereof. The method comprises the steps as follows: source access information of the website is acquired from log records of the website; visitor information is extracted from the source access information; the extracted visitor information is compared with pre-stored visitor information; the extracted visitor information are output if no accordance exists, thereby effectively detecting the sham websites.

Description

A kind of detecting method for sham websites and equipment
Technical field
The present invention is a kind of detecting method for sham websites and equipment about the fake site detection technique in the computer network communication concretely.
Background technology
Along with popularizing of internet, applications, various online transactions emerge in an endless stream.And fake site (Phishing) is the public hazards in internet business field always.For example, the Web bank website is one of object of fake site, and the fake site of this Web bank often makes the client's of Web bank important information be stolen, and then causes the fund loss.
The fake site is a purpose to steal network user's information, is means with info webs such as phisher content, sign and domain names, works the mischief for the application of internet.
At present, mainly by the mode of manual detection report and internet mass search, the detection mode efficient of these two kinds of fake sites is not high in the detection of fake site, and it is bigger to delay time, and can not prevent and treat the threat of fake site effectively.
Summary of the invention
In order to overcome the defective of prior art, the embodiment of the invention provides a kind of detecting method for sham websites and equipment, effectively to detect the fake site.
One of purpose of the embodiment of the invention is: a kind of detecting method for sham websites is provided, and this method may further comprise the steps: the resource access information of obtaining described website from the log record of website; From described resource access information, extract visitor information; The visitor information of extracting is carried out the consistance comparison with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported.
A kind of fake site checkout equipment, this equipment comprises: the log information acquiring unit is used for obtaining from the log record of website the resource access information of described website; The visitor information extraction unit is used for extracting visitor information from described resource access information; Visitor information contrast unit, the visitor information that is used for extracting is carried out the consistance contrast with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported.
The embodiment of the invention will be palmed off the scope of network address fast and dwindle, so that further find out the fake site in visitor information among a small circle by to the collection of access log, the extraction and the contrast of visitor information.The present invention has increased substantially the discovery speed of fake site, has reduced user profile and has been falsely used the risk stolen with account funds.
Description of drawings
Fig. 1 is the embodiment of the invention 1 a detecting method for sham websites process flow diagram;
Fig. 2 is the embodiment of the invention 1 a fake site assay device structures block diagram;
Fig. 3 is the embodiment of the invention 2 fake site assay device structures block diagrams;
Fig. 4 is embodiment of the invention visitor information contrast cellular construction block diagram;
Fig. 5 is an embodiment of the invention visitor information memory cell structure block diagram;
Fig. 6 is the embodiment of the invention 1 a fake site testing process flow diagram;
Fig. 7 is the embodiment of the invention 2 fake site testing process flow diagrams;
Fig. 8 is the embodiment of the invention 3 fake site testing process flow diagrams.
Embodiment
Below in conjunction with description of drawings the specific embodiment of the present invention.
Embodiment 1
As shown in Figure 1, the detecting method for sham websites of present embodiment may further comprise the steps: the resource access information (step S101) of obtaining described website from the log record of website; From described resource access information, extract visitor information (step S102); The visitor information of extracting is carried out the consistance comparison with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported (step S103).
As shown in Figure 2, the fake site checkout equipment of present embodiment comprises: log information acquiring unit 101 is used for obtaining from the log record of website the resource access information of described website; Visitor information is extracted single 102 and is used for extracting visitor information from described resource access information; The visitor information that visitor information contrast unit 103 is used for extracting is carried out the consistance contrast with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported.The fake site checkout equipment of present embodiment can be a kind of in server, PC or other computer equipments.
Now present embodiment is specified as follows in conjunction with Fig. 6:
Website A is the licit traffic website, and website A server provides the web interface that comprises enterprise's icon for its visitor.And website A server stores has Lawful access person's white list, this white list can comprise: visitor's title, visitor's network address and/or visitor IP address etc.The white list of table 1 for example.
Table 1
Figure A20091008308600061
When the webpage icon of visitor 1 access websites A, the access log of website A server carries out record to the information of this time visit.The log information acquiring unit of website A server obtains the resource access information of website A from the log record of website A, the content of log record can comprise: visitor 1 visit date and time (as: 2009-02-16,09:53:00), access stencil, the title of accessed website (as: website A), the IP address (as: 10.1.1.1) of accessed website, accessed resource (as: GET/ enterprise icon), visitor 1 IP address (as: 111.111.111.111), visitor 1 browser parameters and visitor's 1 network address (as: http://www.fangwenzhe1.com).
The visitor information extraction unit of website A server extracts visitor 1 network address (as: http://www.fangwenzhe1.com) from resource access information; The network address http://www.fangwenzhe1.com that visitor information contrast unit is used for the visitor 1 that will extract carries out consistance with the network address of table 1 pre-stored and contrasts, the result is inconsistent, so with the visitor's 1 that extracts network address http://www.fangwenzhe1.com output.Because visitor 1 network address not in white list, is one of suspicion object of fake site therefore.The visitor's 1 of output network address can be used as the Back ground Information that further judges whether the fake site.
The embodiment of the invention will be palmed off the scope of network address fast and dwindle, so that further find out the fake site in visitor information among a small circle by to the collection of access log, the extraction and the contrast of visitor information.The present invention has increased substantially the discovery speed of fake site, has reduced user profile and has been falsely used the risk stolen with account funds.
Embodiment 2
As shown in Figure 3, the fake site checkout equipment of present embodiment comprises: log information acquiring unit 101 is used for obtaining from the log record of website the resource access information of described website; Visitor information is extracted single 102 and is used for extracting visitor information from described resource access information; The visitor information that visitor information contrast unit 103 is used for extracting is carried out the consistance contrast with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported; Visitor information storage unit 104 is used for memory access person's information; Fake site judging unit 105 is used for obtaining visitor's web site contents according to visitor's network address of extracting, if described visitor's web site contents meets the condition of fake site, confirms that then described visitor website is the fake site.The fake site checkout equipment of present embodiment can be a kind of in server, PC or other computer equipments.
As shown in Figure 4, visitor information contrast unit 103 comprises: network address contrast module 1031 is used for the visitor's network address that will extract and carries out the consistance comparison with the visitor's network address that prestores; Network address output module 1032 is used for and will exports with visitor's network address of the described inconsistent extraction of visitor's network address that prestores.
As shown in Figure 5, visitor information storage unit 104 comprises: person's network address that Lawful access person information storage module 1041 is used to store the Lawful access; Unauthorized access person's information storage module 1042 is used to store the network address of the fake site of having determined.
Now present embodiment is specified as follows in conjunction with Fig. 7:
Website A is the licit traffic website, and website A server provides the web interface that comprises enterprise's icon for its visitor.And website A server stores has Lawful access person's white list and confirm as the unauthorized access person's of fake site blacklist, this white list can comprise: visitor's title, visitor's network address and/or visitor IP address etc., for example white list of table 1.This blacklist can comprise: visitor's title, visitor's network address and/or visitor IP address etc.The blacklist of table 2 for example.
Table 2
When the webpage icon of visitor 1 access websites A, the access log of website A server carries out record to the information of this time visit.The log information acquiring unit of website A server obtains the resource access information of website A from the log record of website A, the content of log record can comprise: visitor 1 visit date and time (as: 2009-02-16,09:53:00), access stencil, the title of accessed website (as: website A), the IP address (as: 10.1.1.1) of accessed website, accessed resource (as: GET/ enterprise icon), visitor 1 IP address (as: 111.111.111.111), visitor 1 browser parameters and visitor's 1 network address (as: http://www.fangwenzhe1.com).
The single network address (as: http://www.fangwenzhe1.com) of from resource access information, extracting visitor 1 of log access person's information extraction of website A server; The network address http://www.fangwenzhe1.com that visitor information contrast unit is used for the visitor 1 that will extract carries out consistance with the network address of table 1 and table 2 pre-stored and contrasts, the result is inconsistent, so with the visitor's 1 that extracts network address http://www.fangwenzhe1.com output.Because visitor 1 network address not in white list and blacklist, is one of suspicion object of fake site therefore.The visitor's 1 of output network address can be used as the Back ground Information that further judges whether the fake site.If comparing result visitor 1 network address http://www.fangwenzhe1.com is consistent with the network address comparing result of pre-stored in the table 1, then belong to Lawful access; If comparing result visitor 1 network address http://www.fangwenzhe1.com is consistent with the network address comparing result of pre-stored in the table 2, then this fake site be recorded and this fake site still the operation.
The fake site judging unit of website A server if web site contents meets the condition of fake site, confirms then that visitor 1 website is the fake site according to the web site contents that the visitor's network address http://www.fangwenzhe1.com that extracts obtains visitor 1.The condition of fake site can comprise: (1) web site contents is to identical or similar by counterfeit object web site contents, and purpose is to steal user profile; (2) web site contents exist to mislead visitor's possibility, and institute's domain name of using and same or similar by domain name that counterfeit object uses, and purpose is to steal user profile; (3) web site contents exist to mislead visitor's possibility, and domain name that use the website for by the trading company of counterfeit object, sign or other with by the counterfeit object existence content of corresponding relation highly, purpose is to steal user profile.
The embodiment of the invention will be palmed off the scope of network address fast and dwindle by to the collection of access log, the extraction and the contrast of visitor information, and according to the contrast of visitor information and fake site condition, determine the fake site.The present invention has increased substantially the discovery speed of fake site, has reduced user profile and has been falsely used the risk stolen with account funds.
Embodiment 3
Now present embodiment is specified as follows in conjunction with Fig. 8:
Website A is the licit traffic website, and website A server provides the web interface that comprises user profile typing frame for its visitor.And website A server stores has Lawful access person's white list and confirm as the unauthorized access person's of fake site blacklist, this white list can comprise: visitor's title, visitor's network address and/or visitor IP address etc.
The payment page of client access website X; The payment page of website X guides user capture by user's typing frame resource of counterfeit website A, and is being stayed access log by counterfeit website A.
As shown in Figure 8, gathered access log, extract the content (as: the IP address 111.111.111.111 of website X) of critical field in the access log by the keeper of counterfeit website A.The log information acquiring unit of website A server obtains the resource access information of website A from the log record of website A, the content of log record can comprise: the visit date and time (as: 2009-02-16 of website X, 09:53:00), access stencil, the title of accessed website (as: website A), the IP address (as: 10.1.1.1) of accessed website, accessed resource (as: GET/ enterprise icon), the IP address (as: 111.111.111.111) of website X, the browser parameters of website X and website X network address (as: http://www.fangwenzhe1.com).
The single IP address (as: 111.111.111.111) of from resource access information, extracting website X of log access person's information extraction of website A server; The IP address that visitor information contrast unit is used for the IP address (as: 111.111.111.111) of the website X that will extract and pre-stored is carried out consistance and is contrasted, the result is inconsistent, so with IP address (as: 111.111.111.111) output of the website X that extracts.The IP address (as: 111.111.111.111) of the website X of output can be used as the Back ground Information that further judges whether the fake site.The fake site judging unit of website A server if web site contents meets the condition of fake site, confirms then that website X is the fake site according to the web site contents of IP address (as: 111.111.111.111) the extracting website X of the website X of output.The condition of fake site can comprise: (1) web site contents is to identical or similar by counterfeit object web site contents, and purpose is to steal user profile; (2) web site contents exist to mislead visitor's possibility, and institute's domain name of using and same or similar by domain name that counterfeit object uses, and purpose is to steal user profile; (3) web site contents exist to mislead visitor's possibility, and domain name that use the website for by the trading company of counterfeit object, sign or other with by the counterfeit object existence content of corresponding relation highly, purpose is to steal user profile.
The embodiment of the invention will be palmed off the scope of network address fast and dwindle by to the collection of access log, the extraction and the contrast of visitor information, and according to the contrast of visitor information and fake site condition, determine the fake site.The present invention has increased substantially the discovery speed of fake site, has reduced user profile and has been falsely used the risk stolen with account funds.
Below only be preferred embodiment of the present invention, non-so limit to claim of the present invention, the equivalent structure that uses instructions of the present invention and diagramatic content to do changes, all in like manner within the scope of the present invention.

Claims (14)

1. a detecting method for sham websites is characterized in that, described method may further comprise the steps:
From the log record of website, obtain the resource access information of described website;
From described resource access information, extract visitor information;
The visitor information of extracting is carried out the consistance comparison with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported.
2. the method for claim 1 is characterized in that, described resource access information comprises: visitor IP address, visitor's network address and/or accessed resource content.
3. method as claimed in claim 2 is characterized in that, described visitor information comprises: visitor IP address or visitor's network address.
4. method as claimed in claim 3 is characterized in that, described visitor information with extraction is carried out the consistance comparison with the visitor information that prestores and comprised: the visitor's network address extracted and the visitor's network address that prestores are carried out consistance compare.
5. method as claimed in claim 4 is characterized in that, if visitor's network address of extracting is inconsistent with the visitor's network address that prestores, then with visitor's network address output of extracting; And,
Obtain visitor's web site contents according to visitor's network address of extracting,, confirm that then described visitor website is the fake site if described visitor's web site contents meets the condition of fake site.
6. method as claimed in claim 5 is characterized in that, the network address of confirming as the fake site is stored as the visitor information of pre-stored.
7. the method for claim 1 is characterized in that, the visitor information of described pre-stored comprises: the network address of Lawful access person network address and/or the fake site determined.
8. a fake site checkout equipment is characterized in that, described equipment comprises:
The log information acquiring unit is used for obtaining from the log record of website the resource access information of described website;
The visitor information extraction unit is used for extracting visitor information from described resource access information;
Visitor information contrast unit, the visitor information that is used for extracting is carried out the consistance contrast with the visitor information of pre-stored, if inconsistent then the visitor information of extracting is exported.
9. equipment as claimed in claim 8 is characterized in that, described resource access information comprises: visitor IP address, visitor's network address and/or accessed resource content.
10. equipment as claimed in claim 9 is characterized in that, described visitor information comprises: visitor IP address or visitor's network address.
11. equipment as claimed in claim 10 is characterized in that, described visitor information contrast unit comprises: network address contrast module is used for the visitor's network address that will extract and carries out the consistance comparison with the visitor's network address that prestores;
The network address output module is used for and will exports with visitor's network address of the described inconsistent extraction of visitor's network address that prestores.
12. equipment as claimed in claim 11, it is characterized in that, described equipment comprises: the fake site judging unit, be used for obtaining visitor's web site contents according to visitor's network address of extracting, if described visitor's web site contents meets the condition of fake site, confirm that then described visitor website is the fake site.
13. as claim 8 or 12 described equipment, it is characterized in that described equipment comprises: the visitor information storage unit is used for memory access person's information.
14. equipment as claimed in claim 13 is characterized in that, described visitor information storage unit comprises: Lawful access person information storage module, the person's network address that is used to store the Lawful access;
Unauthorized access person's information storage module is used to store the network address of the fake site of determining.
CN200910083086A 2009-04-30 2009-04-30 Detecting method for sham websites and device thereof Pending CN101539936A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910083086A CN101539936A (en) 2009-04-30 2009-04-30 Detecting method for sham websites and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910083086A CN101539936A (en) 2009-04-30 2009-04-30 Detecting method for sham websites and device thereof

Publications (1)

Publication Number Publication Date
CN101539936A true CN101539936A (en) 2009-09-23

Family

ID=41123125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910083086A Pending CN101539936A (en) 2009-04-30 2009-04-30 Detecting method for sham websites and device thereof

Country Status (1)

Country Link
CN (1) CN101539936A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045348A (en) * 2010-12-01 2011-05-04 北京迅捷英翔网络科技有限公司 Link stealing prevention system and method
CN102075365A (en) * 2011-02-15 2011-05-25 中国工商银行股份有限公司 Method and device for locating and protecting network attack source
CN102546618A (en) * 2011-12-29 2012-07-04 北京神州绿盟信息安全科技股份有限公司 Method, device, system and website for detecting fishing website
CN102571783A (en) * 2011-12-29 2012-07-11 北京神州绿盟信息安全科技股份有限公司 Phishing website detection method, device and system as well as website
CN103428186A (en) * 2012-05-24 2013-12-04 ***通信集团公司 Method and device for detecting phishing website
CN103685157A (en) * 2012-09-04 2014-03-26 珠海市君天电子科技有限公司 Method and system for collecting phishing websites based on payment
CN103870554A (en) * 2009-12-11 2014-06-18 北京奇虎科技有限公司 Method for realizing browser address bar nameplate
CN104079531A (en) * 2013-03-26 2014-10-01 ***通信集团公司 Hotlinking detection method, system and device
CN104580230A (en) * 2015-01-15 2015-04-29 广州唯品会信息科技有限公司 Website attack verification method and device
CN106130960A (en) * 2016-06-12 2016-11-16 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN108664584A (en) * 2018-05-07 2018-10-16 秦德玉 Infringement site search recognition methods and device

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103870554A (en) * 2009-12-11 2014-06-18 北京奇虎科技有限公司 Method for realizing browser address bar nameplate
CN102045348B (en) * 2010-12-01 2013-08-07 北京迅捷英翔网络科技有限公司 Link stealing prevention system and method
CN102045348A (en) * 2010-12-01 2011-05-04 北京迅捷英翔网络科技有限公司 Link stealing prevention system and method
CN102075365A (en) * 2011-02-15 2011-05-25 中国工商银行股份有限公司 Method and device for locating and protecting network attack source
CN102075365B (en) * 2011-02-15 2012-12-26 中国工商银行股份有限公司 Method and device for locating and protecting network attack source
CN102546618A (en) * 2011-12-29 2012-07-04 北京神州绿盟信息安全科技股份有限公司 Method, device, system and website for detecting fishing website
CN102571783A (en) * 2011-12-29 2012-07-11 北京神州绿盟信息安全科技股份有限公司 Phishing website detection method, device and system as well as website
CN103428186A (en) * 2012-05-24 2013-12-04 ***通信集团公司 Method and device for detecting phishing website
CN103685157A (en) * 2012-09-04 2014-03-26 珠海市君天电子科技有限公司 Method and system for collecting phishing websites based on payment
CN104079531A (en) * 2013-03-26 2014-10-01 ***通信集团公司 Hotlinking detection method, system and device
CN104580230A (en) * 2015-01-15 2015-04-29 广州唯品会信息科技有限公司 Website attack verification method and device
CN104580230B (en) * 2015-01-15 2017-12-08 广州品唯软件有限公司 Verification method and device are attacked in website
CN106130960A (en) * 2016-06-12 2016-11-16 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN106130960B (en) * 2016-06-12 2019-08-09 微梦创科网络科技(中国)有限公司 Judgement system, load dispatching method and the device of steal-number behavior
CN108664584A (en) * 2018-05-07 2018-10-16 秦德玉 Infringement site search recognition methods and device

Similar Documents

Publication Publication Date Title
CN101539936A (en) Detecting method for sham websites and device thereof
Blum et al. Lexical feature based phishing URL detection using online learning
EP3125147B1 (en) System and method for identifying a phishing website
CN104954372B (en) A kind of evidence obtaining of fishing website and verification method and system
CN102624713B (en) The method of website tamper Detection and device
US8745151B2 (en) Web page protection against phishing
US20130086677A1 (en) Method and device for detecting phishing web page
CN102739653B (en) Detection method and device aiming at webpage address
KR100848319B1 (en) Harmful web site filtering method and apparatus using web structural information
CN103209177B (en) The detection method of phishing attacks and device
CN102594934A (en) Method and device for identifying hijacked website
CN103281320A (en) Website icon matching-based detection method for brand counterfeit websites
CN102622553A (en) Method and device for detecting webpage safety
CN104486140A (en) Device and method for detecting hijacking of web page
US8141150B1 (en) Method and apparatus for automatic identification of phishing sites from low-level network traffic
CN102129528A (en) WEB page tampering identification method and system
CN104580230B (en) Verification method and device are attacked in website
CN104899508A (en) Multistage phishing website detecting method and system
CN111541672A (en) Method and system for detecting security of HTTP (hyper text transport protocol) request
Geng et al. RRPhish: Anti-phishing via mining brand resources request
KR100819030B1 (en) Method for deterrence of personal information using server registration and apparatus thereof
CN102891861A (en) Client-based phishing website detecting method and device
CN108270754B (en) Detection method and device for phishing website
CN104717226A (en) Method and device for detecting website address
CN107566371B (en) WebShell mining method for massive logs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090923