Nothing Special   »   [go: up one dir, main page]

CN105488091A - Network data detection method and system based on keyword matching - Google Patents

Network data detection method and system based on keyword matching Download PDF

Info

Publication number
CN105488091A
CN105488091A CN201510343587.0A CN201510343587A CN105488091A CN 105488091 A CN105488091 A CN 105488091A CN 201510343587 A CN201510343587 A CN 201510343587A CN 105488091 A CN105488091 A CN 105488091A
Authority
CN
China
Prior art keywords
data
suspicious
network data
vector table
sample storehouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510343587.0A
Other languages
Chinese (zh)
Inventor
李晓利
李柏松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201510343587.0A priority Critical patent/CN105488091A/en
Publication of CN105488091A publication Critical patent/CN105488091A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a network data detection method based on keyword matching. The method comprises the following steps of obtaining network data; matching the network data with black and white lists firstly; dismounting network data which is not successfully matched based on a semantic base and a knowledge base, and then obtaining data elements; combining the data elements based on a preset rule to form a data vector table; matching the data vector table with a suspicious sample base; if the matching succeeds, judging that the network data is suspicious data, and otherwise, judging that the network data is secure data; detecting the suspicious data based on the existing malicious code detecting strategy; and feeding back the detection result. The invention also discloses a network data detection system based on keyword matching. The technical scheme provided by the invention can be used for effectively detecting the network data, and can be particularly used for effectively recognizing the behavior of spreading malicious code by hot topics or hot events.

Description

A kind of network data detection method based on keyword match and system
Technical field
The present invention relates to technical field of network security, particularly relate to a kind of network data detection method based on keyword match and system.
Background technology
Network often can provide corresponding web page interlinkage or downloaded resources for much-talked-about topic and focus incident.Usually burning hot discussion atmosphere or curiosity can make people lose vigilance.Meanwhile, some hackers, while providing downloaded resources, can point out user: file comprises and cracks file, may be manslaughtered, so preferably close antivirus software, otherwise cannot normally download by antivirus software.So there is a lot of netizen to take chances, the closedown antivirus software of being obedient to, thus enter extension horse website or fishing website, but know nothing.The method that tradition carries out network detection can take a large amount of system resource, and expends the long period and detect.
Summary of the invention
Technical solutions according to the invention are by splitting the network data obtained, thus acquisition data element, based on preset rules by described data elements groups generated data vector table, described data vector table is mated with pre-prepd suspicious Sample Storehouse, thus judges whether it is suspicious data.Whether method of the present invention is different from traditional network data detection method, be first suspicious data by matching judgment network data, if suspicious data recycling malicious code detecting method detects.Thus can effective location suspicious data, and avoid taking excess resource and detection time long problem.
The present invention adopts and realizes with the following method: a kind of network data detection method based on keyword match, comprising:
Obtain network data;
Described network data is mated with white list, if successful match, then judges that described network data is as secure data, otherwise, described network data is mated with blacklist, if successful match, then judges that described network data is as malicious data;
After not having the network data of successful match to split, data element is obtained based on semantic base and knowledge base;
Based on preset rules, data element combination is formed data vector table;
Described data vector table is mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data;
Based on known malicious code inspection policies, suspicious data is detected, and feed back testing result;
The key word detected for suspicious data formed based on preset rules is comprised in described suspicious Sample Storehouse.
Further, described acquisition network data comprises: obtain network data by responsive URL, or obtains network data when monitoring and there is Traffic Anomaly.
Further, describedly based on preset rules, data element combination is formed data vector table, comprising:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
Further, described described data vector table to be mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data, be specially:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
Further, described described data vector table to be mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data, be specially:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
Further, described white list comprises: each official website URL or news media website URL.
The present invention can adopt following system to realize: a kind of network data detection system based on keyword match, comprising:
Data acquisition module, for obtaining network data;
Black and white lists filtering module, for described network data being mated with white list, if successful match, then judge that described network data is as secure data, otherwise, described network data is mated with blacklist, if successful match, then judge that described network data is as malicious data;
Data Division module, for obtaining data element based on semantic base and knowledge base after not having the network data of successful match to split;
Data processing module, for forming data vector table based on preset rules by data element combination;
Determination module, for being mated with suspicious Sample Storehouse by described data vector table, if successful match, then judges that described network data is as suspicious data, otherwise is judged to be secure data;
Detection module, for detecting suspicious data based on known malicious code inspection policies, and feeds back testing result;
Suspicious Sample Storehouse, for storing the key word detected for suspicious data formed based on preset rules.
Further, described data acquisition module, specifically for: obtain network data by responsive URL, or obtain network data when monitoring and there is Traffic Anomaly.
Further, described data processing module, specifically for:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
Further, described determination module, specifically for:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
Further, described determination module, specifically for:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
Further, described white list comprises: each official website URL or news media website URL.
To sum up, the present invention provides a kind of network data detection method based on keyword match and system, first network data is extracted based on abnormal network behavior, after black and white lists filters, described network data is split, extracts the helpful data element of identification hostile network data, based on preset rules, rear formation data vector table is processed to described data element, data vector table is mated with suspicious Sample Storehouse, and then judges whether it is suspicious data.
Beneficial effect is: technical scheme of the present invention, under unmanned condition of intervening, initiatively finds hostile network data, with malicious data source, the fastest speed location, reaches the object of malice sample early warning.
Accompanying drawing explanation
In order to be illustrated more clearly in technical scheme of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of network data detection method embodiment process flow diagram based on keyword match provided by the invention;
Fig. 2 is a kind of network data detection system example structure figure based on keyword match provided by the invention.
Embodiment
The present invention gives a kind of network data detection method based on keyword match and system embodiment, technical scheme in the embodiment of the present invention is understood better in order to make those skilled in the art person, and enable above-mentioned purpose of the present invention, feature and advantage become apparent more, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail:
The present invention provide firstly a kind of network data detection method embodiment based on keyword match, as shown in Figure 1, comprising:
S101 obtains network data;
Described network data is mated with white list by S102, and judges whether successful match, if so, then judges that described network data is as secure data, otherwise performs S103;
Described network data is mated with blacklist by S103, and judges whether successful match, if so, then judges that described network data is as malicious data, otherwise performs S104;
S104 obtains data element based on semantic base and knowledge base after not having the network data of successful match to split;
Data element combination is formed data vector table based on preset rules by S105;
Described data vector table mates with suspicious Sample Storehouse by S106, and judges whether successful match, if so, then judges that described network data is as suspicious data, continues to perform S107, otherwise is judged to be secure data, terminates;
S107 detects suspicious data based on known malicious code inspection policies, and feeds back testing result;
The key word detected for suspicious data formed based on preset rules is comprised in described suspicious Sample Storehouse.
Preferably, described acquisition network data, comprising: obtain network data by responsive URL, or obtains network data when monitoring and there is Traffic Anomaly.
Preferably, described white list comprises: each official website URL or news media website URL.
Preferably, describedly based on preset rules, data element combination is formed data vector table, comprising:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
More preferably, described described data vector table to be mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data, be specially:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.The value of described similarity can be selected as required.
Wherein, the method asking for similarity can be, but not limited to: the method for simhash.
Preferably, described described data vector table to be mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data, be specially:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.The value of described preset value can be selected as required, or chooses suitable value after the experiment of repeatedly sample.
Such as: data vector table comprises 6 data elements, by carrying out contrasting rear discovery with suspicious Sample Storehouse, wherein 5 data elements in suspicious Sample Storehouse, are there are, then continue to compare 5/6 and whether exceed preset value, if exceed, then think suspicious data, otherwise think secure data.
Present invention also offers a kind of network data detection system embodiment based on keyword match, as shown in Figure 2, comprising:
Data acquisition module 201, for obtaining network data;
Black and white lists filtering module 202, for described network data being mated with white list, if successful match, then judge that described network data is as secure data, otherwise, described network data is mated with blacklist, if successful match, then judge that described network data is as malicious data;
Data Division module 203, for obtaining data element based on semantic base and knowledge base after not having the network data of successful match to split;
Data processing module 204, for forming data vector table based on preset rules by data element combination;
Determination module 205, for being mated with suspicious Sample Storehouse 207 by described data vector table, if successful match, then judges that described network data is as suspicious data, otherwise is judged to be secure data;
Detection module 206, for detecting suspicious data based on known malicious code inspection policies, and feeds back testing result;
Suspicious Sample Storehouse 207, for storing the key word detected for suspicious data formed based on preset rules.
Preferably, described data acquisition module, specifically for: obtain network data by responsive URL, or obtain network data when monitoring and there is Traffic Anomaly.
Preferably, described white list comprises: each official website URL or news media website URL.
Preferably, described data processing module, specifically for:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
More preferably, described determination module, specifically for:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
Preferably, described determination module, specifically for:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
As mentioned above, to embodiment by obtaining network data to be identified, first through presetting the filtration of black and white lists, by website programming such as known safe URL, or after known malicious sample filters, extract data element by from the network data that cannot mate, according to preset rules, process is carried out to data element and form data vector table, data vector table and suspicious Sample Storehouse are contrasted, thus determines whether to belong to suspicious data, namely need the network data detected further.
To sum up, the method of tional identification network data depends on quality and the size of training sample, and all network datas are detected, need to take a large amount of system resource and longer detection time, and the method for identification hostile network data disclosed in this invention, by the process to network data, and the mode of mating is carried out further with suspicious Sample Storehouse, first locate the network data that may there is malice sample further to detect again, thus before malicious data causes harmful effect further, take measures in time to be blocked and control.
Above embodiment is unrestricted technical scheme of the present invention in order to explanation.Do not depart from any modification or partial replacement of spirit and scope of the invention, all should be encompassed in the middle of right of the present invention.

Claims (10)

1., based on a network data detection method for keyword match, it is characterized in that:
Obtain network data;
Described network data is mated with white list, if successful match, then judges that described network data is as secure data, otherwise, described network data is mated with blacklist, if successful match, then judges that described network data is as malicious data;
After not having the network data of successful match to split, data element is obtained based on semantic base and knowledge base;
Based on preset rules, data element combination is formed data vector table;
Described data vector table is mated with suspicious Sample Storehouse, if successful match, then judges that described network data is as suspicious data, otherwise be judged to be secure data;
Based on known malicious code inspection policies, suspicious data is detected, and feed back testing result;
The key word detected for suspicious data formed based on preset rules is comprised in described suspicious Sample Storehouse.
2. the method for claim 1, is characterized in that, described acquisition network data comprises: obtain network data by responsive URL, or obtains network data when monitoring and there is Traffic Anomaly.
3. the method for claim 1, is characterized in that, describedly based on preset rules, data element combination is formed data vector table, comprising:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
4. method as claimed in claim 3, is characterized in that, is describedly mated with suspicious Sample Storehouse by described data vector table, if successful match, then judges that described network data is as suspicious data, otherwise is judged to be secure data, be specially:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
5. the method for claim 1, is characterized in that, is describedly mated with suspicious Sample Storehouse by described data vector table, if successful match, then judges that described network data is as suspicious data, otherwise is judged to be secure data, be specially:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
6., based on a network data detection system for keyword match, it is characterized in that, comprising:
Data acquisition module, for obtaining network data;
Black and white lists filtering module, for described network data being mated with white list, if successful match, then judge that described network data is as secure data, otherwise, described network data is mated with blacklist, if successful match, then judge that described network data is as malicious data;
Data Division module, for obtaining data element based on semantic base and knowledge base after not having the network data of successful match to split;
Data processing module, for forming data vector table based on preset rules by data element combination;
Determination module, for being mated with suspicious Sample Storehouse by described data vector table, if successful match, then judges that described network data is as suspicious data, otherwise is judged to be secure data;
Detection module, for detecting suspicious data based on known malicious code inspection policies, and feeds back testing result;
Suspicious Sample Storehouse, for storing the key word detected for suspicious data formed based on preset rules.
7. system as claimed in claim 6, is characterized in that, described data acquisition module, specifically for: obtain network data by responsive URL, or obtain network data when monitoring and there is Traffic Anomaly.
8. system as claimed in claim 6, is characterized in that, described data processing module, specifically for:
For each data element arranges weights, and calculate the hash value of each data element, described hash value is weighted and merges rear formation data vector table.
9. system as claimed in claim 8, is characterized in that, described determination module, specifically for:
Key word in described data vector table and suspicious Sample Storehouse is contrasted, judges whether that the similarity that there is key word and data vector table reaches more than preset value, if exist, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
10. system as claimed in claim 6, is characterized in that, described determination module, specifically for:
Described data vector table and suspicious Sample Storehouse are contrasted, judge whether the ratio of the data element sum in the data element number that occurs in suspicious Sample Storehouse and data vector table exceedes preset value, if so, then judge that described network data is as suspicious data, otherwise be judged to be secure data.
CN201510343587.0A 2015-06-19 2015-06-19 Network data detection method and system based on keyword matching Pending CN105488091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510343587.0A CN105488091A (en) 2015-06-19 2015-06-19 Network data detection method and system based on keyword matching

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510343587.0A CN105488091A (en) 2015-06-19 2015-06-19 Network data detection method and system based on keyword matching

Publications (1)

Publication Number Publication Date
CN105488091A true CN105488091A (en) 2016-04-13

Family

ID=55675069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510343587.0A Pending CN105488091A (en) 2015-06-19 2015-06-19 Network data detection method and system based on keyword matching

Country Status (1)

Country Link
CN (1) CN105488091A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106125680A (en) * 2016-06-23 2016-11-16 北京东土科技股份有限公司 Industrial stokehold data safety processing method based on industry internet and device
CN107981841A (en) * 2017-10-27 2018-05-04 深圳和而泰智能控制股份有限公司 A kind of signal processing method, device, equipment and medium
CN108289088A (en) * 2017-01-09 2018-07-17 中国移动通信集团河北有限公司 Abnormal traffic detection system and method based on business model
CN109639654A (en) * 2018-11-30 2019-04-16 成都知道创宇信息技术有限公司 A method of TCP abnormal flow is identified based on adaptive filtering model
CN110022304A (en) * 2019-03-07 2019-07-16 北京华安普特网络科技有限公司 A kind of website hung Trojan method for early warning
WO2019136990A1 (en) * 2018-01-12 2019-07-18 深圳壹账通智能科技有限公司 Network data detection method, apparatus, computer device and storage medium
CN110414232A (en) * 2019-06-26 2019-11-05 腾讯科技(深圳)有限公司 Rogue program method for early warning, device, computer equipment and storage medium
CN110414236A (en) * 2019-07-26 2019-11-05 北京神州绿盟信息安全科技股份有限公司 A kind of detection method and device of malicious process
CN110611675A (en) * 2019-09-20 2019-12-24 哈尔滨安天科技集团股份有限公司 Vector magnitude detection rule generation method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924762A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 Cloud security-based active defense method
CN102035793A (en) * 2009-09-28 2011-04-27 成都市华为赛门铁克科技有限公司 Botnet detecting method, device and network security protective equipment
CN103559235A (en) * 2013-10-24 2014-02-05 中国科学院信息工程研究所 Online social network malicious webpage detection and identification method
CN103605925A (en) * 2013-11-29 2014-02-26 北京奇虎科技有限公司 Webpage tampering detecting method and device
CN103927481A (en) * 2013-12-17 2014-07-16 哈尔滨安天科技股份有限公司 Malicious code detecting method and system based on character string weight adjusting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035793A (en) * 2009-09-28 2011-04-27 成都市华为赛门铁克科技有限公司 Botnet detecting method, device and network security protective equipment
CN101924762A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 Cloud security-based active defense method
CN103559235A (en) * 2013-10-24 2014-02-05 中国科学院信息工程研究所 Online social network malicious webpage detection and identification method
CN103605925A (en) * 2013-11-29 2014-02-26 北京奇虎科技有限公司 Webpage tampering detecting method and device
CN103927481A (en) * 2013-12-17 2014-07-16 哈尔滨安天科技股份有限公司 Malicious code detecting method and system based on character string weight adjusting

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106125680A (en) * 2016-06-23 2016-11-16 北京东土科技股份有限公司 Industrial stokehold data safety processing method based on industry internet and device
CN106125680B (en) * 2016-06-23 2018-09-11 北京东土科技股份有限公司 Industrial stokehold data safety processing method based on industry internet and device
CN108289088A (en) * 2017-01-09 2018-07-17 中国移动通信集团河北有限公司 Abnormal traffic detection system and method based on business model
CN108289088B (en) * 2017-01-09 2020-12-11 中国移动通信集团河北有限公司 Abnormal flow detection system and method based on business model
CN107981841A (en) * 2017-10-27 2018-05-04 深圳和而泰智能控制股份有限公司 A kind of signal processing method, device, equipment and medium
WO2019136990A1 (en) * 2018-01-12 2019-07-18 深圳壹账通智能科技有限公司 Network data detection method, apparatus, computer device and storage medium
CN109639654A (en) * 2018-11-30 2019-04-16 成都知道创宇信息技术有限公司 A method of TCP abnormal flow is identified based on adaptive filtering model
CN110022304A (en) * 2019-03-07 2019-07-16 北京华安普特网络科技有限公司 A kind of website hung Trojan method for early warning
CN110022304B (en) * 2019-03-07 2021-05-04 北京华安普特网络科技有限公司 Website horse hanging early warning method
CN110414232A (en) * 2019-06-26 2019-11-05 腾讯科技(深圳)有限公司 Rogue program method for early warning, device, computer equipment and storage medium
CN110414236A (en) * 2019-07-26 2019-11-05 北京神州绿盟信息安全科技股份有限公司 A kind of detection method and device of malicious process
CN110414236B (en) * 2019-07-26 2021-04-16 北京神州绿盟信息安全科技股份有限公司 Malicious process detection method and device
CN110611675A (en) * 2019-09-20 2019-12-24 哈尔滨安天科技集团股份有限公司 Vector magnitude detection rule generation method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105488091A (en) Network data detection method and system based on keyword matching
Wang et al. Detecting android malware leveraging text semantics of network flows
Sato et al. Detecting android malware by analyzing manifest files
CN106713324B (en) Flow detection method and device
CN104640174B (en) Wireless network access point reminding method and device
CN103428183B (en) Method and device for identifying malicious website
CN104735074A (en) Malicious URL detection method and implement system thereof
CN107426202B (en) Method for automatically testing WAF (Wireless Access Filter) interception rule
CN103888480B (en) Network information security authentication method and cloud device based on cloud monitoring
CN104850780A (en) Discrimination method for advanced persistent threat attack
Shin et al. # twiti: Social listening for threat intelligence
CN105763548A (en) User login identification method based on behavior model and equipment and system thereof
CN114338064B (en) Method, device, system, equipment and storage medium for identifying network traffic type
KR101692982B1 (en) Automatic access control system of detecting threat using log analysis and automatic feature learning
Wang et al. TextDroid: Semantics-based detection of mobile malware using network flows
CN103401845A (en) Detection method and device for website safety
CN105516211A (en) Method, device and system for recognizing database accessing behaviors based on behavior model
CN103488947A (en) Method and device for identifying instant messaging client-side account number stealing Trojan horse program
CN103955644B (en) A kind of static Trojan detecting method based on terminal self-starting
CN111783092B (en) Malicious attack detection method and system for communication mechanism between Android applications
CN106973051B (en) Establish the method, apparatus and storage medium of detection Cyberthreat model
CN113965418B (en) Attack success judgment method and device
CN110493253B (en) Botnet analysis method of home router based on raspberry group design
CN114024761B (en) Network threat data detection method and device, storage medium and electronic equipment
WO2019242441A1 (en) Dynamic feature-based malware recognition method and system and related apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin Hi-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Applicant after: Harbin antiy Technology Group Limited by Share Ltd

Address before: 506 room 162, Hongqi Avenue, Nangang District, Harbin Development Zone, Heilongjiang, 150090

Applicant before: Harbin Antiy Technology Co., Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160413

WD01 Invention patent application deemed withdrawn after publication