FIELD: information security.
SUBSTANCE: invention relates to the field of information security. The expected result is achieved due to the fact that the detection method contains stages at which: a set of legitimate domain names are set up; a set of pseudo-phishing domain names is created by making changes to legitimate names; for each pseudo-phishing domain name, the estimated distance to a set of legitimate names is determined and a one-dimensional numerical array from the calculated distances is formed; on the basis of which the threshold calculated distance is determined; the received domain name is analyzed: the calculated distance to the set of legitimate names is determined; if the calculated distance is zero, then this name is considered legitimate; if the calculated distance is not zero, then: the calculated distance is compared with the threshold calculated distance; if the calculated distance is greater than the threshold, then this domain name not considered phishing; if the calculated distance is less than or equal to the threshold, then this name is considered phishing and the following actions are performed: a legitimate domain name is determined for this domain name, to which the normalized distance is minimal; a report on the detected phishing domain name is generated; processing of this domain name is completed.
EFFECT: increase in the probability of detecting phishing domain names.
3 cl, 7 tbl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR DETERMINATION OF PHISHING ELECTRONIC MESSAGE | 2020 |
|
RU2790330C2 |
SYSTEM AND METHOD FOR DETECTING PHISHING WEB PAGES | 2016 |
|
RU2637477C1 |
SYSTEM AND METHOD FOR COLLECTING INFORMATION FOR DETECTING PHISHING | 2016 |
|
RU2671991C2 |
COMPUTING DEVICE AND METHOD FOR DETECTING MALICIOUS DOMAIN NAMES IN NETWORK TRAFFIC | 2018 |
|
RU2668710C1 |
METHOD FOR CLASSIFYING OBJECTS TO PREVENT SPREAD OF MALICIOUS ACTIVITY | 2023 |
|
RU2808385C1 |
SYSTEM AND METHOD FOR ACTIVE DETECTION OF MALICIOUS NETWORK RESOURCES | 2021 |
|
RU2769075C1 |
METHOD AND APPARATUS FOR CLUSTERING PHISHING WEB RESOURCES BASED ON AN IMAGE OF THE VISUAL CONTENT | 2021 |
|
RU2778460C1 |
SYSTEM AND METHOD FOR VERIFYING PUBLIC KEY CERTIFICATE TO COUNTERACT "MAN-IN-MIDDLE" ATTACKS | 2012 |
|
RU2514138C1 |
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
METHOD AND SYSTEM FOR IDENTIFYING CLUSTERS OF AFFILIATED WEBSITES | 2020 |
|
RU2740856C1 |
Authors
Dates
2022-09-20—Published
2021-12-15—Filed