[1]柴艳娜.QR 二维码防钓鱼的研究[J].计算机技术与发展,2020,30(04):100-104.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 019]
 CHAI Yan-na.Research of Anti-phishing for QR Code[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2020,30(04):100-104.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 019]
点击复制

QR 二维码防钓鱼的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年04期
页码:
100-104
栏目:
安全与防范
出版日期:
2020-04-10

文章信息/Info

Title:
Research of Anti-phishing for QR Code
文章编号:
1673-629X(2020)04-0100-05
作者:
柴艳娜
长安大学 信息与网络管理处,陕西 西安 710064
Author(s):
CHAI Yan-na
Dept. of Information and Network Management,Chang’an University,Xi’an 710064,China
关键词:
网络安全QR二维码钓鱼网站安卓
Keywords:
network securityQRQR codeanti-phishingAndroid
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 04. 019
摘要:
QR 码(quick response code) 是一种简单易用的矩阵条码。 随着移动互联网的崛起和繁荣,已经广泛应用于人们的日常活动中。 它给人们带来便利的同时,还伴有钓鱼网站、病毒软件、信息泄漏等网络安全风险和恶意攻击。 越来越多的钓鱼攻击由传统的诱导式电子邮件转变为一扫即开的二维码,堂而皇之地在移动互联网世界里游荡。 新闻稿中也屡见各种伪造二维码、钓鱼二维码导致人们的信息和财产受到损失的报道。 目前流行的具有支持扫码功能的 App 如微信、支付宝等均无法有效甄别钓鱼网站。 文中分析了 QR 码的基本结构和原理,钓鱼网站以及防范钓鱼的传统技术,从 URL 结构和网页内容两个方面分析钓鱼网站的异常特征,并且相应地给出检测方法和数学模型,设计并实现 Android 平台的 QR 码钓鱼网站识别技术。
Abstract:
QR code (quick response code) ,as a type of matrix barcode (or two-dimensional barcode) ,has became popular due to the rise and prosperity of mobile Internet. It brings convenience to people at the same time,but also accompanied by network security risks and malicious attacks like the phishing website,virus software,data leak and so on. More and more phishing website show up as faked QR code in mobile Internet instead of classical e-mail,and you can see news that the faked QR code causes money losing and data leak cases. Currently,most popular apps with support for code scanning,such as echat, Alipay, can’t identify phishing website in QR code.Therefore,we analyze basic structure and working way of QR, research phishing website and the classical way to prevent. We can figure out exception behavior from URL structure and source code of web page from phishing website,then point out the detective way and math model,design and implement a platform to prevent phishing website for Android.

相似文献/References:

[1]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):242.
[2]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):132.
[3]王文豪 张亚红 朱全银 单劲松.QR Code二维条形码的图像识别[J].计算机技术与发展,2009,(10):123.
 WANG Wen-hao,ZHANG Ya-hong,ZHU Quan-yin,et al.Image Recognition in 2 - D Bar Code Based on QR Code[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):123.
[4]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):167.
[5]彭云峰 沈明玉.入侵防御系统在应急平台网络中的应用研究[J].计算机技术与发展,2009,(02):162.
 PENG Yun-feng,SHEN Ming-yu.Research on Intrusion Prevention System for Emergency Response Network[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(04):162.
[6]尚占锋 章登义.DDoS防御机制研究[J].计算机技术与发展,2008,(01):7.
 SHANG Zhan-feng,ZHANG Deng-yi.Research of DDoS Defense Mechanism[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(04):7.
[7]涂溢彬 饶云波[] 廖云 周明天.蜜网系统在检测新型Rootkit中的应用[J].计算机技术与发展,2008,(01):181.
 TU Yi-bin,RAO Yun-bo,LIAO Yun,et al.Honeynet System Applied in New Pattern Rootkit[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(04):181.
[8]邵晓宇 杨善林 褚伟.基于Linux入侵检测动态防火墙的设计与实现[J].计算机技术与发展,2008,(05):156.
 SHAO Xiao-yu,YANG Shan-lin,CHU Wei.Design and Implementation of Dynamic Intrusion Detection Firewall Based on Linux[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(04):156.
[9]孙印杰 王敏 陈智芳.解析蜜罐技术在网络安全中的应用[J].计算机技术与发展,2008,(07):129.
 SUN Yin-jie,WANG Min,CHEN Zhi-fang.Analysis Honeypot Technology Application in Network Security[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(04):129.
[10]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
 CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(04):128.

更新日期/Last Update: 2020-04-10