信息网络安全 ›› 2026, Vol. 26 ›› Issue (3): 462-470.doi: 10.3969/j.issn.1671-1122.2026.03.012
收稿日期:2025-08-08
出版日期:2026-03-10
发布日期:2026-03-30
通讯作者:
兰浩良
E-mail:lanhaoliang@jspi.cn
作者简介:印杰(1977—),男,江苏,高级工程师,硕士,主要研究方向为人工智能|刘家银(1986—),男,重庆,副教授,博士,主要研究方向为网络安全|黄肖宇(2002—),男,江苏,本科,主要研究方向为自然语言处理|兰浩良(1986—),男,山东,讲师,博士,主要研究方向为网络空间安全|谢文伟(1978—),男,江苏,工程师,硕士,主要研究方向为人工智能、机器视觉
基金资助:
YIN Jie1, LIU Jiayin1, HUANG Xiaoyu1, LAN Haoliang1(
), XIE Wenwei2
Received:2025-08-08
Online:2026-03-10
Published:2026-03-30
摘要:
随着网页篡改植入暗链现象的愈演愈烈以及自动化检出方法的普及,暗链标题植入已成为危害网络安全的重要因素之一。当前,攻击者常采用形近字、干扰符号、表情文字等手段进行伪装,这对基于单模态自然语言处理的检测技术构成了挑战。针对这一问题,文章提出基于混合特征的多模态检测方法。该方法首先利用BERT与ResNet分别提取标题文本的语义特征与图像特征,随后通过门函数和多头注意力方法对特征进行深度融合,进而实现对暗链标题的分类。实验结果表明,在评测数据集上,所提方法的识别准确率达到0.966,较基准方法提升了约1个百分点,这表明图像特征可以有效弥补文本特征在应对标题伪装时的不足。
中图分类号:
印杰, 刘家银, 黄肖宇, 兰浩良, 谢文伟. 基于多模态特征的暗链标题检测方法[J]. 信息网络安全, 2026, 26(3): 462-470.
YIN Jie, LIU Jiayin, HUANG Xiaoyu, LAN Haoliang, XIE Wenwei. Hidden Link Headline Detection Method Based on Multi-Modal Features[J]. Netinfo Security, 2026, 26(3): 462-470.
表2
ResNet网络配置
| 层名称 | 输出尺寸 | f 0层 |
|---|---|---|
| Conv1 | 112×112 | 7×7, 64, stride 2 3×3max pool, stride 2 |
| Conv2_x | 28×28 | |
| Conv3_x | 28×28 | |
| Conv4_x | 14×14 | |
| Conv5_x | 7×7 | |
| Fc layer | 1×1 | Average_pool, 1000-d fc |
| [1] | China Internet Network Information Center. The 49th China Statistical Report on Internet Development[EB/OL]. (2022-02-25)[2025-08-03]. https://www.cnnic.net.cn/n4/2022/0401/c88-1131.html. |
| 中国互联网络信息中心. 第49次中国互联网络发展状况统计报告[EB/OL]. (2022-02-25)[2025-08-03]. https://www.cnnic.net.cn/n4/2022/0401/c88-1131.html. | |
| [2] | YIN Jie, JIANG Yuxiang, NIU Bowei, et al. Remote Detection of Web Page Tampering Based on Deep Learning[J]. Journal of Nanjing University of Science and Technology, 2020, 44(1): 49-54. |
| 印杰, 蒋宇翔, 牛博威, 等. 基于深度学习的网页篡改远程检测研究[J]. 南京理工大学学报, 2020, 44(1): 49-54. | |
| [3] | BARTOLI A, DAVANZO G, MEDVET E. A Framework for Large-Scale Detection of Web Site Defacements[J]. ACM Transactions on Internet Technology, 2010, 10(3): 1-37. |
| [4] |
ZHOU Wenyi, GU Xubo, SHI Yong, et al. Detection Method for Hidden Hyperlink Based on Machine Learning[J]. Computer Engineering, 2018, 44(10): 22-27.
doi: 10.19678/j.issn.1000-3428. 0051189 |
| 周文怡, 顾徐波, 施勇, 等. 基于机器学习的网页暗链检测方法[J]. 计算机工程, 2018, 44(10): 22-27. | |
| [5] |
DAVANZO G, MEDVET E, BARTOLI A. Anomaly Detection Techniques for a Web Defacement Monitoring Service[J]. Expert Systems with Applications, 2011, 38(10): 12521-12530.
doi: 10.1016/j.eswa.2011.04.038 URL |
| [6] | MENG Chijie, WANG Wei, GENG Guanggang. Internet Hidden Hyperlinks Detection Based on Statistical Machine Learning[J]. Application Research of Computers, 2015, 32(9): 2779-2783. |
| 孟池洁, 王伟, 耿光刚. 基于统计机器学习的互联网暗链检测方法[J]. 计算机应用研究, 2015, 32(9): 2779-2783. | |
| [7] | LIM M, ABDULLAH A, JHANJHI N, et al. Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique[EB/OL]. (2019-01-11)[2025-08-03]. https://doi.org/10.3390/computers8010008. |
| [8] | SARAVANOU A, KATAKIS I, VALKANAS G, et al. Revealing the Hidden Links in Content Networks: An Application to Event Discovery[C]// ACM. The 2017 ACM on Conference on Information and Knowledge Management. New York: ACM, 2017: 2283-2286. |
| [9] |
LIM M, ABDULLAH A, JHANJHI N Z. Performance Optimization of Criminal Network Hidden Link Prediction Model with Deep Reinforcement Learning[J]. Journal of King Saud University-Computer and Information Sciences, 2021, 33(10): 1202-1210.
doi: 10.1016/j.jksuci.2019.07.010 URL |
| [10] |
PANCHAL B Y, CHAUHAN G, PANCHAL S R, et al. An Investigation on Feature and Text Extraction from Images Using Image Recognition in Android[J]. Materials Today: Proceedings, 2022, 51: 798-802.
doi: 10.1016/j.matpr.2021.06.237 URL |
| [11] | HE Xiaomin, WANG Jin, HE Yueying, et al. A Deep Learning Approach for Website Fingerprinting Attack[C]// IEEE. 2018 IEEE 4th International Conference on Computer and Communications (ICCC). New York: IEEE, 2019: 1419-1423. |
| [12] | BHAT S, LU D, KWON A, et al. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning[J]. Proceedings on Privacy Enhancing Technologies, 2019(4): 292-310. |
| [13] | DEVLIN J, CHANG Mingwei, LEE K, et al. BERT: Pre-Training of Deep Bidirectional Transformers for Language Understanding[C]//ACL. The 2019 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies. New York: ACL, 2019: 4171-4186. |
| [14] | HE Kaiming, ZHANG Xiangyu, REN Shaoqing, et al. Deep Residual Learning for Image Recognition[C]// IEEE. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). New York: IEEE, 2016: 770-778. |
| [15] | LEI Chengmin, MU Shaomin, SUN Wenjie, et al. Image Recognition of Peach Pests Based on Multi-Scale Attention Residual Network[J]. Journal of Shandong Agricultural University (Natural Science Edition), 2022, 53(2): 253-258. |
| 类成敏, 牟少敏, 孙文杰, 等. 基于多尺度注意力残差网络的桃树害虫图像识别[J]. 山东农业大学学报(自然科学版), 2022, 53(2): 253-258. | |
| [16] | CAI Yuhan. Image Classification Algorithm Based on Convolutional Self-Coding and Residual Network[J]. Information Technology and Informatization, 2022(7): 73-76. |
| 蔡雨涵. 基于卷积自编码和残差网络的图像分类算法[J]. 信息技术与信息化, 2022(7): 73-76. | |
| [17] | VASWANI A, SHAZEER N, PARMAR N, et al. Attention is All You Need[C]// ACM. The 31st International Conference on Neural Information Processing Systems. New York: ACM, 2017: 6000-6010. |
| [18] | NATHANI D, CHAUHAN J, SHARMA C, et al. Learning Attention-Based Embeddings for Relation Prediction in Knowledge Graphs[C]// ACL. The 57th Annual Meeting of the Association for Computational Linguistics. New York: ACL, 2019: 4710-4723. |
| [19] | REDMON J, FARHADI A. YOLOv3:An Incremental Improvemen[EB/OL]. (2018-04-08)[2025-08-03]. https://doi.org/10.48550/arXiv.1804.02767. |
| [20] | KIM W, LEE J, PARK E, et al. Advanced Mechanism for Reducing False Alarm Rate in Web Page Defacement Detection[EB/OL]. (2006-01-01)[2025-08-03]. https://www.researchgate.net/publication/228953432_Advanced_Mechanism_for_Reducing_False_Alarm_Rate_in_Web_Page_Defacement_Detection. |
| [1] | 李道丰, 宁梓桁. 基于BERT和自注意力SRU的AST级Webshell检测方法[J]. 信息网络安全, 2025, 25(2): 270-280. |
| [2] | 江昊, 刘成杰, 文伟平. 一个用于Java应用程序运行时保护的混合系统[J]. 信息网络安全, 2025, 25(1): 134-148. |
| [3] | 刘卓娴, 王靖亚, 石拓. 融合对抗训练与BERT-CNN-BiLSTM多通道神经网络的恶意URL检测研究[J]. 信息网络安全, 2024, 24(12): 1922-1932. |
| [4] | 李元诚, 罗昊, 王庆乐, 李建彬. 一种基于ATT&CK的新型电力系统APT攻击建模[J]. 信息网络安全, 2023, 23(2): 26-34. |
| [5] | 代翔, 孙海春, 牛硕, 朱容辰. 融合互注意力机制与BERT的中文问答匹配技术研究[J]. 信息网络安全, 2021, 21(12): 102-108. |
| [6] | 周枝凝, 王斌君, 翟一鸣, 仝鑫. 基于ALBERT动态词向量的垃圾邮件过滤模型[J]. 信息网络安全, 2020, 20(9): 107-111. |
| [7] | 冯胥睿瑞, 刘嘉勇, 程芃森. 基于特征提取的恶意软件行为及能力分析方法研究[J]. 信息网络安全, 2019, 19(12): 72-78. |
| [8] | 王武军. 基于Hilbert变换的数字图像置乱新算法[J]. , 2012, 12(3): 0-0. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||