Method and device for monitoring E-mail user behaviors

A technology of e-mail and e-mail protocol, which is applied in the field of transformation and optimization of standard e-mail protocol. It can solve the problems of e-mail attack, password attack without defense means, and error cannot guarantee the login user, etc., so as to reduce time and improve security.

Active Publication Date: 2012-04-04
CHINA STANDARD SOFTWARE
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] 2), email attack
However, there is still no good defense against password attacks. Since it is impossible to prevent users from entering passwords to log in, and it is impossible to ensure that all logged-in users are normal users, that is, after hacking user passwords, attackers may use some programs to automatically Obtain email information, or use tools and cracked mailboxes to automatically send spam, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring E-mail user behaviors
  • Method and device for monitoring E-mail user behaviors
  • Method and device for monitoring E-mail user behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 It is a flow chart of the method for monitoring email user behavior according to Embodiment 1 of the present invention, and the direction of the arrow indicates the operation flow for realizing the method. Refer below figure 1 Each step of the method is described in detail.

[0041] Step S110, open the listening port, and prepare to receive the user's connection and command code.

[0042] The email server will open the listening port, ready to receive the user's connection and the user's email-related operation information (hereinafter referred to as operation), and analyze the command code in the user's operation, the user's operation includes login request or operation request .

[0043] Step S120, receiving command codes, and filtering command codes that do not conform to the protocol.

[0044] Receive the user's operation, obtain the command code in the operation, filter out the command code that does not meet the specification according to the standard...

Embodiment 2

[0092] figure 2 It is a schematic structural diagram of an e-mail user behavior monitoring device according to Embodiment 2 of the present invention, according to the following figure 2 Describe in detail the composition of the device.

[0093] The device mainly includes the following modules:

[0094] The command code receiving module is used for receiving the command codes related to the operation of the email user, and filtering the command codes that do not conform to the email protocol. This module is used to receive the user's operation, obtain the command code in the operation, filter out the command code that does not meet the specification according to the standard mail protocol, and receive the command code that meets the protocol specification. Specifically, according to the standard SMTP, POP3, and IMAP protocols, first filter the command codes obtained by the server monitoring port, discard those that do not meet the protocol specifications, and contin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention disclose a method and a device for monitoring E-mail user behaviors; the method comprises the following steps: receive user's operation information relating to E-mail and obtain a command code in the operation information by analysis, filter the operation information in which the command code does not accord with an E-mail protocol; classify the operation information of the command code which accords with the E-mail protocol according to the command code and record an IP (internet protocol) address of the source of the operation information; find the operation information which has danger by utilizing a history record receiving the operation information according to the type of the operation information; determine the IP address which sends the operation information and user information to perform corresponding safe handling to the operation information which has danger. In the invention, the disadvantage of password-based attack in the existing E-mail protocol is effectively overcome, the safety of the system is increased, and the expenses of time, cost and manpower for defending network attack are reduced.

Description

technical field [0001] The invention relates to standard mail protocol modification and optimization technology, in particular to a method and device for realizing real-time monitoring of user behavior by a server under a Linux platform. Background technique [0002] In modern communication network, e-mail is one of the most common and easy-to-use communication methods. With the deepening of network, multimedia and other technologies, e-mail has developed from being able to send only text materials at the beginning to being able to attach graphic materials, and even audio, program and other files. At the same time, network security issues aimed at mail servers are also derived with the popularization of the Internet. [0003] Currently commonly used e-mail protocols mainly include SMTP, POP3, IMAP4, etc., all of which belong to the TCP / IP protocol cluster. In the default state, connections are established through TCP ports 25, 110, and 143 respectively. In the RFC (Request ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
Inventor 兰雨晴甄东宇王林张永军夏颖
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products