Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mail monitoring method, system and device

A technology of mail and new mail, applied in the field of information security, can solve the problems of time difference, slow response speed, poor malware detection effect, etc., and achieve the effect of ensuring security

Active Publication Date: 2018-07-27
LUNKR TECH GUANGZHOU CO LTD
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But, there is following defect in said method: because a lot of anti-virus systems have a time difference to the reaction of newly-occurring malicious software, when causing anti-virus systems to detect mail attachments with malicious software, a lot of mails have all been delivered and entered the user mailboxes, the anti-virus software reacts too slowly to the latest unknown samples that appear in the mail system
Secondly, because the current anti-virus software is not designed for mail system virus detection, it lacks some information for judging whether an email attachment is malware, and the detection effect of malware is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail monitoring method, system and device
  • Mail monitoring method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0056] see figure 1 , which is a flow chart of a mail monitoring method provided in an embodiment of the present invention, the mail monitoring method comprising:

[0057] S100: Obtain attachments carried by the new email;

[0058] S200: Calculate the attachment using a hash algorithm to obtain the hash feature of the attachment;

[0059] S300: Input the hash feature of the attachment into a preset filtering model to obtain a prediction value that the attachment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mail monitoring method, system and device. The method comprises the following steps: acquiring an attachment carried by a new mail; computing the attachment by adopting a hash algorithm to acquire the hash features of the attachment; inputting the hash features of the attachment to a preset filter model to acquire a prediction value for predicting that the attachment is malicious software; when the prediction value is greater than the set threshold, sending the attachment to a preset sandbox tool; identifying the attachment through the preset sandbox tool; adding themalicious software mark on the attachment and rejecting the new mail when the attachment is identified as the malicious software; adding a suspicious software mark on the attachment and generating a warning mail carrying the new mail when the attachment is identified as the suspicious attachment. Through the above mail monitoring method disclosed by the invention, whether the attachment carried bythe mail is the malicious software can be quickly and accurately identified, and the mail carrying the malicious software can be timely filtered so as to guarantee the security of a mail receiving end.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a mail monitoring method, system and device. Background technique [0002] With the widespread use of e-mail, its security risks have gradually emerged. Driven by interests, hackers usually use e-mail to spread malicious codes and send spam in order to expand their botnets. Email recipients are usually hard to detect, passively becoming the target of spam and potential victims of malicious code. Hackers usually send spam by controlling botnets. The content of sent mails will change with the current hot events, and malicious links will be constructed according to the recent vulnerabilities. As a result, the mail server has never been able to filter spam and malicious mails. good measure. [0003] Patent No. CN201110442195.1 discloses a system and method for detecting unknown malware, the method includes generating genes for known malicious and clean objects; using d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/08H04L63/145H04L51/42H04L51/212
Inventor 陈磊华潘庆峰李晓文
Owner LUNKR TECH GUANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products