Mail monitoring method, system and device

A technology of mail and new mail, applied in the field of information security, can solve the problems of time difference, slow response speed, poor malware detection effect, etc., and achieve the effect of ensuring security

Active Publication Date: 2018-07-27
LUNKR TECH GUANGZHOU CO LTD
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But, there is following defect in said method: because a lot of anti-virus systems have a time difference to the reaction of newly-occurring malicious software, when causing anti-virus systems to detect mail attachments with malicious software, a lot of mails have all been delivered and entered the user mailboxes, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mail monitoring method, system and device
  • Mail monitoring method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0056] See figure 1 , Which is a flowchart of an email monitoring method provided by an embodiment of the present invention, and the email monitoring method includes:

[0057] S100: Obtain the attachments carried by the new mail;

[0058] S200: Use a hash algorithm to calculate the attachment to obtain the hash feature of the attachment;

[0059] S300: Input the hash feature of the attachment into a preset filtering model to obtain a predicte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mail monitoring method, system and device. The method comprises the following steps: acquiring an attachment carried by a new mail; computing the attachment by adopting a hash algorithm to acquire the hash features of the attachment; inputting the hash features of the attachment to a preset filter model to acquire a prediction value for predicting that the attachment is malicious software; when the prediction value is greater than the set threshold, sending the attachment to a preset sandbox tool; identifying the attachment through the preset sandbox tool; adding themalicious software mark on the attachment and rejecting the new mail when the attachment is identified as the malicious software; adding a suspicious software mark on the attachment and generating a warning mail carrying the new mail when the attachment is identified as the suspicious attachment. Through the above mail monitoring method disclosed by the invention, whether the attachment carried bythe mail is the malicious software can be quickly and accurately identified, and the mail carrying the malicious software can be timely filtered so as to guarantee the security of a mail receiving end.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a mail monitoring method, system and device. Background technique [0002] With the widespread use of e-mail, its security risks have gradually emerged. Driven by interests, hackers usually use e-mail to spread malicious codes and send spam in order to expand their botnets. Email recipients are usually hard to detect, passively becoming the target of spam and potential victims of malicious code. Hackers usually send spam by controlling botnets. The content of sent mails will change with the current hot events, and malicious links will be constructed according to the recent vulnerabilities. As a result, the mail server has never been able to filter spam and malicious mails. good measure. [0003] Patent No. CN201110442195.1 discloses a system and method for detecting unknown malware, the method includes generating genes for known malicious and clean objects; using d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/08H04L63/145H04L51/42H04L51/212
Inventor 陈磊华潘庆峰李晓文
Owner LUNKR TECH GUANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products