A mail audit method, device and computer-readable storage medium

A technology of email and audit database, applied in the field of data security, can solve problems such as no payload, false positives, information leakage, etc.

Active Publication Date: 2021-04-23
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Phishing emails such as defrauding trust and inducing spoofing often have no obvious malicious features, and it is necessary to artificially understand the sender's intention and follow the instructions to cause threats such as information leakage
Such emails that need to understand semantics often do not have payloads, such as links or attachments. Using simple feature matching, it is difficult to distinguish phishing emails, so it is easy to cause false positives, missed negatives, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mail audit method, device and computer-readable storage medium
  • A mail audit method, device and computer-readable storage medium
  • A mail audit method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0053] Next, a mail auditing method provided by an embodiment of the present invention is introduced in detail. figure 1 It is a flow chart of an email audit method provided by an embodiment of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a mail auditing method, device and computer-readable storage medium, which analyze the acquired traffic information to obtain characteristic information; set corresponding characteristic labels for characteristic information according to the pre-established characteristic database; use and The audit library corresponding to the feature label detects the feature information, and when the feature information meets the preset conditions, it is determined that the traffic information is malicious information. In this technical solution, traffic information is classified according to the feature database, so that special detection is performed according to the audit database corresponding to the feature label, which makes the selected audit database more targeted and improves the accuracy of phishing email monitoring. And by setting the characteristic label, the scope of detecting the characteristic information is narrowed, thereby shortening the time spent on detection, reducing unnecessary detection, and further improving the performance of mail auditing.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a mail audit method, device and computer-readable storage medium. Background technique [0002] With the popularity of the network, the resulting network security problems are becoming more and more serious. Various malicious methods such as network Trojans, malicious attacks, extortion and fraud emerge in an endless stream. Email is one of the important means of intrusion for most attacks. Phishing emails use disguised emails to trick recipients into replying to designated recipients with information such as account numbers and passwords; or guide recipients to connect to specially crafted webpages, which usually pretend to be the same as real websites, such as banks or The webpage of financial management, making the log-in believe that it is real, enters the credit card or bank card number, account name and password, etc. and is stolen. [0003] There are many methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/1483H04L51/212H04L51/42
Inventor 蔡福杰范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products