Unauthorized email determination device, unauthorized email determination method and unauthorized email determination program

A technology for judging devices and emails, applied to electrical components, computer components, machine learning, etc., can solve problems such as inability to detect counterfeit emails

Pending Publication Date: 2021-01-05
MITSUBISHI ELECTRIC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this technique, it is impossible to detect impersonation emails that maliciously use the accounts of legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized email determination device, unauthorized email determination method and unauthorized email determination program
  • Unauthorized email determination device, unauthorized email determination method and unauthorized email determination program
  • Unauthorized email determination device, unauthorized email determination method and unauthorized email determination program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0043] ***Description of structure***

[0044] refer to figure 1 The configuration of the fraudulent mail determination device 10 according to Embodiment 1 will be described.

[0045] The fraudulent mail determination device 10 is a computer.

[0046] The fraudulent mail determination device 10 includes hardware such as a processor 11 , a memory 12 , a storage 13 , and a communication interface 14 . The processor 11 is connected to other hardware via signal lines, and controls these other hardware.

[0047] The processor 11 is an IC (Integrated Circuit) that performs processing. As a specific example, the processor 11 is a CPU (Central Processing Unit: Central Processing Unit), a DSP (Digital Signal Processor: Digital Signal Processor), and a GPU (Graphics Processing Unit: Graphics Processing Unit).

[0048]The memory 12 is a storage device that temporarily stores data. As a specific example, the memory 12 is SRAM (Static Random Access Memory: Static Random Access Memory)...

Deformed example 1

[0204] In Embodiment 1, each functional component is realized by software. However, as Modification 1, each functional component can also be realized by hardware. Regarding this Modification 1, differences from Embodiment 1 will be described.

[0205] refer to Figure 17 The configuration of the fraudulent mail determination device 10 according to Modification 1 will be described.

[0206] When realizing each functional component by hardware, the fraudulent mail determination apparatus 10 is equipped with the electronic circuit 15 instead of the processor 11, the memory 12, and the storage device 13. The electronic circuit 15 is a dedicated circuit that realizes the functions of each functional component, the memory 12 , and the storage device 13 .

[0207] As the electronic circuit 15, a single circuit, a composite circuit, a programmed processor, a parallel programmed processor, logic IC, GA (Gate Array: Gate Array), ASIC (Application Specific Integrated Circuit: Applicat...

Deformed example 2

[0210] As Modification 2, some functional constituent elements may be realized by hardware, and other functional constituent elements may be realized by software.

[0211] The processor 11, the memory 12, the storage device 13 and the electronic circuit 15 are referred to as processing circuits. In other words, the functions of each functional structural element are realized by the processing circuit.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This unauthorized email determination device (10) is provided with a consistency analysis unit (24). The consistency analysis unit (24) identifies the intention of a newly received, target email witha method involving extracting function words, which are words that show the reason that the target email was sent, from the body of the target email. The consistency analysis unit (24) determines whether or not the target email is an unauthorized email on the basis of the relation between the identified intention of the target email, and other emails received in the past from the same sender as the target email.

Description

technical field [0001] The invention relates to a technology for detecting targeted attack emails. Background technique [0002] Targeted attacks such as Advanced Persistent Threat (Advanced Persistent Threat) are mostly targeted attack emails that use improper emails as intrusion means for attacks. [0003] In targeted attack emails, cleverly crafted sentences are used using information related to attack targets such as organizations and people. In a targeted attack email, an attempt is made to open a malicious file attached to the email, or to access a malicious Web site indicated by a URL (Uniform Resource Locator: Uniform Resource Locator) described in the text. [0004] There is known prior art for statically or dynamically parsing the maliciousness of content with respect to attachments and URLs. For example, techniques are known to detect malware by confirming whether an attachment to a check object matches a pattern of known malware. In addition, there are techniq...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F13/00
CPCG06F13/00G06N20/00H04L63/1441H04L63/1483H04L51/212G06F18/23G06F18/22G06F18/2132
Inventor 山本匠西川弘毅河内清人
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products