Check patentability & draft patents in minutes with Patsnap Eureka AI!

Fuzzy inclusion based impersonation detection

A fuzzy and protected technology, applied in the field of masquerade detection based on fuzzy inclusion, can solve the problems of expensive computation and undetectable masquerade technology

Pending Publication Date: 2021-05-07
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional anti-phishing systems may not detect this new cloaking technique because the substring does not match a legitimate entity via string comparison
Furthermore, given the exponential growth of electronic communications in our modern lives, anti-phishing scans are computationally expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy inclusion based impersonation detection
  • Fuzzy inclusion based impersonation detection
  • Fuzzy inclusion based impersonation detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The various techniques described herein are set forth with sufficient specificity to satisfy statutory requirements. However, the description itself is not intended to limit the scope of the present disclosure. Rather, the inventors have contemplated that the claimed subject matter may also be embodied in other ways, in conjunction with other present or future technologies, to include steps that are different from or steps that are similar to those described herein combination. Furthermore, although the terms "step" and / or "block" may be used herein to refer to various elements of a method employed, these terms should not be construed to imply that the order of the various steps is explicitly described herein unless and unless the order of the various steps is explicitly described. any particular order among or between the individual steps. Furthermore, the term "based on" generally means that performing the preceding action uses the subsequent condition.

[0017] El...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Aspects of this disclosure include fuzzy inclusion based impersonation detection technology. In one embodiment, a reverse n-gram map is created for the list of protected entities. A suspicious string may be broken into n-grams, and each n-gram of the suspicious string is to be searched in the reverse n-gram map for corresponding protected entities. A fuzzy inclusion of a protected entity may be detected in the suspicious string depending on the protected entities found during the search. Subsequently, impersonation can be identified based on the characteristics of the fuzzy inclusion. In this way, a communication system can detect impersonation techniques by using visually similar text, and accordingly take various actions to help user mitigate risks caused by impersonation.

Description

Background technique [0001] Phishing is usually accomplished by forging emails or instant messages pretending to be trustworthy entities in electronic communications. Phishing attackers often trick users into replying to emails, opening attachments, or visiting bogus websites that are nearly identical to their legitimate counterparts. Phishing attackers continue to develop new techniques to bypass existing anti-phishing systems. [0002] Impersonation is a typical phishing technique. Email spoofing attacks attempt to impersonate a celebrity or well-known person, trademark, or trusted organization by forging headers or email addresses, creating misleading URLs, or using other methods to create something that appears to be from a legitimate source but is actually malicious email, etc. [0003] An advanced cloaking technique is to embed substrings that visually resemble legitimate entities into email headers or email bodies. Such abusive techniques can put the public at risk ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56H04L29/06H04L12/58
CPCG06F21/56H04L63/1483G06N3/08G06N7/02H04L51/212G06N3/043G06N5/048
Inventor 李伟生
Owner MICROSOFT TECH LICENSING LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More