Detection of a spear-phishing phone call
First Claim
1. A method, in a data processing system, for detection of a spear-phishing phone call, the method comprising:
- responsive to an individual receiving a phone call from a calling party, determining whether the phone call has at least two identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing, wherein the set of identifiable traits includes an identification via voice analysis of the calling party of a count of mispronounced words exceeding a predetermined number, an identification of a website being accessed by the individual during the phone conversation that requires personal information, an identification of a website being accessed by the individual during the phone conversation is not trusted by anti-virus protection, an identification of remote access or control of the data processing system being requested or given to the caller during the phone conversation, or an identification that the phone call originates from a blocked phone number, a private phone number, or otherwise unidentifiable phone number;
responsive to identifying that the phone call has at least two identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, identifying an associated weighted risk value for each of the identified traits associated with the phone call from the set of identifiable traits;
calculating a total risk value using each weighted risk value associated with each identified trait associated with the phone call; and
responsive to the total risk value exceeding a predetermined risk value, notifying the individual of the total risk value to enable the individual to take an appropriate action based on the total risk value.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism is provided for detection of a spear-phishing phone call. Responsive to an individual receiving a phone call, a determination is made as to whether the phone call has one or more identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing. Responsive to identifying that the phone call has one or more identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, an associated weighted risk value for each of the identified traits associated with the phone call is identified from the set of identifiable traits. A total risk value is calculated using each weighted risk value associated with each identified trait associated with the phone call. Responsive to the total risk value exceeding a predetermined risk value, the individual is notified of the total risk value to enable the individual to take an appropriate action based on the total risk value.
41 Citations
16 Claims
-
1. A method, in a data processing system, for detection of a spear-phishing phone call, the method comprising:
-
responsive to an individual receiving a phone call from a calling party, determining whether the phone call has at least two identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing, wherein the set of identifiable traits includes an identification via voice analysis of the calling party of a count of mispronounced words exceeding a predetermined number, an identification of a website being accessed by the individual during the phone conversation that requires personal information, an identification of a website being accessed by the individual during the phone conversation is not trusted by anti-virus protection, an identification of remote access or control of the data processing system being requested or given to the caller during the phone conversation, or an identification that the phone call originates from a blocked phone number, a private phone number, or otherwise unidentifiable phone number; responsive to identifying that the phone call has at least two identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, identifying an associated weighted risk value for each of the identified traits associated with the phone call from the set of identifiable traits; calculating a total risk value using each weighted risk value associated with each identified trait associated with the phone call; and responsive to the total risk value exceeding a predetermined risk value, notifying the individual of the total risk value to enable the individual to take an appropriate action based on the total risk value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product comprising a computer readable storage medium having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
responsive to an individual receiving a phone call from a calling party, determine whether the phone call has at least two identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing, wherein the set of identifiable traits includes an identification via voice analysis of the calling party of a count of mispronounced words exceeding a predetermined number, an identification of a website being accessed by the individual during the phone conversation that requires personal information, an identification of a website being accessed by the individual during the phone conversation is not trusted by anti-virus protection, an identification of remote access or control of the data processing system being requested or given to the caller during the phone conversation, or an identification that the phone call originates from a blocked phone number, a private phone number, or otherwise unidentifiable phone number; responsive to identifying that the phone call has at least two identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, identify an associated weighted risk value for each of the identified traits associated with the phone call from the set of identifiable traits; calculate a total risk value using each weighted risk value associated with each identified trait associated with the phone call; and responsive to the total risk value exceeding a predetermined risk value, notify the individual of the total risk value to enable the individual to take an appropriate action based on the total risk value. - View Dependent Claims (10, 11, 12)
-
-
13. An apparatus comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; responsive to an individual receiving a phone call from a calling party, determine whether the phone call has at least two identifiable traits from a set of identifiable traits that are identified as being associated with spear-phishing, wherein the set of identifiable traits includes an identification via voice analysis of the calling party of a count of mispronounced words exceeding a predetermined number, an identification of a website being accessed by the individual during the phone conversation that requires personal information, an identification of a website being accessed by the individual during the phone conversation is not trusted by anti-virus protection, an identification of remote access or control of the data processing system being requested or given to the caller during the phone conversation, or an identification that the phone call originates from a blocked phone number, a private phone number, or otherwise unidentifiable phone number; responsive to identifying that the phone call has at least two identifiable traits from the set of identifiable traits that are identified as being associated with spear-phishing, identify an associated weighted risk value for each of the identified traits associated with the phone call from the set of identifiable traits; calculate a total risk value using each weighted risk value associated with each identified trait associated with the phone call; and responsive to the total risk value exceeding a predetermined risk value, notify the individual of the total risk value to enable the individual to take an appropriate action based on the total risk value. - View Dependent Claims (14, 15, 16)
-
Specification