Method and system for detecting malicious activity and virus outbreak in email
First Claim
Patent Images
1. A method for detecting presence of malicious activity within an email junction, comprising:
- determining a threshold number of the acceptable email traffic intensity through said email junction;
monitoring the email traffic intensity in said email junction; and
indicating the presence of malicious activity within said email junction upon exceeding the monitored traffic intensity from said threshold.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting the presence of malicious activity within an email junction in which a threshold number for the acceptable email traffic intensity through the email junction is determined, the email traffic intensity in the email junction is monitored, and the presence of malicious activity within the email junction is indicated upon detection of monitored email traffic intensity exceeding the threshold. The invention may also be implemented for other types of data, e.g., files, data packets, and so forth.
27 Citations
15 Claims
-
1. A method for detecting presence of malicious activity within an email junction, comprising:
-
determining a threshold number of the acceptable email traffic intensity through said email junction;
monitoring the email traffic intensity in said email junction; and
indicating the presence of malicious activity within said email junction upon exceeding the monitored traffic intensity from said threshold. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for detecting presence of malicious activity within a data junction through which at least one data entity is passing, comprising:
-
determining a threshold number of the acceptable data traffic intensity through said data junction;
monitoring the data traffic intensity through said data junction; and
indicating the presence of malicious activity within said data junction upon exceeding the monitored traffic intensity from said threshold. - View Dependent Claims (8, 9)
-
-
10. A system for detecting presence of malicious activity within an email junction, comprising:
-
means for storing a threshold number of the acceptable traffic intensity of said email junction;
means for monitoring the email traffic intensity of said email junction;
means for storing the monitored traffic intensity of said email junction; and
means for detecting whether the traffic intensity of said email junction exceeds said threshold. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification