Systems and Methods for Identifying Potentially Malicious Messages
First Claim
Patent Images
1. A computer-implemented method for detecting a spoofing situation with respect to one or more electronic communications, comprising:
- receiving an electronic communication;
determining whether the electronic communication includes a textual or graphical reference to a first entity;
determining whether the textual or graphical reference to the first entity is associated with a link to a second entity; and
detecting whether a spoofing situation exists with respect to the received electronic communication based upon the determination of whether the textual or graphical reference is associated with the link to the second entity.
14 Assignments
0 Petitions
Accused Products
Abstract
Computer-implemented systems and methods for identifying illegitimate messaging activity on a system using a network of sensors.
206 Citations
26 Claims
-
1. A computer-implemented method for detecting a spoofing situation with respect to one or more electronic communications, comprising:
-
receiving an electronic communication;
determining whether the electronic communication includes a textual or graphical reference to a first entity;
determining whether the textual or graphical reference to the first entity is associated with a link to a second entity; and
detecting whether a spoofing situation exists with respect to the received electronic communication based upon the determination of whether the textual or graphical reference is associated with the link to the second entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for detecting a spoofing situation with respect to one or more electronic communications, wherein an inventory has been performed of uniform resource locators (URLs) permitted by a first entity for use within an electronic communication associated with the first entity, wherein the inventory is configured to be updated by an inventory update process, said method comprising:
-
receiving an electronic communication;
generating a list of company URLs in the received electronic communication;
comparing the list of company URLs in the received electronic communication with the inventory of permitted URLs; and
detecting whether a spoofing situation exists with respect to the received electronic communication based upon said comparing step.
-
-
19. A method of detecting illegitimate traffic originating from a domain, comprising the steps of:
-
deploying a plurality of sensor devices at a plurality of associated nodes on the Internet;
gathering messaging information from the plurality of sensor devices, the messaging information comprising one or more of messaging traffic level originating from a domain, or fraudulent messages originating from a domain;
correlating the gathered messaging information;
determining from the correlation whether a probable security condition exists with regard to a domain; and
altering a domain owner or an internet service provider associated with a domain of a probable security condition with regard to the domain. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method of detecting illegitimate traffic originating from a domain, comprising the steps of:
-
deploying a plurality of sensor devices at a plurality of associated nodes on the Internet;
gathering messaging information from the plurality of sensor devices, the messaging information comprising one or more of messaging traffic level originating from an IP address, or fraudulent messages originating from the IP address;
correlating the gathered messaging information;
determining from the correlation whether a probable security condition exists with regard to the IP address; and
alerting an owner associated with the IP address or an internet service provider associated with the IP address of a probable security condition with regard to the IP address.
-
Specification