DYNAMIC COMBATTING OF SPAM AND PHISHING ATTACKS
First Claim
1. A system for detecting an abusive activity over a network, comprising:
- a computer robot (bot) that is configured to perform actions, including;
proactively sending a first message in a chat room;
receiving a response to the first message; and
if the response indicates an abusive activity in the chat room, determining a source of the response, and transmitting the response and the determined source of the response over the network; and
a network device that is configured to perform actions, including;
receiving the response and the determined source of the response;
dynamically revising a filter to block another message based on the response or the determined source; and
dynamically retraining the robot based, in part, on the response, the determined source, and information from the blocking filter.
5 Assignments
0 Petitions
Accused Products
Abstract
A self training set of robots are configured to proactively search for selective communication abuses over a network. Robots may enter a chat room to proactively send messages. The robots then analyze patterns and/or content of a received message for potential abuse. Robots may also passively reside on/off line without publishing their network address. If a message is received, the message may be interpreted to be SPAM/SPIM. Robots may also perform a variety of other actions, such as access websites, and analyze received messages to determine if the messages indicate abuse. If abuse is detected, information may also be obtained to enable blocking or filtering of future messages from the sender, or access to/from an abusive website. The information also may be used to retrain robots, so that the robots may learn from and share their collective knowledge of abusive actions.
62 Citations
20 Claims
-
1. A system for detecting an abusive activity over a network, comprising:
-
a computer robot (bot) that is configured to perform actions, including; proactively sending a first message in a chat room; receiving a response to the first message; and if the response indicates an abusive activity in the chat room, determining a source of the response, and transmitting the response and the determined source of the response over the network; and a network device that is configured to perform actions, including; receiving the response and the determined source of the response; dynamically revising a filter to block another message based on the response or the determined source; and dynamically retraining the robot based, in part, on the response, the determined source, and information from the blocking filter. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A processor readable medium having computer-executable instructions, wherein the execution of the computer-executable instructions provides for detecting an abusive activity by enabling actions, including:
-
generating at least one robot that is configured to proactively send a first message within a chat room, to receive and to analyze a response to the first message, and if the response indicates an abusive activity, determining a source of the response; receiving the response, and the determined source of the response, from the at least one robot; dynamically revising a filter to block another message based on the determined source or the response; and dynamically training the at least one robot based on the response and the determined source. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer robot for detecting abusive activity within a messaging application over a network, comprising:
-
deploying passively within a first messaging application, without advertising an identifier; listening for a message directed to the robot; if a message is received within the first messaging application, directed to the unadvertised robot'"'"'s identifier; identifying the message as abusive activity; determining a source of the message; and providing the message, and the determined source of the message to a network device for use in filtering another message from the determined source, and to further train the robot to monitor for another message from the determined source in a second messaging application. - View Dependent Claims (15, 16, 17)
-
-
18. A method of detecting an abusive activity over a network within a messaging application, comprising:
-
generating a computer robot that is configured to proactively send a first message within a first messaging application, to receive and to analyze a response to the first message, and if the response indicates an abusive activity, determining a source of the response; dynamically revising a filter to block another message from the determined source or based on the response; and dynamically training the computer robot based on the response or the determined source, such that the computer robot is enabled to detect another abusive activity based, in part, on the response or the determined source in another messaging application. - View Dependent Claims (19, 20)
-
Specification