UNSOLICITED BULK EMAIL DETECTION USING URL TREE HASHES
1 Assignment
0 Petitions
Accused Products
Abstract
According to one exemplary embodiment, a method for detecting unsolicited bulk emails (UBE) is provided. The method may include receiving an email. The method may also include identifying a uniform resource locator (URL) contained in the received email. The method may then include dividing the identified URL into a plurality of component parts. The method may further include generating a tree structure based on the plurality of component parts. The method may also include generating an input string based on the generated tree structure. The method may then include calculating a hash value based on the generated input string. The method may further include determining if the calculated hash value matches a UBE hash value within a plurality of UBE hash values. The method may also include identifying the received email as a UBE based on determining that the calculated hash value matches the UBE hash value.
-
Citations
20 Claims
-
1-7. -7. (canceled)
-
8. A computer system for detecting unsolicited bulk emails (UBE), comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage medium, and program instructions stored on at least one of the one or more tangible storage medium for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising; receiving an email; identifying a uniform resource locator (URL) contained in the received email; dividing the identified URL into a plurality of component parts; generating a tree structure based on the plurality of component parts; generating an input string based on the generated tree structure; calculating a hash value based on the generated input string; determining if the calculated hash value matches a UBE hash value within a plurality of UBE hash values; and identifying the received email as a UBE based on determining that the calculated hash value matches the UBE hash value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for detecting unsolicited bulk emails (UBE), comprising:
-
one or more computer-readable storage medium and program instructions stored on at least one of the one or more tangible storage medium, the program instructions executable by a processor, the program instructions comprising; program instructions to receive an email; program instructions to identify a uniform resource locator (URL) contained in the received email; program instructions to divide the identified URL into a plurality of component parts; program instructions to generate a tree structure based on the plurality of component parts; program instructions to generate an input string based on the generated tree structure; program instructions to calculate a hash value based on the generated input string; program instructions to determine if the calculated hash value matches a UBE hash value within a plurality of UBE hash values; and program instructions to identify the received email as a UBE based on determining that the calculated hash value matches the UBE hash value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification