×

Managing connections, messages, and directory harvest attacks at a server

  • US 7,849,142 B2
  • Filed: 05/27/2005
  • Issued: 12/07/2010
  • Est. Priority Date: 05/29/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for managing a mail transfer agent (MTA), comprising:

  • based on a plurality of connections received at said MTA, determining a number of connections that are associated with a first sender identifier;

    based on said number of connections being less than or equal to a specified number of connections, accepting an additional connection that is associated with said first sender identifier;

    based on said number of connections being greater than said specified number of connections, rejecting said additional connection;

    determining message information for a plurality of email messages that are received at said MTA;

    based on said message information, determining that a second sender identifier of said plurality of sender identifiers is associated with at least one email message of said plurality of email messages;

    based on said at least one email message, determining a number of recipients of email messages that are associated with said second sender identifier and that are being received at said MTA in a first time period; and

    based on said number of recipients of email messages being greater than a maximum number of recipients of email messages,refusing to accept email messages that are associated with said second sender identifier until said first time period expires; and

    after expiration of said first time period of time, accepting email messages that are associated with said second sender identifier;

    determining that a third sender identifier of said plurality of sender identifiers is associated with a subset of email messages of said plurality of email messages;

    based on said subset of email messages, determining a number of invalid recipient email addresses for a second time period;

    receiving an additional email message that is associated with said third sender identifier;

    determining that said additional email message is addressed to one or more invalid recipient email addresses for said MTA;

    based on said number of invalid recipient email addresses being less than or equal to a maximum number of invalid recipient email addresses, generating and sending a message rejection response for said additional email message; and

    based on said number of invalid recipient email addresses being greater than said maximum number of invalid recipient email addresses,dropping said additional email message without sending said message rejection response; and

    after expiration of said second time period, accepting one or more additional email messages that are both associated with said third sender identifier and addressed to one or more invalid recipient email addresses for said MTA; and

    for at least one electronic message from the plurality of email messages, determining a set of recipient email addresses to which said at least one email message was addressed and determining a set of recipient identifiers that are associated with said set of recipient email addresses;

    for each recipient identifier in said set of recipient identifiers inspecting a mapping to identify a particular action from a plurality of actions, and based on said mapping, processing said at least one email message according to the particular action;

    wherein said mapping associates said plurality of recipient identifiers with said plurality of actions;

    wherein said first sender identifier, said second sender identifier, and said third sender identifier are each selected from the group consisting of a classless inter-domain routing (CIDR) block, and a partial CIDR block;

    based on a particular recipient identifier matching a specified recipient identifier, processing said electronic message even though said number of connections does not satisfy said specified relationship with said specified number of connections;

    wherein the method is performed by one or more computing devices.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×