×

Detection of e-mail threat acceleration

  • US 8,201,254 B1
  • Filed: 08/30/2005
  • Issued: 06/12/2012
  • Est. Priority Date: 08/30/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for detecting accelerating distribution of malicious email attachments, the method comprising:

  • using a computer to perform steps comprising;

    monitoring an incoming email stream;

    identifying incoming email messages with suspicious attachments;

    generating signatures of the suspicious attachments;

    queuing the suspicious attachments for a hold time;

    submitting a report to a correlation component, the report listing signatures identifying suspicious attachments and containing information indicating a number of instances of each identified suspicious email attachment received in a current reporting period;

    receiving, from the correlation component, an indication of whether a current acceleration rate for an identified suspicious attachment is anomalous, the current acceleration rate for the identified suspicious attachment determined responsive to a comparison of a number of instances of the identified suspicious attachment received by a plurality of queuing components in the current reporting period to a number of instances of the identified suspicious attachment received by the queuing components in one or more prior reporting periods, the indication of whether the current acceleration rate for the identified suspicious attachment is anomalous determined responsive to the current acceleration rate exceeding a historical variance threshold, the historical variance threshold determined by calculating a historical variance of the number of instances of the identified suspicious email attachment received by the queuing components in the prior reporting periods; and

    responsive to receiving an indication that the current acceleration rate for the identified suspicious attachment is anomalous;

    determining whether the current acceleration rate for the identified suspicious attachment exceeds an acceleration tolerance threshold;

    responsive to the current acceleration rate for the identified suspicious attachment exceeding the acceleration tolerance threshold, queuing instances of the suspicious attachment until the suspicious attachment instances are deleted or released by an administrator; and

    responsive to the current acceleration rate for the identified suspicious attachment not exceeding the acceleration tolerance threshold;

    increasing the hold time associated with the suspicious attachment; and

    queuing instances of the suspicious attachment for the increased hold time associated with the suspicious attachment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×