×

Email spoofing detection via infrastructure machine learning

  • US 9,450,982 B1
  • Filed: 06/19/2015
  • Issued: 09/20/2016
  • Est. Priority Date: 06/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising a hardware processor for detecting a spoofed information packet, the method comprising the steps of:

  • building a database from data values from predetermined designated fields of metadata from a previously received information packet and a currently received information packet, further including the steps of;

    locating the predetermined designated fields within the metadata of the previously received information packet;

    extracting a value from each of the predetermined designated fields within the metadata of the previously received information packet;

    updating the database with each value extracted from the metadata of the previously received information packet and storing each extracted value into at least one data structure of a group of data structures within the database;

    locating the predetermined designated fields within the metadata of the currently received information packet;

    extracting a value from each of the predetermined designated fields of metadata of the currently received information packet;

    updating the database with each value extracted from the currently received information packet and storing each extracted value from each of the predetermined designated fields of the currently received information packet into at least one of a data structure of the group of data structures within the database, such that each value extracted from the predetermined designated fields of the currently received information packet will be stored within a data structure of the group of data structures, which comprises a designation of the predetermined designated field from which the value was extracted;

    the step of building the database further includes the predetermined designated fields comprise a from domain value, a sender domain value, a return-path domain value, an Internet Protocol address value, or combinations thereof;

    wherein the group of data structures, comprise;

    a first data structure comprising a from domain predetermined designated field designation value corresponding to an Internet Protocol address predetermined designated field designation value;

    a second data structure comprising a sender domain predetermined designated field designation value corresponding to the Internet Protocol address predetermined designated field designation value;

    a third data structure comprising a return-path domain predetermined designated field designation value corresponding to the Internet Protocol address predetermined designated field designation value;

    a fourth data structure comprising the from domain predetermined designated field designation value corresponding to the return-path domain predetermined designated field designation value;

    a fifth data structure comprising the sender domain predetermined designated field designation value corresponding to the return-path domain predetermined designated field designation value andgenerating, by the hardware processor, a spoofed score for the currently received information packet.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×