SG10201706810PA - Technique for detecting suspicious electronic messages - Google Patents
Technique for detecting suspicious electronic messagesInfo
- Publication number
- SG10201706810PA SG10201706810PA SG10201706810PA SG10201706810PA SG10201706810PA SG 10201706810P A SG10201706810P A SG 10201706810PA SG 10201706810P A SG10201706810P A SG 10201706810PA SG 10201706810P A SG10201706810P A SG 10201706810PA SG 10201706810P A SG10201706810P A SG 10201706810PA
- Authority
- SG
- Singapore
- Prior art keywords
- technique
- electronic messages
- detecting suspicious
- suspicious electronic
- detecting
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/144—Detection or countermeasures against botnets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Virology (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16189472.0A EP3297221B1 (en) | 2016-09-19 | 2016-09-19 | Technique for detecting suspicious electronic messages |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201706810PA true SG10201706810PA (en) | 2018-04-27 |
Family
ID=57003361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201706810PA SG10201706810PA (en) | 2016-09-19 | 2017-08-21 | Technique for detecting suspicious electronic messages |
Country Status (8)
Country | Link |
---|---|
US (1) | US10572664B2 (ja) |
EP (1) | EP3297221B1 (ja) |
JP (1) | JP7049087B2 (ja) |
KR (1) | KR102119718B1 (ja) |
CA (1) | CA2977807C (ja) |
ES (1) | ES2699956T3 (ja) |
LT (1) | LT3297221T (ja) |
SG (1) | SG10201706810PA (ja) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6502461B1 (ja) * | 2017-11-08 | 2019-04-17 | ヤフー株式会社 | 不正メール判定装置、不正メール判定方法、およびプログラム |
US11861304B2 (en) * | 2019-05-13 | 2024-01-02 | Mcafee, Llc | Methods, apparatus, and systems to generate regex and detect data similarity |
US11050698B1 (en) * | 2020-09-18 | 2021-06-29 | Area 1 Security, Inc. | Message processing system with business email compromise detection |
US11425077B2 (en) * | 2020-10-06 | 2022-08-23 | Yandex Europe Ag | Method and system for determining a spam prediction error parameter |
CN115238175B (zh) * | 2022-07-18 | 2023-08-15 | 中移互联网有限公司 | 消息审核方法、装置和电子设备 |
US11916858B1 (en) * | 2022-09-30 | 2024-02-27 | Sophos Limited | Method and system for outbound spam mitigation |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) * | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
JP3871941B2 (ja) * | 2002-02-22 | 2007-01-24 | 日本電気通信システム株式会社 | 携帯電話のメールサーバーにおける迷惑メール自動処分方法、メールサーバー及びプログラム |
US7603472B2 (en) * | 2003-02-19 | 2009-10-13 | Google Inc. | Zero-minute virus and spam detection |
US7543053B2 (en) * | 2003-03-03 | 2009-06-02 | Microsoft Corporation | Intelligent quarantining for spam prevention |
US7272853B2 (en) * | 2003-06-04 | 2007-09-18 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
US9106694B2 (en) * | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US7748038B2 (en) * | 2004-06-16 | 2010-06-29 | Ironport Systems, Inc. | Method and apparatus for managing computer virus outbreaks |
US7694150B1 (en) * | 2004-06-22 | 2010-04-06 | Cisco Technology, Inc | System and methods for integration of behavioral and signature based security |
US7870205B2 (en) * | 2005-07-01 | 2011-01-11 | 0733660 B.C. Ltd. | Electronic mail system with pre-message-retrieval display of message metadata |
US20090026578A1 (en) | 2007-07-27 | 2009-01-29 | Micrel, Inc. | Vertical NPN Transistor Fabricated in a CMOS Process With Improved Electrical Characteristics |
US20090265786A1 (en) * | 2008-04-17 | 2009-10-22 | Microsoft Corporation | Automatic botnet spam signature generation |
US20100161734A1 (en) * | 2008-12-22 | 2010-06-24 | Yahoo! Inc. | Determining spam based on primary and secondary email addresses of a user |
KR101045330B1 (ko) * | 2008-12-24 | 2011-06-30 | 한국인터넷진흥원 | 네트워크 기반의 http 봇넷 탐지 방법 |
KR101077136B1 (ko) * | 2009-09-28 | 2011-10-26 | 한국인터넷진흥원 | 히스토리 기반 DDoS 대응 방법 |
US8549642B2 (en) * | 2010-01-20 | 2013-10-01 | Symantec Corporation | Method and system for using spam e-mail honeypots to identify potential malware containing e-mails |
US20120260304A1 (en) * | 2011-02-15 | 2012-10-11 | Webroot Inc. | Methods and apparatus for agent-based malware management |
JP5668034B2 (ja) * | 2012-09-04 | 2015-02-12 | ビッグローブ株式会社 | 電子メール監視装置、送信メールサーバ、電子メール監視方法およびプログラム |
KR20140127036A (ko) * | 2013-04-24 | 2014-11-03 | (주)네오위즈게임즈 | 스팸 필터링 서버 및 방법 |
-
2016
- 2016-09-19 ES ES16189472T patent/ES2699956T3/es active Active
- 2016-09-19 LT LTEP16189472.0T patent/LT3297221T/lt unknown
- 2016-09-19 EP EP16189472.0A patent/EP3297221B1/en active Active
-
2017
- 2017-08-21 SG SG10201706810PA patent/SG10201706810PA/en unknown
- 2017-08-30 CA CA2977807A patent/CA2977807C/en active Active
- 2017-09-08 KR KR1020170114995A patent/KR102119718B1/ko active IP Right Grant
- 2017-09-18 US US15/706,796 patent/US10572664B2/en active Active
- 2017-09-19 JP JP2017179389A patent/JP7049087B2/ja active Active
Also Published As
Publication number | Publication date |
---|---|
ES2699956T3 (es) | 2019-02-13 |
JP2018074570A (ja) | 2018-05-10 |
EP3297221A1 (en) | 2018-03-21 |
CA2977807C (en) | 2019-02-26 |
US10572664B2 (en) | 2020-02-25 |
JP7049087B2 (ja) | 2022-04-06 |
LT3297221T (lt) | 2018-12-27 |
US20180082062A1 (en) | 2018-03-22 |
KR20180031570A (ko) | 2018-03-28 |
KR102119718B1 (ko) | 2020-06-05 |
EP3297221B1 (en) | 2018-11-14 |
CA2977807A1 (en) | 2018-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA201607434B (en) | An electronic locking system | |
GB201602319D0 (en) | Proximity detection | |
GB201900639D0 (en) | Detecting vulnerable applications | |
SG10201706810PA (en) | Technique for detecting suspicious electronic messages | |
GB201719627D0 (en) | Proximity detection | |
SG10201610952XA (en) | Technique for detecting malicious electronic messages | |
GB201418499D0 (en) | Malware detection method | |
GB201513698D0 (en) | Object detection | |
IL259904A (en) | Multiple threat detection system | |
EP3299837C0 (en) | SEW DETECTION METHOD | |
GB2546273B (en) | Detection system | |
GB2543813B (en) | Improved malware detection | |
HUE053610T2 (hu) | Hemoplazma kimutatási eljárás | |
GB201603716D0 (en) | Detection device | |
GB201510909D0 (en) | Detection apparatus | |
GB201502226D0 (en) | AH-7921 detection | |
SG10201406350UA (en) | An event detection method | |
SG10201610911WA (en) | Intrusion detection system | |
GB201522510D0 (en) | Opioid Detection | |
HK1246524B (zh) | 用於檢測可疑電子消息的技術 | |
GB2551956B (en) | Object detection | |
GB201610793D0 (en) | Detection system | |
IL244094A0 (en) | Improved detection device | |
GB201602054D0 (en) | Detection processes | |
GB201601829D0 (en) | Detection system |