白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Message platform for automated threat simulation, reporting, detection, and remediation

專利號
US11997115B1
公開日期
2024-05-28
申請人
Cofense Inc.(US VA Leesburg)
發(fā)明人
Aaron Higbee; David Chamberlain; Vineetha Philip
IPC分類
H04L9/40; G06F16/35; G06F21/00; G06F21/55; H04L51/212; H04L51/08
技術(shù)領(lǐng)域
message,phishing,email,messages,be,or,emails,in,user,cluster
地域: VA VA Leesburg

摘要

Methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.

說明書

An operator may then review the suspicious message and generate a simulated phishing message based on that suspicious message, but modified to as to remove aspects that could compromise the security of a recipient of the simulated phishing message.

The modified message may then be added to a simulated message generator configured to allow a user to select messages that have bypassed the email gateway so as to be received by the email server and made available to one or more users. In some embodiments, the operator may be presented with an interface for selecting among multiple simulated phishing messages based on suspicious messages having been received through multiple email gateways.

Smart Clustering

Clusters can be considered to be aggregations of messages. Messages can be clustered based on the application of rules to messages that have been reported as suspicious. As non-limiting examples, similarities for grouping purposes could be based on parameters such as message attachment name, time, hash of the attachment, a fuzzy hash, or any combination of parameters. Similarities can be identified based on application of YARA rules to messages. Parameters can be weighted and clusters formed based on weighted parameters. For example, as described above, users have reputation scores and messages can be clustered according to reputational similarity. The reputation score for use in clustering can be a cumulative average. Clustering can also be done according to the reputation or credibility score of a source. In some embodiments, the system can use a plagiarism detection system, n-gram analysis, or comparable system to identify similar phishing stories, flag corresponding messages as suspicious, and cluster messages so identified as embodying a similar phishing story.

權(quán)利要求

1
微信群二維碼
意見反饋