白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Detecting and analyzing phishing attacks through artificial intelligence

專利號
US11997138B1
公開日期
2024-05-28
申請人
KING FAISAL UNIVERSITY(SA Al Hasa)
發(fā)明人
Ahmed Alyahya; Mohammed Alzahrani
IPC分類
H04L9/40
技術(shù)領(lǐng)域
phishing,email,persuasion,message,spam,emails,in,recipient,signs,or
地域: Al Hasa

摘要

Detection of phishing messages in network communications is performed by receiving a transmitted message and detecting characteristics of the message. A determination is made if the message matches a pattern of a phishing message in a database, and classifies the message as a phishing or spam message accordingly. If the message does not match a known phishing message pattern, the message is checked for common signs of phishing or spam by determining the severity of a threat embodied by the message, and the message is categorized as having phishing characteristics and according to the severity of threat. In response the user responses to determinations of threats, criteria for detection of phishing characteristics is adjusted, thereby automatically revising criteria for future decisions as to whether the message represents suspected phishing.

說明書

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

The NLTK is a suite of libraries and programs for symbolic and statistical natural language processing for English written in the Python programming language. It supports classification, tokenization, stemming, tagging, parsing, and semantic reasoning functionalities.

By way of non-limiting examples, URL detection, fraud detection and virus software can be detected by characteristics of multilevel marketing (MLM) and/or indications provided by Bidirectional Encoder Representations from Transformers, such as (by way of non-limiting example) BERT. Examples of fraud detection libraries include Torch (an open-source machine learning library, a scientific computing framework, and a scripting language based on Lua), TensorFlow (a free and open-source software library for machine learning and artificial intelligence, developed by Google Brain Team), transformers, or huggingface.

Data pre-processing for text includes removing HTML Tags, numbers, punctuation, stop words, infrequent words, and stemming. By way of non-limiting examples, this would include tokenizing.

While the above description indicates moving suspected phishing emails to a phishing filter, the system can be configured to use a spam filter or other notification systems provided by anti-spam software or other message handling software to store the diverted phishing email. Advantageously, phishing emails would be flagged as such so that they can be identified in the spam folder and handled appropriately by the recipient.

Feedback Loop

權(quán)利要求

1
微信群二維碼
意見反饋