白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Detecting and analyzing phishing attacks through artificial intelligence

專利號
US11997138B1
公開日期
2024-05-28
申請人
KING FAISAL UNIVERSITY(SA Al Hasa)
發(fā)明人
Ahmed Alyahya; Mohammed Alzahrani
IPC分類
H04L9/40
技術領域
phishing,email,persuasion,message,spam,emails,in,recipient,signs,or
地域: Al Hasa

摘要

Detection of phishing messages in network communications is performed by receiving a transmitted message and detecting characteristics of the message. A determination is made if the message matches a pattern of a phishing message in a database, and classifies the message as a phishing or spam message accordingly. If the message does not match a known phishing message pattern, the message is checked for common signs of phishing or spam by determining the severity of a threat embodied by the message, and the message is categorized as having phishing characteristics and according to the severity of threat. In response the user responses to determinations of threats, criteria for detection of phishing characteristics is adjusted, thereby automatically revising criteria for future decisions as to whether the message represents suspected phishing.

說明書

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

With the development of technologies, hacker tools and skills, phishing emails have become complex and difficult to recognize. Therefore, use of state-of-art technologies can minimize the risk behind the phishing attacks. Artificial intelligence (AI) techniques are used to identify the possibility of phishing before they can be communicated to a recipient. With the support of AI, the recipient can obtain a report that includes the persuasion strategies used in the email, such as authority, social proof, liking, and scarcity, urgency, etc., which are intended to influence individuals' behavior and persuade the victims to respond. In addition, the report includes the signs of a phishing email such as grammar and spelling mistakes, suspicious links and attachments, wrong email address of sender, mismatched URLs, etc., plagiarism percentage, and identifies the severity level of the risk before responding to it.

The disclosed technique filters phishing emails by performing a deep investigation and scanning for the following:

    • 1) Techniques used by phishers that may increase the trustworthiness and acceptance level of phishing emails; and
    • 2) Signs needed to recognize and distinguish real emails from the phishing emails.

權利要求

1
微信群二維碼
意見反饋