The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 01, 2015

Filed:

Oct. 19, 2010
Applicants:

Manoj Kumar Srivastava, Reston, VA (US);

William Andrews Walker, Springfield, VA (US);

Eric Alexander Olson, Alexandria, VA (US);

Inventors:

Manoj Kumar Srivastava, Reston, VA (US);

William Andrews Walker, Springfield, VA (US);

Eric Alexander Olson, Alexandria, VA (US);

Assignee:

QINETIQ NORTH AMERICA, INC., McLean, VA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06Q 10/10 (2012.01); G06F 21/56 (2013.01); H04L 12/58 (2006.01); H04L 29/06 (2006.01); G06F 15/16 (2006.01); G06F 21/00 (2013.01);
U.S. Cl.
CPC ...
G06Q 10/107 (2013.01); G06F 21/56 (2013.01); H04L 12/585 (2013.01); H04L 12/588 (2013.01); H04L 51/12 (2013.01); H04L 51/32 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); G06F 15/16 (2013.01); G06F 21/00 (2013.01);
Abstract

Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.


Find Patent Forward Citations

Loading…