[go: up one dir, main page]

CN101730892A - Network reputation scoring - Google Patents

Network reputation scoring Download PDF

Info

Publication number
CN101730892A
CN101730892A CN200880009672A CN200880009672A CN101730892A CN 101730892 A CN101730892 A CN 101730892A CN 200880009672 A CN200880009672 A CN 200880009672A CN 200880009672 A CN200880009672 A CN 200880009672A CN 101730892 A CN101730892 A CN 101730892A
Authority
CN
China
Prior art keywords
reputation
engine
operable
entity
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200880009672A
Other languages
Chinese (zh)
Inventor
D·阿尔佩罗维奇
T·富特-伦诺瓦
P·格里夫
A·M·埃尔南德斯
P·朱格
S·克拉泽
T·朗格
P·A·施内克
M·施特赫尔
Y·唐
A·J·N·特里维迪
L·L·维利斯
W·杨
J·A·齐齐亚斯基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
McAfee LLC
Original Assignee
McAfee LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/626,620 external-priority patent/US7779156B2/en
Priority claimed from US11/626,644 external-priority patent/US8179798B2/en
Priority claimed from US11/626,470 external-priority patent/US8561167B2/en
Priority claimed from US11/626,479 external-priority patent/US7937480B2/en
Application filed by McAfee LLC filed Critical McAfee LLC
Publication of CN101730892A publication Critical patent/CN101730892A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Methods and systems for operation on one or more data processors for assigning reputations to network-based entities based on previously collected data.

Description

网络声誉评分 Internet Reputation Score

技术领域technical field

本文件通常涉及用于处理通信(communication)的系统和方法,尤其是涉及用于给与通信相关的实体进行分类的系统和方法。This document relates generally to systems and methods for processing communications, and more particularly to systems and methods for categorizing communication-related entities.

背景background

在反垃圾邮件行业中,垃圾邮件发送者使用各种创造性的装置来躲避垃圾邮件过滤器进行的检测。这样,通信从其起源的实体可提供是否应允许给定通信进入企业网络环境的另一指示。In the anti-spam industry, spammers use various creative devices to evade detection by spam filters. In this way, the entity from which the communication originates can provide another indication of whether a given communication should be allowed into the enterprise network environment.

然而,用于消息发送者进行分析的当前工具包括互联网协议(IP)黑名单(有时称为实时黑名单(RBL))和IP白名单(实时白名单(RWL))。白名单和黑名单当然对垃圾邮件分类过程增加了益处;然而,白名单和黑名单内在地限于响应于每个查询而提供一个二进制类型(YES/NO)。而且,黑名单和白名单独立地处理实体,并忽略与实体相关的各种属性所提供的证据。However, current tools for analysis by message senders include Internet Protocol (IP) blacklists (sometimes called Real-time Blacklists (RBL)) and IP whitelists (Real-time Whitelists (RWL)). Whitelists and blacklists certainly add benefits to the spam classification process; however, whitelists and blacklists are inherently limited to providing a binary type (YES/NO) in response to each query. Also, blacklists and whitelists treat entities independently and ignore evidence provided by various attributes associated with entities.

概述overview

提供了用于网络声誉评分的系统和方法。用于给基于网络的实体分配声誉的系统可包括通信接口、通信分析器、声誉引擎和决策引擎。通信接口可接收网络通信,且通信分析器可分析网络通信以确定与网络通信相关联的实体。声誉引擎可根据以前收集的与实体相关联的数据提供与实体相关联的声誉,且决策引擎可根据声誉确定网络通信是否被传递到接收者。Systems and methods for network reputation scoring are provided. A system for assigning reputations to network-based entities may include a communication interface, a communication analyzer, a reputation engine, and a decision engine. The communication interface can receive network communications, and the communication analyzer can analyze the network communications to determine entities associated with the network communications. The reputation engine can provide a reputation associated with the entity based on previously collected data associated with the entity, and the decision engine can determine whether the network communication is delivered to the recipient based on the reputation.

用于给基于网络的实体分配声誉的方法可包括:在边缘保护设备处接收超文本传输协议通信;识别与所接收的超文本传输协议通信相关联的实体;查询声誉引擎以得到与实体相关联的声誉指示符;从声誉引擎接收声誉指示符;以及根据与实体相关联的所接收的声誉指示符关于超文本传输协议通信采取行动。A method for assigning a reputation to a network-based entity may include: receiving a hypertext transfer protocol communication at an edge protection device; identifying an entity associated with the received hypertext transfer protocol communication; querying a reputation engine for information associated with the entity receiving the reputation indicator from the reputation engine; and taking an action with respect to the hypertext transfer protocol communication based on the received reputation indicator associated with the entity.

在处理器上操作来执行汇聚局部声誉数据以产生全局声誉矢量的计算机可读介质的例子可执行以下步骤:从请求的局部声誉引擎接收声誉查询;取回多个局部声誉,所述局部声誉分别与多个局部声誉引擎相关联;汇聚多个局部声誉;从局部声誉的汇聚得到全局声誉;以及以全局声誉响应于声誉查询。An example of a computer readable medium operative on a processor to perform aggregating local reputation data to generate a global reputation vector may perform the following steps: receiving a reputation query from a requesting local reputation engine; retrieving a plurality of local reputations, the local reputations being associated with a plurality of local reputation engines; aggregating the plurality of local reputations; deriving a global reputation from the aggregation of the local reputations; and responding to reputation queries with the global reputation.

其它示例性系统可包括通信接口和声誉引擎。通信接口可从中央服务器接收全局声誉信息,全局声誉与实体相关联。声誉引擎可根据所定义的局部偏好而偏置从中央服务器接收的全局声誉。Other exemplary systems may include a communication interface and a reputation engine. The communication interface can receive global reputation information from the central server, the global reputation being associated with the entity. The reputation engine can bias the global reputation received from the central server according to defined local preferences.

另一示例性系统可包括通信接口、声誉模块和业务量控制模块。通信接口可从分布式声誉引擎接收分布的声誉信息。声誉模块可汇聚分布的声誉信息并根据分布的声誉信息的汇聚得出全局声誉,声誉模块也可根据声誉模块所接收的通信得出局部声誉信息。业务量控制模块可根据全局声誉和局部声誉确定与通信相关联的处理。Another exemplary system may include a communication interface, a reputation module, and a traffic control module. The communication interface can receive distributed reputation information from the distributed reputation engine. The reputation module can aggregate the distributed reputation information and obtain the global reputation according to the aggregation of the distributed reputation information, and the reputation module can also obtain the local reputation information according to the communication received by the reputation module. The traffic control module can determine handling associated with the communication based on the global reputation and the local reputation.

提供了用于汇聚声誉信息的系统和方法。用于汇聚声誉信息的系统可包括集中式声誉引擎和汇聚引擎。集中式声誉引擎可从多个局部声誉引擎接收反馈。汇聚引擎可根据多个局部声誉的汇聚得到被查询的实体的全局声誉。集中式声誉引擎可响应于从局部声誉引擎接收声誉查询而进一步向局部声誉引擎提供被查询的实体的全局声誉。Systems and methods for aggregating reputation information are provided. A system for aggregating reputation information may include a centralized reputation engine and an aggregation engine. A centralized reputation engine can receive feedback from multiple local reputation engines. The aggregation engine can obtain the global reputation of the queried entity based on the aggregation of multiple local reputations. The centralized reputation engine may further provide the global reputation of the queried entity to the local reputation engine in response to receiving the reputation query from the local reputation engine.

汇聚声誉信息的方法可包括:从请求的局部声誉引擎接收声誉查询;取回多个局部声誉,所述局部声誉分别与多个局部声誉引擎相关联;汇聚多个局部声誉;从局部声誉的汇聚得到全局声誉;以及以全局声誉响应于声誉查询。The method of aggregating reputation information may include: receiving a reputation query from a requesting local reputation engine; retrieving a plurality of partial reputations, the partial reputations being respectively associated with the plurality of local reputation engines; aggregating the plurality of partial reputations; obtaining the global reputation; and responding to the reputation query with the global reputation.

在处理器上操作来汇聚局部声誉数据以产生全局声誉矢量的计算机可读介质的例子可执行以下步骤:从请求的局部声誉引擎接收声誉查询;取回多个局部声誉,所述局部声誉分别与多个局部声誉引擎相关联;汇聚多个局部声誉;从局部声誉的汇聚得到全局声誉;以及以全局声誉响应于声誉查询。An example of a computer readable medium operative on a processor to aggregate local reputation data to produce a global reputation vector may perform the following steps: receive a reputation query from a requesting local reputation engine; retrieve a plurality of local reputations, the local reputations being associated with Multiple local reputation engines are associated; multiple local reputations are aggregated; global reputation is derived from the aggregation of local reputations; and reputation queries are responded to with the global reputation.

其它示例性声誉汇聚系统可包括通信接口和声誉引擎。通信接口可从中央服务器接收全局声誉信息,全局声誉与实体相关联。声誉引擎可根据所定义的局部偏好偏置从中央服务器接收的全局声誉。Other exemplary reputation aggregation systems may include a communication interface and a reputation engine. The communication interface can receive global reputation information from the central server, the global reputation being associated with the entity. The reputation engine may bias the global reputation received from the central server according to defined local preferences.

进一步的示例性系统可包括通信接口、声誉模块和业务量控制模块。通信接口可从分布式声誉引擎接收分布的声誉信息。声誉模块可汇聚分布的声誉信息并根据分布的声誉信息的汇聚得出全局声誉,声誉模块也可根据声誉模块所接收的通信得出局部声誉信息。业务量控制模块可根据全局声誉和局部声誉确定与通信相关联的处理。Further exemplary systems may include a communication interface, a reputation module, and a traffic control module. The communication interface can receive distributed reputation information from the distributed reputation engine. The reputation module can aggregate the distributed reputation information and obtain the global reputation according to the aggregation of the distributed reputation information, and the reputation module can also obtain the local reputation information according to the communication received by the reputation module. The traffic control module can determine handling associated with the communication based on the global reputation and the local reputation.

提供了用于基于声誉的网络安全系统的系统和方法。基于声誉的网络安全系统可包括通信接口、通信分析器、声誉引擎和安全引擎。通信接口可接收与网络相关联的进入的通信的和传出的通信。通信分析器可得到与通信相关联的外部实体。声誉引擎可得到与外部实体相关联的声誉矢量。安全引擎可接收声誉矢量并向询问引擎发送通信,其中安全引擎根据声誉矢量确定询问引擎中的哪一个询问通信。Systems and methods for a reputation-based network security system are provided. A reputation-based network security system may include a communication interface, a communication analyzer, a reputation engine, and a security engine. The communication interface can receive incoming and outgoing communications associated with the network. A communication analyzer may obtain external entities associated with a communication. The reputation engine can obtain reputation vectors associated with external entities. The security engine may receive the reputation vector and send the communication to the interrogation engine, wherein the security engine determines which of the interrogation engines interrogates the communication based on the reputation vector.

其它基于声誉的网络安全系统可包括通信接口、通信分析器、声誉引擎和安全引擎。通信接口可接收与网络相关联的进入的通信的和传出的通信。通信分析器可得到与通信相关联的外部实体。声誉引擎可得到与外部实体相关联的声誉。安全引擎将优先权信息分配给通信,其中安全引擎在外部实体是声誉好的实体的情况下可向通信分配高优先权,并在外部实体是声誉差的实体的情况下可向通信分配低优先权,由此优先权信息由一个或更多个询问引擎使用来提高对声誉好的实体的服务的质量。Other reputation-based network security systems may include communication interfaces, communication analyzers, reputation engines, and security engines. The communication interface can receive incoming and outgoing communications associated with the network. A communication analyzer may obtain external entities associated with a communication. A reputation engine may obtain reputations associated with external entities. The security engine assigns priority information to the communication, wherein the security engine may assign a high priority to the communication if the external entity is a reputable entity and may assign a low priority to the communication if the external entity is a poorly reputable entity rights whereby the priority information is used by one or more query engines to improve the quality of service to reputable entities.

根据安全威胁的声誉来有效地处理通信的方法可包括:根据与通信相关联的发源或目的地信息来接收与外部实体相关联的通信;识别与所接收的通信相关联的外部实体;根据与外部实体相关联的声誉好的和声誉差的标准得出与外部实体相关联的声誉;根据与外部实体相关联的所得出的声誉向通信分配优先权;根据分配给通信的优先权对通信执行一个或更多个测试。A method of effectively processing communications based on a reputation of a security threat may include: receiving a communication associated with an external entity based on origination or destination information associated with the communication; identifying an external entity associated with the received communication; The reputation associated with the external entity is derived from criteria of good and bad reputation associated with the external entity; assigns priority to communications based on the derived reputation associated with the external entity; enforces communications based on the priority assigned to the communication One or more tests.

根据声誉有效地处理通信的方法可包括:根据与通信相关联的发源或目的地信息来接收与外部实体相关联的通信;识别与所接收的超文本传输协议通信相关联的外部实体;根据与外部实体相关联的声誉好的和声誉差的标准得出与外部实体相关联的声誉;将通信分配到从多个询问引擎中选择的一个或更多个询问引擎,所述一个或更多个询问引擎的选择基于与外部实体相关联的所得出的声誉和询问引擎的能力;以及对通信执行所述一个或更多个询问引擎。A method of efficiently processing communications based on reputation may include: receiving a communication associated with an external entity based on origination or destination information associated with the communication; identifying an external entity associated with the received hypertext transfer protocol communication; Reputation associated with the external entity based on criteria of good and bad reputation associated with the external entity; assigning the communication to one or more query engines selected from a plurality of query engines, the one or more The selection of the query engine is based on the derived reputation associated with the external entity and the capabilities of the query engine; and executing the one or more query engines on the communication.

提供了用于基于声誉的连接抑制的系统和方法。用于基于声誉的连接抑制的系统可包括通信接口、声誉引擎和连接控制引擎。通信接口可在建立到外部实体的连接之前接收与外部实体相关联的连接请求。声誉引擎可得出与外部实体相关联的声誉。连接控制引擎可根据外部实体的所得出的声誉拒绝对到被保护网络的连接请求。Systems and methods for reputation-based connection suppression are provided. A system for reputation-based connection suppression can include a communication interface, a reputation engine, and a connection control engine. The communication interface may receive a connection request associated with an external entity prior to establishing a connection to the external entity. A reputation engine may derive reputations associated with external entities. The connection control engine may deny connection requests to the protected network based on the derived reputation of the external entity.

根据声誉抑制连接请求的方法可包括:接收连接请求,所述连接请求与外部实体有关;查询声誉引擎以得到与外部实体相关联的声誉;将所述声誉与相关联于被保护的企业网的策略进行比较;根据确定与连接请求有关的外部实体的声誉遵守策略,来允许连接请求;以及根据确定与互联网协议语音电话连接请求有关的外部实体的声誉不遵守策略,来抑制连接请求。A method of suppressing a connection request based on a reputation may include: receiving a connection request, the connection request being related to an external entity; querying a reputation engine for a reputation associated with the external entity; policies; allowing the connection request based on determining that the reputation of the external entity associated with the connection request complies with the policy; and suppressing the connection request based on determining that the reputation of the external entity associated with the voice over internet protocol connection request does not comply with the policy.

附图说明Description of drawings

图1是描述示例性网络的结构图,本公开的系统和方法可在该网络中进行操作。FIG. 1 is a block diagram depicting an exemplary network in which the systems and methods of the present disclosure may operate.

图2是描述本公开的示例性网络体系结构的结构图。FIG. 2 is a block diagram depicting an exemplary network architecture of the present disclosure.

图3是描述通信和实体的例子的结构图,其包括用于检测实体之间的关系的标识符和属性。Figure 3 is a block diagram depicting an example of communications and entities, including identifiers and attributes for detecting relationships between entities.

图4是描述用于检测关系并给实体分配风险的操作方案的流程图。4 is a flowchart describing an operational scheme for detecting relationships and assigning risks to entities.

图5是示出示例性网络体系结构的结构图,其包括局部安全代理所储存的局部声誉和一个或多个服务器所储存的全局声誉。5 is a block diagram illustrating an exemplary network architecture including a local reputation stored by a local security agent and a global reputation stored by one or more servers.

图6是示出基于局部声誉反馈的全局声誉的确定的结构图。FIG. 6 is a block diagram illustrating determination of global reputation based on local reputation feedback.

图7是示出全局声誉和局部声誉之间的示例性转化(resolution)的流程图。FIG. 7 is a flowchart illustrating an exemplary resolution between global reputation and local reputation.

图8是用于调节与声誉服务器相关联的过滤器的设置的示例性图形用户界面。8 is an example graphical user interface for adjusting settings of filters associated with a reputation server.

图9是示出用于互联网协议语音电话(VoIP)或短消息服务(SMS)通信的基于声誉的连接抑制(connection throttling)的结构图。9 is a block diagram illustrating reputation-based connection throttling for Voice over Internet Protocol (VoIP) or Short Message Service (SMS) communications.

图10是示出基于声誉的负载均衡器的结构图。FIG. 10 is a block diagram illustrating a reputation-based load balancer.

图11A是示出用于基于地理位置的身份验证的示例性操作方案的流程图。FIG. 11A is a flowchart illustrating an exemplary operational scheme for geographic location-based authentication.

图11B是示出用于基于地理位置的身份验证的另一示例性操作方案的流程图。FIG. 11B is a flowchart illustrating another exemplary operational scheme for geographic location-based authentication.

图11C是示出用于基于地理位置的身份验证的另一示例性操作方案的流程图。11C is a flow diagram illustrating another exemplary operational scheme for geographic location-based authentication.

图12是示出用于基于声誉的动态隔离的示例性操作方案的流程图。12 is a flowchart illustrating an exemplary operational scheme for reputation-based dynamic isolation.

图13是图像垃圾邮件通信的示例性图形用户界面显示。13 is an exemplary graphical user interface display of an image spam communication.

图14是示出用于检测图像垃圾邮件的示例性操作方案的流程图。14 is a flowchart illustrating an exemplary operational scheme for detecting image spam.

图15A是示出用于分析通信的结构的操作方案的流程图。15A is a flowchart illustrating an operational scheme for analyzing the structure of a communication.

图15B是示出用于分析图像的特征的操作方案的流程图。15B is a flowchart illustrating an operational scheme for analyzing features of an image.

图15C是示出用于标准化图像以用于垃圾邮件处理的操作方案的流程图。Figure 15C is a flowchart illustrating an operational scheme for normalizing images for spam handling.

图15D是示出用于分析图像的指纹以在多个图像中找到共同片段的操作方案的流程图。15D is a flowchart illustrating an operational scheme for analyzing fingerprints of images to find common segments in multiple images.

详细说明Detailed description

图1是描述示例性网络环境的结构图,本公开的系统和方法可在该网络中进行操作。安全代理(security agent)100一般可存在于在网络110(例如,企业网)内部的防火墙系统(未示出)和服务器(未示出)之间。如应被理解的,网络110可包括很多服务器,包括例如可由与网络110相关的企业使用的电子邮件服务器、网络服务器和各种应用服务器。FIG. 1 is a block diagram depicting an exemplary network environment in which the systems and methods of the present disclosure may operate. A security agent (security agent) 100 may generally exist between a firewall system (not shown) and a server (not shown) inside a network 110 (eg, an enterprise network). As should be appreciated, network 110 may include many servers including, for example, email servers, web servers, and various application servers that may be used by businesses associated with network 110 .

安全代理100监控进入和离开网络110的通信。一般通过互联网120从连接到互联网120的很多实体130a-f接收这些通信。实体130a-f中的一个或更多个可为通信业务量的合法发起者。然而,实体130a-f中的一个或更多个也可为发起不需要的通信的声誉差的实体。因此,安全代理100包括声誉引擎。声誉引擎可检查通信并确定与发起通信的实体相关联的声誉。安全代理100接着根据发端实体的声誉对通信执行动作。如果声誉指示通信的发起者声誉好,那么例如,安全代理可将通信转发到通信的接收者。然而,如果声誉指示通信的发起者声誉差,那么其中例如,安全代理可隔离通信,对消息执行更多的测试,或要求来自消息发起者的身份验证。在美国专利公布号2006/0015942中详细描述了声誉引擎,该申请由此通过引用被并入。Security agent 100 monitors communications entering and leaving network 110 . These communications are typically received over the Internet 120 from a number of entities 130a-f connected to the Internet 120 . One or more of the entities 130a-f may be the legal originator of the communication traffic. However, one or more of entities 130a-f may also be a poorly reputable entity that initiates unwanted communications. Accordingly, security agent 100 includes a reputation engine. A reputation engine can examine communications and determine a reputation associated with the entity initiating the communications. The security proxy 100 then performs actions on the communication according to the reputation of the originating entity. If the reputation indicates that the originator of the communication is reputable, for example, the security agent may forward the communication to the recipient of the communication. However, if the reputation indicates that the originator of the communication has a bad reputation, among others, the security proxy may isolate the communication, perform more tests on the message, or require authentication from the originator of the message. The reputation engine is described in detail in US Patent Publication No. 2006/0015942, which application is hereby incorporated by reference.

图2是描述本公开的示例性网络体系结构的结构图。安全代理100a-n被示为在逻辑上分别存在于网络110a-n与互联网120之间。虽然没有在图2中示出,但应理解,防火墙可安装在安全代理100a-n和互联网120之间,以提供防止未授权的通信进入相应的网络110a-n的保护。而且,结合防火墙系统可配置侵入检测系统(IDS)(未示出),以识别活动的可疑模式并在这样的活动被识别出时用信号通知警报。FIG. 2 is a block diagram depicting an exemplary network architecture of the present disclosure. Security proxies 100a-n are shown logically residing between networks 110a-n and the Internet 120, respectively. Although not shown in FIG. 2, it should be understood that a firewall may be installed between the security agents 100a-n and the Internet 120 to provide protection against unauthorized communications from entering the respective networks 110a-n. Also, an intrusion detection system (IDS) (not shown) may be configured in conjunction with the firewall system to identify suspicious patterns of activity and signal an alarm when such activity is identified.

虽然这样的系统对网络提供了某种保护,但它们一般不处理应用层安全威胁。例如,黑客常常试图使用各种网络类型的应用(例如,电子邮件、网络、即时消息(IM),等等)来产生与网络110a-n的前文本连接,以便利用由使用实体130a-e的这些不同的应用所产生的安全漏洞。然而,不是所有的实体130a-e都暗示对网络100a-n的威胁。一些实体130a-e发起合法的业务量,允许公司的雇员与商业伙伴更有效地进行通信。虽然对可能的威胁来说检查通信是有用的,但是维持当前的威胁信息可能很难,因为攻击被不断地改进以解决最近的过滤技术。因此,安全代理100a-n可对通信运行多次测试,以确定通信是否是合法的。While such systems provide some protection to the network, they generally do not address application layer security threats. For example, hackers often attempt to use various network-type applications (e.g., email, web, instant messaging (IM), etc.) to create pretext connections with networks 110a-n in order to exploit Security holes created by these various applications. However, not all entities 130a-e imply threats to networks 100a-n. Some entities 130a-e initiate legitimate traffic, allowing employees of the company to communicate more efficiently with business partners. While it is useful to inspect communications for possible threats, maintaining current threat information can be difficult as attacks are constantly being refined to address recent filtering techniques. Accordingly, security agents 100a-n may run multiple tests on the communication to determine whether the communication is legitimate.

此外,包括在通信中的发送者信息可用于帮助确定通信是否是合法的。因此,复杂的安全代理100a-n可跟踪实体并分析实体的特征,以帮助确定是否允许通信进入网络110a-n。可接着给实体110a-n分配声誉。对通信的决定可考虑发起通信的实体130a-e的声誉。而且,一个或更多个中央系统200可收集关于实体130a-e的信息,并将所收集的数据分发到其它中央系统200和/或安全代理100a-n。Additionally, sender information included in communications may be used to help determine whether a communication is legitimate. Thus, sophisticated security agents 100a-n may track entities and analyze characteristics of entities to help determine whether to allow communications into networks 110a-n. Reputations may then be assigned to entities 110a-n. The decision to communicate may take into account the reputation of the entity 130a-e initiating the communication. Also, one or more central systems 200 may collect information about entities 130a-e and distribute the collected data to other central systems 200 and/or security agents 100a-n.

声誉引擎可帮助识别大量恶意通信,而没有通信的内容的广泛和可能昂贵的局部分析(local analysis)。声誉引擎也可帮助识别合法通信,并优先考虑其传输,且减小了对合法通信进行错误分类的风险。而且,声誉引擎可在物理世界或虚拟世界中对识别恶意以及合法事务的问题提供动态和预言性的方法。例子包括在电子邮件、即时消息、VoIP、SMS或利用发送者声誉和内容的分析的其它通信协议系统中过滤恶意通信的过程。安全代理100a-n可接着应用全局或局部策略,以确定关于通信对声誉结果执行什么动作(例如拒绝、隔离、负载均衡、以所分配的优先级传输、以额外的细查局部地进行分析)。Reputation engines can help identify large volumes of malicious communications without extensive and potentially expensive local analysis of the content of the communications. A reputation engine can also help identify and prioritize legitimate communications for transmission, reducing the risk of misclassifying legitimate communications. Moreover, a reputation engine can provide a dynamic and predictive approach to the problem of identifying malicious as well as legitimate transactions in the physical or virtual world. Examples include the process of filtering malicious communications in email, instant messaging, VoIP, SMS, or other communication protocol systems that utilize analysis of sender reputation and content. The security agents 100a-n may then apply global or local policies to determine what action to take on the communication for reputation results (e.g. reject, quarantine, load balance, transmit with assigned priority, analyze locally with additional scrutiny) .

然而,实体130a-e可用各种方法连接到互联网。如应理解的,实体130a-e可同时或在一段时间内具有多个标识符(例如,电子邮件地址、IP地址、标识符文件,等等)。例如,具有变化的IP地址的邮件服务器可随着时间的过去具有多个身份。而且,一个标识符可与多个实体相关,例如,当IP地址被很多用户支持的组织共享时。而且,用于连接到互联网的特定方法可能使实体130a-e的识别模糊不清。例如,实体130b可利用互联网服务提供商(ISP)200连接到互联网。很多ISP 200使用动态主机配置协议(DHCP)来将IP地址动态地分配给请求连接的实体130b。实体130a-e也可通过欺骗合法实体来伪装其身份。因此,收集关于每个实体130a-e的特征的数据可帮助对实体130a-e加以分类,并确定如何处理通信。However, entities 130a-e may connect to the Internet in various ways. As should be appreciated, entities 130a-e may have multiple identifiers (eg, email addresses, IP addresses, identifier files, etc.) at the same time or over time. For example, a mail server with changing IP addresses may have multiple identities over time. Also, one identifier may be associated with multiple entities, for example, when an IP address is shared by an organization supported by many users. Also, the particular method used to connect to the Internet may obscure the identity of entities 130a-e. For example, entity 130b may utilize Internet Service Provider (ISP) 200 to connect to the Internet. Many ISPs 200 use Dynamic Host Configuration Protocol (DHCP) to dynamically assign IP addresses to entities 130b requesting connections. Entities 130a-e may also disguise their identities by deceiving legitimate entities. Thus, gathering data about the characteristics of each entity 130a-e can help classify the entities 130a-e and determine how to handle communications.

在虚拟世界和物理世界中创建和欺骗身份的容易性可能产生用户恶意动作的动机,而不承担该动作的后果。例如,在互联网上被罪犯盗取的合法实体的IP地址(或在物理世界中的被盗的护照)可能使该罪犯能够通过假装被盗的身份而相对容易地参与恶意行动。然而,通过给物理实体和虚拟实体分配声誉并识别它们可能使用的多个身份,声誉系统可能影响声誉好的实体和声誉差的实体来负责任地操作,以免变得声誉差且不能与其它网络实体交流或交互。The ease of creating and spoofing identities in the virtual and physical worlds can create an incentive for users to act maliciously without bearing the consequences of that action. For example, an IP address of a legitimate entity stolen by a criminal on the Internet (or a stolen passport in the physical world) may enable that criminal to engage in malicious operations with relative ease by pretending to be a stolen identity. However, by assigning reputations to physical and virtual entities and identifying the multiple identities they may use, a reputation system can influence reputable entities as well as poor Entities communicate or interact.

图3是描述通信和实体的例子的结构图,其包括利用用于检测实体之间的关系的标识符和属性。安全代理100a-b可通过检查被送往相关网络的通信来收集数据。安全代理100a-b也可通过检查由相关网络分程传递的通信来收集数据。通信的检查和分析可允许安全代理100a-b收集关于发送和接收消息的实体300a-c的信息,其中包括传输模式、数量(volume)、或实体是否有发送某些类型的消息(例如,合法消息、垃圾邮件、病毒、群发邮件,等等)的倾向。Figure 3 is a block diagram depicting an example of communications and entities, including utilizing identifiers and attributes for detecting relationships between entities. Security agents 100a-b may collect data by inspecting communications sent to relevant networks. Security agents 100a-b may also collect data by inspecting communications relayed by relevant networks. Inspection and analysis of communications may allow security agents 100a-b to gather information about entities 300a-c sending and receiving messages, including transmission patterns, volumes, or whether entities are sending certain types of messages (e.g., legitimate message, spam, virus, mass mailing, etc.).

如图3所示,每个实体300a-c分别与一个或更多个标识符310a-c相关联。标识符310a-c可例如包括IP地址、统一资源定位器(URL)、电话号码、IM用户名、消息内容、域,或可描述实体的任何其它标识符。而且,标识符310a-c与一个或更多个属性320a-c相关联。如应理解的,属性320a-c符合所描述的特定标识符310a-c。例如,消息内容标识符可包括属性,例如恶意软件(malware)、数量、内容类型、运行状态,等等。类似地,与标识符例如IP地址相关联的属性320a-c可包括与实体300a-c相关联的一个或更多个IP地址。As shown in FIG. 3, each entity 300a-c is associated with one or more identifiers 310a-c, respectively. Identifiers 310a-c may include, for example, IP addresses, Uniform Resource Locators (URLs), phone numbers, IM usernames, message content, domains, or any other identifier that may describe an entity. Also, identifiers 310a-c are associated with one or more attributes 320a-c. As should be understood, the attributes 320a-c conform to the particular identifiers 310a-c described. For example, a message content identifier may include attributes such as malware, quantity, content type, operational status, and the like. Similarly, attributes 320a-c associated with identifiers such as IP addresses may include one or more IP addresses associated with entities 300a-c.

此外,应理解,可从通信330a-c(例如,电子邮件)收集的该数据一般包括发起通信的实体的一些标识符和属性。因此,通信330a-c提供用于将关于实体的信息传递到安全代理100a、100b的传送。通过检查包括在消息中的标题信息、分析消息的内容,以及通过汇聚安全代理100a、100b以前收集的信息(例如,合计从实体接收的通信的数量),安全代理100a、100b可检测这些属性。Furthermore, it should be understood that this data that may be collected from communications 330a-c (eg, email) typically includes some identifier and attributes of the entity initiating the communication. Accordingly, the communications 330a-c provide for the transfer of information about entities to the security agents 100a, 100b. Security agents 100a, 100b may detect these attributes by examining header information included in messages, analyzing the content of messages, and by aggregating information previously collected by security agents 100a, 100b (e.g., summing the number of communications received from entities).

可汇聚并利用来自多个安全代理100a、100b的数据。例如,数据可由中央系统汇聚和利用,中央系统接收与所有实体300a-c相关联的标识符和属性,安全代理100a、100b为实体300a-c接收了通信。可选地,彼此传递关于实体300a-c的标识符和属性信息的安全代理100a、100b可作为分布式系统进行操作。利用数据的过程可使实体300a-c的属性彼此关联,从而确定实体300a-c之间的关系(例如,事件出现、数量,和/或其它确定因素之间的关联)。Data from multiple security agents 100a, 100b may be aggregated and utilized. For example, data may be aggregated and utilized by a central system that receives identifiers and attributes associated with all entities 300a-c for which security agents 100a, 100b have received communications. Alternatively, the security agents 100a, 100b communicating identifier and attribute information about the entities 300a-c to each other may operate as a distributed system. The process of utilizing the data may correlate attributes of the entities 300a-c with one another to determine relationships between the entities 300a-c (eg, associations between occurrences, numbers, and/or other determining factors).

这些关系可接着用于根据与每个标识符相关的属性的关联为所有标识符建立多维声誉“矢量”。例如,如果具有声誉差的已知声誉的声誉差的实体300a发送具有第一组属性350a的消息330a,且接着未知实体300b发送具有第二组属性350b的消息330b,则安全代理100a可确定第一组属性350a的全部或一部分是否匹配第二组属性350b的全部或一部分。当第一组属性350a的某个部分匹配第二组属性350b的某个部分时,可根据包括匹配的属性330a、33b的特定标识符320a、320b来建立关系。被发现具有匹配的属性的特定标识符340a、340b可用于确定与实体300a、300b之间的关系相关联的强度。关系的强度可帮助确定声誉差的实体300a的声誉差的性质中有多少被归于未知实体300b的声誉。These relationships can then be used to build a multi-dimensional reputation "vector" for all identifiers based on the association of attributes associated with each identifier. For example, if a reputable entity 300a with a known reputation with a bad reputation sends a message 330a with a first set of attributes 350a, and then an unknown entity 300b sends a message 330b with a second set of attributes 350b, the security agent 100a may determine that the Whether all or a portion of one set of attributes 350a matches all or a portion of a second set of attributes 350b. When some portion of the first set of attributes 350a matches some portion of the second set of attributes 350b, a relationship may be established based on the particular identifier 320a, 320b comprising the matching attributes 330a, 33b. The particular identifiers 340a, 340b that are found to have matching attributes may be used to determine the strength associated with the relationship between the entities 300a, 300b. The strength of the relationship may help determine how much of the poorly reputable nature of the poorly reputable entity 300a is attributed to the reputation of the unknown entity 300b.

然而,还应认识到,未知实体300b可发起包括属性350c的通信330c,属性350c与发源于已知的声誉好的实体300c的通信330d的一些属性350d匹配。被发现具有匹配的属性的特定标识符340c、340d可用于确定与实体300b、300c之间的关系相关联的强度。关系的强度可帮助确定声誉好的实体300c的声誉好的性质中有多少被归于未知实体300b的声誉。However, it should also be appreciated that an unknown entity 300b may initiate a communication 330c that includes attributes 350c that match some attributes 350d of a communication 330d originating from a known reputable entity 300c. The particular identifiers 340c, 340d that are found to have matching attributes may be used to determine the strength associated with the relationship between the entities 300b, 300c. The strength of the relationship may help determine how much of the reputable property of the reputable entity 300c is attributed to the reputation of the unknown entity 300b.

分布式声誉引擎还允许关于最近的威胁前景的全球情报的实时协作共享,对可由过滤或风险分析系统执行的局部分析提供即时保护的益处,以及甚至在可能的新威胁出现之前就识别这种新威胁的恶意来源。使用位于很多不同地理位置处的传感器,可与中央系统200或与分布式安全代理100a、100b一起快速共享关于新威胁的信息。如应理解的,这样的分布式传感器可包括局部安全代理100a、100b,以及局部声誉好的客户机、业务量监控器,或适合于收集通信数据的任何其它设备(例如,开关、路由器、服务器,等等)。Distributed reputation engines also allow real-time collaborative sharing of global intelligence on recent threat landscapes, providing the benefit of immediate protection over localized analysis that can be performed by filtering or risk analysis systems, and identifying possible new threats even before they emerge. The malicious source of the threat. Using sensors located at many different geographic locations, information about new threats can be quickly shared with the central system 200 or with the distributed security agents 100a, 100b. As should be appreciated, such distributed sensors may include local security agents 100a, 100b, as well as local reputable clients, traffic monitors, or any other device suitable for collecting communication data (e.g., switches, routers, servers ,etc).

例如,安全代理100a、100b可与中央系统200进行通信,以提供威胁和声誉信息的共享。可选地,安全代理100a、100b可在彼此之间传递威胁和声誉信息,以提供最新的和准确的威胁信息。在图3的例子中,第一安全代理300a拥有关于未知实体300b和声誉差的实体300a之间的关系的信息,而第二安全代理300b拥有关于未知实体300b和声誉好的实体300c之间的关系的信息。在没有共享信息的情况下,第一安全代理300a可根据所检测的关系对通信采取特定的动作。然而,知道未知实体300b和声誉好的实体300c之间的关系,第一安全代理300a可利用来自未知实体300b的收到的通信来采取不同的动作。安全代理之间的关系信息的共享因而提供更完整的一组关系信息,将针对该关系信息作出确定。For example, security agents 100a, 100b may communicate with central system 200 to provide sharing of threat and reputation information. Optionally, security agents 100a, 100b may communicate threat and reputation information between each other to provide up-to-date and accurate threat information. In the example of FIG. 3, the first security agent 300a has information about the relationship between the unknown entity 300b and the entity 300a with a bad reputation, while the second security agent 300b has information about the relationship between the unknown entity 300b and the entity 300c with a good reputation. relationship information. In the absence of shared information, the first security agent 300a may take specific actions on the communication based on the detected relationship. However, knowing the relationship between the unknown entity 300b and the reputable entity 300c, the first security agent 300a can utilize the received communication from the unknown entity 300b to take different actions. The sharing of relationship information between security agents thus provides a more complete set of relationship information for which determinations are to be made.

系统试图将声誉(反映一般倾向和/或分类)分配给物理实体,例如执行事务的个人或自动化系统。在虚拟世界中,实体由在实体正执行的特定事务(例如,发送消息或从银行帐号转移资金)中联系到这些实体的标识符(例如IP、URL、内容)表示。因此根据那些标识符的总体行为和历史模式以及那些标识符与其它标识符的关系,例如发送消息的IP与包括在那些消息中的URL的关系,声誉可被分配到那些标识符。如果在标识符之间存在强关联,则单个标识符的“差”声誉可能使其它邻近的标识符的声誉恶化。例如,发送具有差声誉的URL的IP将由于URL的声誉而使其自己的声誉恶化。最后,单独的标识符声誉可被汇聚成与那些标识符相关联的实体的单个声誉(风险评分)。Systems attempt to assign reputations (reflecting general tendencies and/or classifications) to physical entities, such as individuals or automated systems performing transactions. In a virtual world, entities are represented by identifiers (eg, IP, URL, content) that are linked to those entities in a particular transaction they are performing (eg, sending a message or transferring funds from a bank account). Reputations can thus be assigned to those identifiers based on their overall behavior and historical patterns and their relationship to other identifiers, eg IPs sending messages to URLs included in those messages. If there are strong associations between identifiers, a "poor" reputation of a single identifier may worsen the reputation of other nearby identifiers. For example, an IP sending a URL with a bad reputation will have its own reputation worsened by the URL's reputation. Finally, individual identifier reputations can be aggregated into a single reputation (risk score) for the entities associated with those identifiers.

应注意,属性可分成很多类别。例如,证据属性可表示关于实体的物理、数字或数字化的物理数据。该数据可归于单个已知或未知的实体,或在多个实体之间共享(形成实体关系)。与消息安全有关的证据属性的例子包括IP(互联网协议)地址、已知的域名、URL、实体所使用的数字指纹或签名、TCP签名,等等。It should be noted that attributes can be divided into many categories. For example, evidence attributes may represent physical, digital, or digitized physical data about an entity. This data can be attributed to a single known or unknown entity, or shared among multiple entities (forming an entity relationship). Examples of evidentiary attributes relevant to message security include IP (Internet Protocol) addresses, known domain names, URLs, digital fingerprints or signatures used by entities, TCP signatures, and the like.

作为另一例子,行为属性可表示关于实体或证据属性的人或机器分配的观测结果。这样的属性可包括来自一个或多个行为参数文件(behavioralprofile)的一个、很多或所有属性。例如,通常与垃圾邮件发送者相关联的行为属性可依据从该实体发送的大量通信。As another example, behavioral attributes may represent human or machine-assigned observations about entities or evidence attributes. Such properties may include one, many or all properties from one or more behavioral profiles. For example, behavioral attributes commonly associated with spammers may depend on the high volume of communications sent from that entity.

用于特定类型的行为的很多行为属性可被合并以得出行为参数文件。行为参数文件可包括一组预定义的行为属性。分配给这些参数文件的属性特征包括与限定匹配参数文件的实体的倾向有关的行为事件。与消息安全有关的行为参数文件的例子可包括“垃圾邮件发送者”、“诈骗者”和“合法发送者”。与每个参数文件相关的事件和/或证据属性限定参数文件应被分配到的适当实体。这可包括特定的一组发送模式、黑名单事件或证据数据的特定属性。一些例子包括:发送者/接收者身份识别;时间间隔和发送模式;有效载荷的严重度(severity)和配置;消息结构;消息质量;协议和相关的签名;通信介质。Many behavior attributes for a particular type of behavior can be combined to derive a behavior profile. A behavior profile may include a set of predefined behavior properties. The attribute characteristics assigned to these profiles include behavioral events related to the propensity of entities that define matching profiles. Examples of behavioral profiles related to message security may include "spammers," "scammers," and "legitimate senders." Event and/or evidence attributes associated with each profile define the appropriate entity to which the profile should be assigned. This could include a specific set of sending patterns, blacklist events, or specific attributes of evidence data. Some examples include: sender/receiver identification; time interval and transmission mode; payload severity and configuration; message structure; message quality; protocol and associated signatures; communication medium.

应理解,共享相同的证据属性中的一些或全部的实体具有证据关系。类似地,共享行为属性的实体具有行为关系。这些关系帮助形成相关参数文件的逻辑组,该关系接着被适应性地应用,以增强参数文件或略微差不多符合所分配的参数文件地来识别实体。It should be understood that entities that share some or all of the same evidence attributes have an evidence relationship. Similarly, entities that share behavioral properties have behavioral relationships. These relationships help form logical groups of related profiles, which relationships are then adaptively applied to enhance the profile or identify entities that more or less conform to the assigned profile.

图4是描述用于检测关系并给实体分配风险的操作方案400的流程图。操作方案在步骤410通过收集网络数据开始。数据收集可例如由安全代理100、客户设备、交换机、路由器或任何其它设备完成,所述其它设备可操作来从网络实体(例如,电子邮件服务器、网络服务器、IM服务器、ISP、文件传输协议(FTP)服务器、gopher服务器、VoIP设备等)接收通信。FIG. 4 is a flowchart describing an operational scheme 400 for detecting relationships and assigning risks to entities. The operational scheme begins at step 410 by collecting network data. Data collection may be accomplished, for example, by a security agent 100, client device, switch, router, or any other device operable to receive data from a network entity (e.g., email server, web server, IM server, ISP, file transfer protocol ( FTP) server, gopher server, VoIP device, etc.) to receive communications.

在步骤420,标识符与所收集的数据(例如通信数据)相关联。步骤420可由可操作来从很多传感器设备汇聚数据的安全代理100或中央系统200执行,包括例如一个或更多个安全代理100。可选地,步骤420可由安全代理100本身执行。标识符可基于所接收的通信的类型。例如,电子邮件可包括一组信息(例如,发起者和收信方的IP地址、文本内容、附件等),而VoIP通信可包括一组不同的信息(例如,主叫电话号码(或如果从VoIP客户发起则为IP地址)、接收的电话号码(或如果指定VoIP电话则为IP地址)、语音内容,等等)。步骤420也可包括分配具有相关标识符的通信的属性。At step 420, an identifier is associated with the collected data (eg, communication data). Step 420 may be performed by a security agent 100 or central system 200 operable to aggregate data from a number of sensor devices, including for example one or more security agents 100 . Optionally, step 420 may be performed by the security agent 100 itself. The identifier may be based on the type of communication received. For example, an email may include one set of information (e.g. IP addresses of sender and recipient, text content, attachments, etc.), while a VoIP communication may include a different set of information (e.g. calling VoIP client originating IP address), receiving phone number (or IP address if VoIP phone is specified), voice content, etc.). Step 420 may also include assigning attributes of communications with associated identifiers.

在步骤430,分析与实体相关联的属性,以确定在实体之间是否存在任何关系,为这些实体收集通信信息。步骤430可例如由中央系统200或一个或更多个分布式安全代理100执行。分析可包括比较与不同实体有关的属性以找到实体之间的关系。而且,根据作为关系的基础的特定属性,强度可与关系相关联。At step 430, attributes associated with the entities are analyzed to determine whether any relationships exist between the entities for which communication information is collected. Step 430 may be performed, for example, by the central system 200 or one or more distributed security agents 100 . Analysis may include comparing attributes related to different entities to find relationships between entities. Also, strength can be associated with a relationship according to the particular attribute that underlies the relationship.

在步骤440,风险矢量被分配给实体。作为例子,风险矢量可由中央系统200或一个或更多个安全代理100分配。分配给实体130(图1-2)、300(图3)的风险矢量可基于在实体之间存在的关系,并基于形成关系的基础的标识符。At step 440, risk vectors are assigned to entities. Risk vectors may be assigned by the central system 200 or one or more security agents 100 as examples. The risk vectors assigned to the entities 130 (FIGS. 1-2), 300 (FIG. 3) may be based on the relationships that exist between the entities and on the identifiers that form the basis of the relationships.

在步骤450,可根据风险矢量执行动作。该动作可例如由安全代理100执行。可对与实体相关联的收到的通信执行动作,风险矢量被分配给该实体。其中,所述动作可包括允许、拒绝、隔离、负载均衡、以所分配的优先级传输、以额外的细查局部地进行分析。然而,应理解,可单独地得到声誉矢量。At step 450, actions may be performed based on the risk vector. This action may be performed by security agent 100, for example. Actions can be performed on received communications associated with the entity to which the risk vector is assigned. Among other things, the actions may include allowing, denying, quarantining, load balancing, transmitting with assigned priority, and locally analyzing with additional scrutiny. However, it should be understood that the reputation vector can be obtained separately.

图5是示出示例性网络体系结构的结构图,其包括由局部声誉引擎510a-e得到的局部声誉500a-e和一个或更多个服务器530所储存的全局声誉520。局部声誉引擎510a-e例如可与局部安全代理,例如安全代理100相关联。可选地,局部声誉引擎510a-e可例如与本地客户机相关联。声誉引擎510a-e中的每个包括一个或更多个实体的列表,声誉引擎510a-e为这些实体储存所得到的声誉500a-e。5 is a block diagram illustrating an exemplary network architecture including local reputations 500a-e derived by local reputation engines 510a-e and global reputations 520 stored by one or more servers 530. FIG. Local reputation engines 510a-e may be associated with a local security agent, such as security agent 100, for example. Alternatively, a local reputation engine 510a-e may be associated with a local client, for example. Each of the reputation engines 510a-e includes a list of one or more entities for which the reputation engines 510a-e store the resulting reputations 500a-e.

然而,这些储存的得到的声誉在声誉引擎之间可能是不一致的,因为每个声誉引擎可观察到不同类型的业务量。例如,声誉引擎1510a可包括指示特定实体是声誉好的声誉,而声誉引擎2510b可包括指示同一实体是声誉差的声誉。这些局部的声誉不一致性可基于从实体接收的不同业务量。可选地,不一致性可基于来自局部声誉引擎1510a的用户的、指示通信是合法的反馈,而局部声誉引擎2510b提供指示同一通信是不合法的反馈。However, these stored resulting reputations may be inconsistent across reputation engines, since each reputation engine may observe different types of traffic. For example, reputation engine 1 510a may include a reputation indicating that a particular entity is reputable, while reputation engine 2 510b may include a reputation indicating that the same entity is not reputable. These localized reputation inconsistencies may be based on different traffic volumes received from entities. Alternatively, the inconsistency may be based on feedback from users of the local reputation engine 1510a indicating that the communication is legitimate, while the local reputation engine 2510b provides feedback indicating that the same communication is not legitimate.

服务器530从局部声誉引擎510a-e接收声誉信息。然而,如上所述,一些局部声誉信息可能与其它局部声誉信息不一致。服务器530可在局部声誉500a-e之间进行仲裁,以根据局部声誉信息500a-e确定全局声誉520。在一些例子中,全局声誉信息520可接着被提供回局部声誉引擎510a-e,以给这些引擎510a-e提供最新的声誉信息。可选地,局部声誉引擎510a-e可操作来查询服务器530以得到声誉信息。在一些例子中,服务器530使用全局声誉信息520响应于查询。Server 530 receives reputation information from local reputation engines 510a-e. However, as noted above, some partial reputation information may not be consistent with other partial reputation information. Server 530 may arbitrate among local reputations 500a-e to determine global reputation 520 based on local reputation information 500a-e. In some examples, the global reputation information 520 may then be provided back to the local reputation engines 510a-e to provide these engines 510a-e with up-to-date reputation information. Optionally, local reputation engines 510a-e are operable to query server 530 for reputation information. In some examples, server 530 responds to queries using global reputation information 520 .

在其它例子中,服务器530将局部声誉偏置(bias)应用到全局声誉520。局部声誉偏置可对全局声誉执行变换,以给局部声誉引擎510a-e提供全局声誉矢量,其根据发起查询的特定局部声誉引擎510a-e的偏好而进行偏置。因此,管理员或用户对垃圾邮件消息指示高容忍度(tolerance)的局部声誉引擎510a可接收解释所指示的容忍度的全局声誉矢量。返回到声誉引擎510a的声誉矢量的特定分量可能包括由于与声誉矢量的其余部分的关系而降低重要性的声誉矢量的部分。同样,局部声誉引擎510b可接收放大与病毒声誉有关的声誉矢量的分量的声誉矢量,局部声誉引擎510b指示例如来自具有发起病毒的声誉的实体的低容忍度通信。In other examples, server 530 applies a local reputation bias to global reputation 520 . Local reputation biasing may perform a transformation on the global reputation to provide the local reputation engines 510a-e with global reputation vectors that are biased according to the preferences of the particular local reputation engine 510a-e originating the query. Thus, a local reputation engine 510a that an administrator or user has indicated a high tolerance for spam messages may receive a global reputation vector that accounts for the indicated tolerance. Certain components of the reputation vector returned to the reputation engine 510a may include portions of the reputation vector that are less important due to their relationship to the rest of the reputation vector. Likewise, local reputation engine 510b may receive a reputation vector that amplifies a component of a reputation vector related to virus reputation, local reputation engine 510b indicating, for example, a low tolerance communication from an entity with a reputation of originating a virus.

图6是示出基于局部声誉反馈的全局声誉的确定的结构图。局部声誉引擎600可操作来通过网络610向服务器620发送查询。在一些例子中,局部声誉引擎600响应于从未知实体接收通信而发起查询。可选地,局部声誉引擎600可响应于接收任何通信而发起查询,从而促进更加新的声誉信息的使用。FIG. 6 is a block diagram illustrating determination of global reputation based on local reputation feedback. Local reputation engine 600 is operable to send queries to server 620 over network 610 . In some examples, local reputation engine 600 initiates a query in response to receiving a communication from an unknown entity. Optionally, local reputation engine 600 may initiate a query in response to receiving any communications, thereby facilitating the use of more up-to-date reputation information.

服务器620可操作来使用全局声誉确定响应于查询。中央服务器620可使用全局声誉汇聚引擎630得到全局声誉。全局声誉汇聚引擎630可操作来从相应的多个局部声誉引擎接收多个局部声誉640。在一些例子中,多个局部声誉640可由声誉引擎周期性地发送到服务器620。可选地,多个局部声誉640可由服务器在从局部声誉引擎600中之一接收到查询时取回。Server 620 is operable to respond to queries using global reputation determinations. The central server 620 can use the global reputation aggregation engine 630 to obtain the global reputation. The global reputation aggregation engine 630 is operable to receive a plurality of local reputations 640 from a corresponding plurality of local reputation engines. In some examples, number of local reputations 640 may be periodically sent to server 620 by reputation engine. Optionally, multiple local reputations 640 may be retrieved by the server upon receiving a query from one of the local reputation engines 600 .

使用与每个局部声誉引擎有关的置信值(confidence value)并接着积累结果,可合并局部声誉。置信值可指示与相关声誉引擎所产生的局部声誉相关联的置信度。与个人相关联的声誉引擎例如可接收在全局声誉确定中较低的权重。相反,与在大型网络上操作的声誉引擎相关联的局部声誉可根据与该声誉引擎相关联的置信值接收全局声誉确定中较大的权重。The partial reputations can be merged using a confidence value associated with each partial reputation engine and then accumulating the results. The confidence value may indicate a degree of confidence associated with the local reputation generated by the relevant reputation engine. A reputation engine associated with an individual, for example, may receive a lower weight in the global reputation determination. Conversely, a local reputation associated with a reputation engine operating on a large network may receive greater weight in the global reputation determination based on the confidence value associated with that reputation engine.

在一些例子中,置信值650可基于从用户接收的反馈。例如,可给接收很多反馈的声誉引擎分配与该声誉引擎相关的局部声誉640的低置信值650,这些反馈指示通信未被正确地处理,因为与通信相关的局部声誉信息640指示错误的动作。类似地,可给接收反馈的声誉引擎分配与该声誉引擎相关的局部声誉640的高置信值650,该反馈根据局部声誉信息640指示通信被正确地处理,局部声誉信息640与指示正确的动作的通信相关联。与不同声誉引擎相关联的置信值的调整可使用调节器660来完成,调节器660可操作来接收输入信息并根据所接收的输入调节置信值。在一些例子中,根据被储存的用于被错误地分类的实体的统计资料,置信值650可由声誉引擎本身提供到服务器620。在其它例子中,用于对局部声誉信息加权的信息可被传递到服务器620。In some examples, confidence value 650 may be based on feedback received from a user. For example, a reputation engine may be assigned a low confidence value 650 for the local reputation 640 associated with the reputation engine that receives many feedbacks indicating that the communication was not handled correctly because the local reputation information 640 associated with the communication indicated erroneous actions. Similarly, a reputation engine may be assigned a high confidence value 650 for a local reputation 640 associated with the reputation engine receiving feedback indicating that the communication was handled correctly based on the local reputation information 640, which is consistent with the local reputation information 640 indicating correct action. Communication is associated. Adjustment of confidence values associated with different reputation engines may be accomplished using adjuster 660 operable to receive input information and adjust the confidence value based on the received input. In some examples, the confidence value 650 may be provided to the server 620 by the reputation engine itself, based on stored statistics for misclassified entities. In other examples, information used to weight local reputation information may be communicated to server 620 .

在一些例子中,偏置670可应用于最终形成的全局声誉矢量。偏置670可标准化声誉矢量,以向声誉引擎600提供标准化的全局声誉矢量。可选地,可应用偏置670以解释与发起声誉查询的声誉引擎600相关的局部偏好。因此,声誉引擎600可接收与查询的声誉引擎600的确定的偏好匹配的全局声誉矢量。声誉引擎600可根据从服务器620接收的全局声誉矢量对通信采取动作。In some examples, a bias 670 may be applied to the resulting global reputation vector. Bias 670 may normalize the reputation vector to provide reputation engine 600 with a normalized global reputation vector. Optionally, a bias 670 may be applied to account for local preferences related to the reputation engine 600 originating the reputation query. Accordingly, the reputation engine 600 may receive a global reputation vector that matches the determined preferences of the queried reputation engine 600 . Reputation engine 600 may take action on communications based on the global reputation vector received from server 620 .

图7是示出全局声誉和局部声誉之间的示例性转化的结构图。局部安全代理700与服务器720进行通信,以从服务器720取回全局声誉信息。局部安全代理700可在702接收通信。局部安全代理可在704关联通信以识别消息的属性。消息的属性可包括例如发端实体、消息内容的指纹、消息大小,等等。局部安全代理700在对服务器720的查询中包括该信息。在其它例子中,局部安全代理700可将整个消息转发到服务器720,且服务器可执行消息的关联和分析。FIG. 7 is a block diagram illustrating an exemplary conversion between global reputation and local reputation. Local security agent 700 communicates with server 720 to retrieve global reputation information from server 720 . Local security agent 700 can receive a communication at 702 . The local security agent can correlate the communication at 704 to identify attributes of the message. Attributes of a message may include, for example, an originating entity, a fingerprint of the message content, a message size, and the like. Local security agent 700 includes this information in queries to server 720 . In other examples, local security agent 700 can forward the entire message to server 720, and the server can perform correlation and analysis of the messages.

服务器720使用从查询接收的信息,来根据服务器720的配置725确定全局声誉。配置725可包括多个声誉信息,包括指示被查询的实体是声誉差的信息(730)和指示被查询的实体是声誉好的信息(735)。配置725也可将权重740应用于每个汇聚的声誉730、735。声誉得分确定器745可提供用于给汇聚的声誉信息730、735加权(740)并产生全局声誉矢量的引擎。The server 720 uses the information received from the query to determine the global reputation according to the configuration 725 of the server 720 . Configuration 725 may include a plurality of reputation information, including information indicating that the queried entity is of poor reputation (730) and information indicating that the queried entity is of good reputation (735). Configuration 725 may also apply weights 740 to each aggregated reputation 730 , 735 . The reputation score determiner 745 may provide an engine for weighting ( 740 ) the aggregated reputation information 730 , 735 and generating a global reputation vector.

局部安全代理700接着在706向局部声誉引擎发送查询。局部声誉引擎708执行局部声誉的确定并在710返回局部声誉矢量。局部安全代理700也接收以全局声誉矢量形式的、对发送到服务器720的声誉查询的响应。局部安全代理700接着在712将局部声誉矢量和全局声誉矢量混合在一起。接着在714关于所接收的消息采取动作。The local security agent 700 then sends a query at 706 to the local reputation engine. The local reputation engine 708 performs the determination of the local reputation and returns a local reputation vector at 710 . Local security agent 700 also receives responses to reputation queries sent to server 720 in the form of global reputation vectors. The local security agent 700 then blends the local reputation vector and the global reputation vector together at 712 . Action is then taken at 714 with respect to the received message.

图8是用于调整与声誉服务器相关联的过滤器的设置的示例性图形用户界面800。图形用户界面800可允许局部安全代理的用户在一些不同的类别810,例如“病毒”、“蠕虫”、“特洛伊木马”、“网络钓鱼”、“间谍软件”、“垃圾邮件”、“内容”和“群发”中调整局部过滤器的配置。然而,应理解,所述类别810只是例子,且本公开不限于在这里被选为例子的类别810。FIG. 8 is an example graphical user interface 800 for adjusting settings of filters associated with reputation servers. The graphical user interface 800 may allow the user of the local security agent to sort through a number of different categories 810, such as "viruses", "worms", "trojan horses", "phishing", "spyware", "spam", "content" And adjust the configuration of local filters in "Mass". It should be understood, however, that the categories 810 described are examples only, and that the present disclosure is not limited to the categories 810 selected here as examples.

在一些例子中,类别810可分成两种或更多类型的类别。例如,图8的类别810分成类别810的“安全设置”类型820以及类别的“策略设置”类型830。在每个类别810和类型820、830中,混合器条形表示840可允许用户调整与通信或实体声誉的相应类别810相关联的特定过滤器设置。In some examples, categories 810 may be divided into two or more types of categories. For example, category 810 of FIG. 8 is divided into a "Security Settings" type 820 of category 810 and a "Policy Settings" type 830 of category. Within each category 810 and type 820, 830, a mixer bar representation 840 may allow a user to adjust specific filter settings associated with the corresponding category 810 of communications or entity reputation.

而且,虽然“策略设置”类型830的类别810可根据用户自己的判断被自由调节,但是“安全设置”类型820的类别可被限制到在一范围内调整。可产生该差别,以便阻止用户更改安全代理的安全设置超过可接受的范围。例如,不满意的雇员可能试图降低安全设置,从而允许企业网易受攻击。因此,在“安全设置”类型820中置于类别810上的范围850可操作来在将安全保持在最低水平,以防止网络被危害。然而,如应注意的,“策略设置”类型830的类别810是不危害网络安全的那些类型的类别810,而是如果设置降低可能只是使用户或企业不方便。Also, while the category 810 of the 'policy setting' type 830 can be freely adjusted according to the user's own judgment, the category of the 'security setting' type 820 can be restricted to be adjusted within a range. This difference can be made to prevent users from changing the security settings of the security agent beyond acceptable limits. For example, a dissatisfied employee may attempt to lower security settings, thereby allowing the corporate NetEase to be attacked. Accordingly, a scope 850 placed on a category 810 in the "Security Settings" type 820 is operable to keep security at a minimum level to prevent the network from being compromised. However, as should be noted, the categories 810 of the "policy setting" type 830 are those categories 810 of types that do not compromise network security, but may simply inconvenience users or businesses if the settings are lowered.

此外,应认识到,在各种例子中,范围限制850可置于全部类别810上。因此,局部安全代理将阻止用户将混合器条形表示840设置在所提供的范围850之外。还应注意,在一些例子中,范围可不显示在图形用户界面800上。替代地,范围850将被从图形用户界面800提取出来,且所有设置将为相关的设置。因此,类别800可显示并看起来似乎允许设置的满范围,同时将设置变换成在所提供的范围内的设置。例如,“病毒”类别810的范围850在本例中被设置在水平标记8和13之间。如果图形用户界面800设置成从图形用户界面800提取出可允许的范围850,则“病毒”类别810将允许混合器条形表示840设置在0和14之间的任何位置。然而,图形用户界面800可将0-14设置变换成在8到13的范围850内的设置。因此,如果用户请求在0和14之间中间的设置,则图形用户界面可将该设置变换成在8和13中间的设置。Furthermore, it should be appreciated that range limitations 850 may be placed on all categories 810 in various examples. Therefore, the local security agent will prevent the user from setting the mixer bar representation 840 outside the range 850 provided. It should also be noted that in some examples, the range may not be displayed on the graphical user interface 800 . Instead, the scope 850 will be extracted from the graphical user interface 800, and all settings will be related settings. Thus, the category 800 can display and appear to allow the full range of settings while transforming the settings to settings within the range provided. For example, the range 850 for the "virus" category 810 is set between horizontal markers 8 and 13 in this example. If the GUI 800 is set to extract the allowable range 850 from the GUI 800, the "Virus" category 810 will allow the mixer bar representation 840 to be set anywhere between 0 and 14. However, the graphical user interface 800 may transform the 0-14 setting to a setting within the range 850 of 8-13. Thus, if the user requests a setting intermediate between 0 and 14, the graphical user interface may transform the setting to a setting intermediate 8 and 13.

图9是示出用于互联网协议语音电话(VoIP)或短消息服务(SMS)通信的基于声誉的连接抑制的结构图。如应理解的,主叫IP电话900可向接收的IP电话910安排VoIP呼叫。这些IP电话900、910可以是例如计算机执行的软电话软件、网络支持的电话,等等。主叫IP电话900可通过网络920(例如互联网)安排VoIP呼叫。接收的IP电话910可通过局域网930(例如企业网)接收VoIP呼叫。9 is a block diagram illustrating reputation-based connection suppression for Voice over Internet Protocol (VoIP) or Short Message Service (SMS) communications. As should be appreciated, the calling IP phone 900 can place a VoIP call to the receiving IP phone 910 . These IP phones 900, 910 may be, for example, computer-executed softphone software, web-enabled phones, or the like. The calling IP phone 900 can place a VoIP call through a network 920 (eg, the Internet). The receiving IP phone 910 may receive the VoIP call over a local area network 930 (eg, an enterprise network).

当建立VoIP呼叫时,主叫IP电话已建立与局域网930的连接。该连接可与电子邮件、网络、即时消息或其它互联网应用可被用于提供与网络的未调节(unregulated)的连接的方式类似被使用。因此,可使用与接收的IP电话的连接,从而根据所建立的连接使在局域网930上操作的计算机940、950处于入侵、病毒、特洛伊木马、蠕虫和各种其它类型的攻击的危险中。而且,由于VoIP通信的时间敏感性质,一般不检查这些通信,以确保没有误用连接。例如,语音会话实时地发生。如果语音会话的一些分组被延迟,则会话变得不自然且难以理解。因此,一旦建立了连接,就一般不能检查分组的内容。When establishing a VoIP call, the calling IP phone has already established a connection with the LAN 930 . This connection can be used similarly to the way email, web, instant messaging or other Internet applications can be used to provide an unregulated connection to a network. Thus, the connection to the receiving IP phone can be used, thereby exposing the computers 940, 950 operating on the local area network 930 to the risk of intrusions, viruses, Trojan horses, worms, and various other types of attacks depending on the connection established. Also, due to the time-sensitive nature of VoIP communications, these communications are generally not checked to ensure that the connection is not being misused. For example, voice conversations occur in real time. If some packets of a voice conversation are delayed, the conversation becomes unnatural and difficult to understand. Therefore, once a connection is established, it is generally not possible to inspect the contents of the packets.

然而,局部安全代理960可使用从声誉引擎或服务器970接收的声誉信息来确定与主叫IP电话相关的声誉。局部安全代理960可使用发端实体的声誉来确定是否允许与发端实体的连接。因此,安全代理960可防止与声誉差的实体的连接,如不遵守局部安全代理960的策略的声誉所指示的。However, the local security agent 960 can use the reputation information received from the reputation engine or server 970 to determine the reputation associated with the calling IP phone. Local security proxy 960 may use the originating entity's reputation to determine whether to allow a connection with the originating entity. Accordingly, security proxy 960 may prevent connections to entities with poor reputations, as indicated by reputations that do not comply with local security proxy 960 policies.

在一些例子中,局部安全代理960可包括连接抑制引擎,其可操作来使用在主叫IP电话900和接收的IP电话910之间建立的连接来控制正被传输的分组的流动速率。因此,可允许具有差声誉的发端实体900产生与接收的IP电话910的连接。然而,分组通过量将被定上限,从而防止发端实体900使用连接来攻击局域网930。可选地,连接抑制可通过执行从声誉差的实体发起的任何分组的详细检查来完成。如上所述,所有VoIP分组的详细检查不是有效的。因此,可为与声誉好的实体相关联的连接最大化服务质量(QoS),同时减少与声誉差的实体的连接相关联的QoS。可对与声誉差的实体相关联的连接执行标准通信询问技术,以便发行从发端实体接收的任何被传输的分组是否包括对网络930的威胁。在美国专利号6,941,467、7,089,590、7,096,498和7,124,438中以及在美国专利申请号2006/0015942、2006/0015563、2003/0172302、2003/0172294、2003/0172291和2003/0173166中描述了各种询问技术和系统,由此以上这些通过引用被并入。In some examples, local security agent 960 may include a connection suppression engine operable to use the connection established between calling IP phone 900 and receiving IP phone 910 to control the flow rate of packets being transmitted. Therefore, an originating entity 900 with a poor reputation may be allowed to make a connection with a receiving IP phone 910 . However, the packet throughput will be capped, preventing the originating entity 900 from using the connection to attack the LAN 930 . Alternatively, connection suppression may be accomplished by performing a scrutiny of any packets originating from entities with a bad reputation. As mentioned above, scrutiny of all VoIP packets is not efficient. Accordingly, quality of service (QoS) may be maximized for connections associated with entities with a good reputation, while reducing QoS associated with connections with entities with a poor reputation. Standard communication interrogation techniques may be performed on connections associated with disreputable entities to issue whether any transmitted packets received from the originating entity include threats to the network 930 . Various interrogation techniques and systems are described in U.S. Patent Nos. 6,941,467, 7,089,590, 7,096,498, and 7,124,438 and in U.S. Patent Application Nos. , which are hereby incorporated by reference above.

图10是示出基于声誉的负载均衡器1000的操作的结构图。负载均衡器1000可操作来通过网络1030(例如互联网)(分别地)从声誉好的实体1010和声誉差的实体1020接收通信。负载均衡器1000与声誉引擎1040进行通信,以确定与进入或传出的通信相关联的实体1010、1020的声誉。FIG. 10 is a block diagram illustrating the operation of a reputation-based load balancer 1000 . The load balancer 1000 is operable to receive communications from reputable entities 1010 and unreputable entities 1020 (respectively) over a network 1030 (eg, the Internet). The load balancer 1000 communicates with the reputation engine 1040 to determine the reputation of the entities 1010, 1020 associated with incoming or outgoing communications.

声誉引擎1030可操作来给负载均衡器提供声誉矢量。声誉矢量可以各种不同的类别指示与通信相关联的实体1010、1020的声誉。例如,就发起垃圾邮件的实体1010、1020而言,声誉矢量可指示实体1010、1020的良好声誉,同时就发起病毒的实体1010、1020而言,也指示相同实体1010、1020的差声誉。The reputation engine 1030 is operable to provide a reputation vector to the load balancer. The reputation vector may indicate the reputation of the entity 1010, 1020 associated with the communication in a variety of different categories. For example, a reputation vector may indicate a good reputation of an entity 1010, 1020 for a spam originating entity 1010, 1020 while also indicating a poor reputation of the same entity 1010, 1020 for a virus originating entity 1010, 1020.

负载均衡器1000可使用声誉矢量来确定关于与实体1010、1020相关联的通信执行什么动作。在声誉好的实体1010与通信相关联的情况下,消息被发送到消息传输代理(MTA)1050并被传输给接收者1060。The load balancer 1000 can use the reputation vector to determine what action to take with respect to communications associated with the entities 1010, 1020. Where a reputable entity 1010 is associated with a communication, the message is sent to a message transfer agent (MTA) 1050 and transmitted to a recipient 1060 .

在声誉差的实体1020拥有病毒的声誉但没有其它类型的声誉差的活动的声誉的情况下,通信被转发到多个病毒检测器1070中之一。负载均衡器1000可操作来根据病毒检测器的当前容量和发端实体的声誉来确定使用多个病毒检测器1070中的哪一个。例如,负载均衡器1000可将通信发送到被最少利用的病毒检测器。在其它例子中,负载均衡器1000可确定与发端实体相关联的差声誉度,并将声誉稍微差的通信发送到被最少利用的病毒检测器,同时将声誉非常差的通信发送到被高度利用的病毒检测器,从而抑制与声誉非常差的实体相关联的连接的QoS。Where the reputable entity 1020 has a reputation for viruses but not other types of reputable activity, the communication is forwarded to one of the plurality of virus detectors 1070 . The load balancer 1000 is operable to determine which of the plurality of virus detectors 1070 to use based on the current capacity of the virus detectors and the reputation of the originating entity. For example, load balancer 1000 may send communications to the least utilized virus detectors. In other examples, the load balancer 1000 may determine a poor reputation associated with the originating entity, and send communications with a slightly poor reputation to the least utilized virus detectors, while sending communications with a very poor reputation to the highly exploited A virus detector that suppresses QoS for connections associated with entities with very bad reputations.

类似地,在声誉差的实体1020有发起垃圾邮件通信的声誉但没有其它类型的声誉差的活动的声誉的情况下,负载均衡器可将通信发送到专门的垃圾邮件检测器1080以排除其它类型的测试。应理解,在通信与发起多种类型的声誉差的活动的声誉差的实体1020相关联的情况下,可发送通信以测试已知实体1020要显示的每种类型的声誉差的活动,同时避免与不知道实体1020要显示的声誉差的活动相关联的测试。Similarly, where a poorly reputable entity 1020 has a reputation for initiating spam communications but no reputation for other types of poorly reputable activity, the load balancer can send the communication to a dedicated spam detector 1080 to exclude other types of test. It should be appreciated that where a communication is associated with a reputable entity 1020 that initiates multiple types of reputable activity, the communication may be sent to test each type of reputable activity that the entity 1020 is known to exhibit, while avoiding A test associated with activities that do not know the poor reputation of the entity 1020 to display.

在一些例子中,每个通信可接收用于多种类型的不合法内容的例行测试。然而,当与通信相关联的实体1020显示某些类型的活动的声誉时,通信也可被隔离以用于内容的详细测试隔离,实体显示对于发起该内容的声誉。In some examples, each communication may receive routine tests for multiple types of illegal content. However, communications may also be isolated for detailed testing isolation of content when the entity 1020 associated with the communication exhibits a reputation for certain types of activity that the entity exhibits a reputation for originating that content.

在又一些例子中,每个通信可接收相同类型的测试。然而,与声誉好的实体1010相关联的通信被发送到有最短队列的测试模块或具有空闲的处理容量的测试模块。另一方面,与声誉差的实体1020相关联的通信被发送到有最长队列的测试模块1070、1080。因此,与声誉好的实体1010相关联的通信可接受超过与声誉差的实体相关联的通信的传输优先权。因此对于声誉好的实体1010,服务质量被最大化,同时对于声誉差的实体1020,服务质量被降低。因此,基于声誉的负载平衡可通过降低声誉差的实体连接到网络930的能力来保护网络免于攻击。In yet other examples, each communication may receive the same type of test. However, communications associated with reputable entities 1010 are sent to the test module with the shortest queue or the test module with spare processing capacity. On the other hand, communications associated with entities 1020 with a poor reputation are sent to the test modules 1070, 1080 with the longest queues. Accordingly, communications associated with entities with a good reputation 1010 may be given priority for transmission over communications associated with entities with a poor reputation. The quality of service is thus maximized for entities 1010 with a good reputation, while the quality of service is reduced for entities 1020 with a bad reputation. Thus, reputation-based load balancing can protect the network from attacks by reducing the ability of entities with poor reputations to connect to the network 930 .

图11A是示出用于收集基于地理位置的数据以进行身份验证分析的示例性操作方案的流程图。在步骤1100,操作方案从各种登录尝试收集数据。步骤1100可例如由局部安全代理,例如图1的安全代理100执行。其中,所收集的数据可包括与登录尝试相关联的IP地址、登录尝试的时间、在成功之前的登陆尝试的次数,或所尝试的任何不成功的口令的详细资料。所收集的数据接着在步骤1105被分析,以得出统计信息,例如登录尝试的地理位置。步骤1105可例如由声誉引擎执行。接着在步骤1110与登录尝试相关联的统计信息被储存。该储存可例如由系统数据存储器执行。11A is a flowchart illustrating an exemplary operational scheme for collecting geographic location-based data for authentication analysis. At step 1100, the operating scheme collects data from various login attempts. Step 1100 may be performed, for example, by a local security agent, such as security agent 100 of FIG. 1 . Among other things, the data collected may include the IP address associated with the login attempt, the time of the login attempt, the number of login attempts before being successful, or details of any unsuccessful passwords attempted. The collected data is then analyzed at step 1105 to derive statistical information, such as the geographic location of the login attempt. Step 1105 may be performed, for example, by a reputation engine. Then at step 1110 statistical information associated with the login attempts is stored. This storage may be performed, for example, by system data storage.

图11B是示出用于基于地理位置的身份验证的另一示例性操作方案的流程图。在步骤1115接收登录尝试。登录尝试可例如由可操作来通过网络提供安全财务数据的安全网络服务器接收。接着在步骤1120确定登录尝试是否匹配所储存的用户名和口令组合。步骤1120可例如由可操作来验证登录尝试的安全服务器执行。如果用户名和口令不匹配所存储的用户名/口令组合,则在步骤1125宣布登录尝试失败。FIG. 11B is a flowchart illustrating another exemplary operational scheme for geographic location-based authentication. At step 1115 a login attempt is received. A login attempt may be received, for example, by a secure web server operable to provide secure financial data over a network. It is then determined at step 1120 whether the login attempt matches the stored username and password combination. Step 1120 may be performed, for example, by a security server operable to authenticate login attempts. If the username and password do not match the stored username/password combination, then at step 1125 the login attempt is declared failed.

然而,如果用户名和口令确实匹配合法用户名/口令组合,则在步骤1130确定登录尝试的起源。登录尝试的起源可由如图1所示的局部安全代理100确定。可选地,登录尝试的起源可由声誉引擎确定。登录尝试的起源可接着与在图11A中得出的统计信息比较,如在步骤1135中示出的。步骤1135可例如由局部安全代理100或声誉引擎执行。在步骤1140确定起源是否与统计期望匹配。如果实际起源匹配统计期望,则在步骤1145验证用户。However, if the username and password do match a legitimate username/password combination, then at step 1130 the origin of the login attempt is determined. The origin of the login attempt may be determined by a local security agent 100 as shown in FIG. 1 . Optionally, the origin of the login attempt can be determined by a reputation engine. The origin of the login attempts may then be compared to the statistics derived in FIG. 11A , as shown in step 1135 . Step 1135 may be performed, for example, by local security agent 100 or a reputation engine. At step 1140 it is determined whether the origin matches statistical expectations. If the actual origin matches the statistical expectation, then at step 1145 the user is authenticated.

可选地,如果实际起源不匹配对于起源的统计期望,则在步骤1150执行进一步的处理。应理解,进一步的处理可包括从用户请求进一步的信息,以验证他或她的真实性。这样的信息可包括例如家庭地址、母亲的婚前姓、出生地点,或关于用户已知的任何其它部分的信息(例如秘密问题)。额外处理的其它例子可包括搜索以前的登录尝试,以确定当前登录尝试的地点是否确实是异常的或仅仅是巧合的。此外,与发起登录尝试的实体相关联的声誉可被得出并用于确定是否允许登录。Optionally, further processing is performed at step 1150 if the actual origin does not match the statistical expectation for origin. It should be understood that further processing may include requesting further information from the user to verify his or her authenticity. Such information may include, for example, home address, mother's maiden name, place of birth, or information about any other part known to the user (such as a secret question). Other examples of additional processing may include searching previous login attempts to determine whether the location of the current login attempt is indeed anomalous or merely coincidental. Additionally, the reputation associated with the entity that initiated the login attempt can be derived and used to determine whether to allow the login.

图11C是示出用于使用发端实体的声誉进行基于地理位置的验证以确认身份验证的另一示例性操作方案的流程图。在步骤1115接收登录尝试。登录尝试可例如由可操作来通过网络提供安全财务数据的安全网络服务器接收。接着在步骤1160确定登录尝试是否匹配所储存的用户名和口令组合。步骤1160可例如由可操作来验证登录尝试的安全服务器执行。如果用户名和口令不匹配所存储的用户名/口令组合,则在步骤1165宣布登录尝试失败。11C is a flowchart illustrating another exemplary operational scheme for geolocation-based verification using an originating entity's reputation to confirm authentication. At step 1115 a login attempt is received. A login attempt may be received, for example, by a secure web server operable to provide secure financial data over a network. It is then determined at step 1160 whether the login attempt matches the stored username and password combination. Step 1160 may be performed, for example, by a security server operable to authenticate login attempts. If the username and password do not match the stored username/password combination, then at step 1165 the login attempt is declared failed.

然而,如果用户名和口令确实匹配合法的用户名/口令组合,则在步骤1170确定登录尝试的起源。登录尝试的起源可由如图1所示的局部安全代理100确定。可选地,登录尝试的起源可由声誉引擎确定。接着可取回与发起登录尝试的实体相关联的声誉,如在步骤1175中示出的。步骤1175可例如由声誉引擎执行。在步骤1180确定发端实体的声誉是否是声誉好的。如果发端实体是声誉好的,则在步骤1185验证用户身份。However, if the username and password do match a legitimate username/password combination, then at step 1170 the origin of the login attempt is determined. The origin of the login attempt may be determined by a local security agent 100 as shown in FIG. 1 . Optionally, the origin of the login attempt can be determined by a reputation engine. The reputation associated with the entity that initiated the login attempt may then be retrieved, as shown in step 1175 . Step 1175 may be performed, for example, by a reputation engine. At step 1180 it is determined whether the reputation of the originating entity is reputable. If the originating entity is reputable, then at step 1185 the user's identity is verified.

可选地,如果发端实体是声誉差的,则在步骤1190执行进一步的处理。应理解,进一步的处理可包括从用户请求进一步的信息,以验证他或她的真实性。这样的信息可包括例如家庭地址、母亲的婚前姓、出生地点,或关于用户已知的任何其它部分的信息(例如秘密问题)。额外处理的其它例子可包括搜索以前的登录尝试,以确定当前登录尝试的地点是否确实是异常的或仅仅是巧合的。Optionally, further processing is performed at step 1190 if the originating entity is reputable. It should be understood that further processing may include requesting further information from the user to verify his or her authenticity. Such information may include, for example, home address, mother's maiden name, place of birth, or information about any other part known to the user (such as a secret question). Other examples of additional processing may include searching previous login attempts to determine whether the location of the current login attempt is indeed anomalous or merely coincidental.

因此,应理解,可应用声誉系统来识别金融交易中的欺诈行为。声誉系统可根据交易发起者的声誉或实际交易中的数据(来源、目的地、金额,等等)来提高交易的风险评分。在这样的情况下,金融机构可根据发端实体的声誉更好地确定特定交易是欺骗性的概率。Accordingly, it should be understood that a reputation system may be applied to identify fraudulent behavior in financial transactions. A reputation system can improve a transaction's risk score based on the reputation of the transaction originator or data from the actual transaction (source, destination, amount, etc.). In such cases, the financial institution can better determine the probability that a particular transaction is fraudulent based on the reputation of the originating entity.

图12是示出用于基于声誉的动态隔离的示例性操作方案的流程图。在步骤1200接收通信。接着在步骤1205分析通信,以确定它们是否与未知实体相关联。然而应注意,该操作方案可应用于所接收的任何通信,而不仅仅是从以前的未知实体接收的通信。例如,从声誉差的实体接收的通信可被动态地隔离,直到确定了所接收的通信不对网络造成威胁为止。在通信不与新实体相关联的场合,通信经历对进入的通信的正常处理,如在步骤1210中示出的。12 is a flowchart illustrating an exemplary operational scheme for reputation-based dynamic isolation. At step 1200 a communication is received. Communications are then analyzed at step 1205 to determine if they are associated with an unknown entity. It should be noted, however, that this operational scheme is applicable to any communication received, not just communications received from previously unknown entities. For example, communications received from entities with a bad reputation may be dynamically quarantined until it is determined that the received communications do not pose a threat to the network. Where the communication is not associated with a new entity, the communication undergoes normal processing for incoming communications, as shown in step 1210 .

如果通信与新实体相关联,则在步骤1215初始化动态隔离计数器。接着在步骤1220,从新实体接收的通信被发送到动态隔离。接着在步骤1225检查计数器以确定计数器的时间是否已经过去了。如果计数器的时间没有过去,则在步骤1230递减计数器。在步骤1235可分析实体的行为以及被隔离的通信。在步骤1240确定实体的行为或被隔离的通信是否是异常的。如果没有发现异常情况,则操作方案返回到步骤1220,在这里隔离新的通信。If the communication is associated with a new entity, then at step 1215 a dynamic isolation counter is initialized. Next at step 1220, communications received from the new entity are sent to the dynamic quarantine. The counter is then checked at step 1225 to determine whether the counter's time has elapsed. If the counter time has not elapsed, then at step 1230 the counter is decremented. At step 1235, the behavior of the entities and isolated communications may be analyzed. At step 1240 it is determined whether the entity's behavior or quarantined communications are anomalous. If no abnormal conditions are found, the operational scheme returns to step 1220 where new communications are quarantined.

然而,如果在步骤1240发现实体的行为或通信是异常的,则在步骤1245给实体分配声誉差的声誉。通过将通知发送到管理员或发端实体所发送的通信的接收者来结束过程。However, if at step 1240 the entity's behavior or communications are found to be anomalous, then at step 1245 the entity is assigned a reputation of poor reputation. The process ends by sending a notification to the administrator or recipient of the communication sent by the originating entity.

返回到步骤1220,隔离和检查通信和实体行为的过程继续进行,直到发现异常行为为止,或直到在步骤1225动态的隔离计数器的时间过去为止。如果动态的隔离计数器的时间过去了,则在步骤1255给实体分配声誉。可选地,在实体不是未知实体的情况下,在步骤1245或1255可更新声誉。在步骤1260通过释放动态隔离来结束该操作方案,其中动态的隔离计数器的时间已经过去,而在通信中或在发端实体的行为中没有发现异常情况。Returning to step 1220, the process of isolating and examining communications and entity behavior continues until anomalous behavior is found, or until the time of the dynamic quarantine counter at step 1225 elapses. If the dynamic quarantine counter time elapses, then at step 1255 the entity is assigned a reputation. Optionally, the reputation may be updated at step 1245 or 1255 where the entity is not an unknown entity. The operational scheme ends at step 1260 by releasing the dynamic quarantine, where the dynamic quarantine counter time has elapsed without finding anomalies in the communication or in the behavior of the originating entity.

图13是可被分类为不想要的图像或消息的图像垃圾邮件通信的示例性图形用户界面1300的显示。如应理解的,图像垃圾邮件对传统垃圾邮件过滤器造成问题。图像垃圾邮件通过将垃圾邮件的文本消息转换成图像格式来绕过垃圾邮件的传统文本分析。图13示出图像垃圾邮件的例子。消息显示图像1310。虽然图像1300看起来是文本,但它仅仅是文本消息的图形编码。一般地,图像垃圾邮件也包括文本消息1320,文本消息1320包括被正确地构造的但在消息背景下没有意义的句子。消息1320设计成躲避接通通信的垃圾邮件过滤器,在该通信内只包括图像1310。而且,消息1320设计成欺骗滤波器,这些滤波器对包括图像1310的通信的文本应用粗略的测试。进一步地,当这些消息确实在头部1330中包括关于消息的起源的信息时,用于发出图像垃圾邮件的实体的声誉可能是未知的,直到该实体被发觉发送图像垃圾邮件为止。13 is a display of an example graphical user interface 1300 for image spam communications that may be classified as unwanted images or messages. As should be appreciated, image spam poses problems for traditional spam filters. Image spam bypasses traditional text analysis of spam by converting the spam's text message into an image format. Fig. 13 shows an example of image spam. The message displays image 1310 . Although image 1300 appears to be text, it is merely a graphical encoding of a text message. Typically, image spam also includes text messages 1320 that include sentences that are correctly constructed but do not make sense in the context of the message. Message 1320 is designed to evade spam filters for incoming communications in which only image 1310 is included. Furthermore, message 1320 is designed to spoof filters that apply crude tests to the text of communications including image 1310 . Further, when these messages do include information in header 1330 about the origin of the message, the reputation of the entity for image spamming may be unknown until the entity is caught image spamming.

图14是示出用于检测不想要的图像(例如,图像垃圾邮件)的示例性操作方案的流程图。应理解,附图14中所示的很多步骤可单独地或结合附图14中所示的其它步骤中的任何一个或全部来执行,以提供图像垃圾邮件的某种检测。然而,附图14中的每个步骤的使用提供了用于检测图像垃圾邮件的全面的过程。14 is a flowchart illustrating an exemplary operational scheme for detecting unwanted images (eg, image spam). It should be understood that many of the steps shown in FIG. 14 may be performed alone or in combination with any or all of the other steps shown in FIG. 14 to provide some detection of image spam. However, the use of each step in Figure 14 provides a comprehensive process for detecting image spam.

过程在步骤1400以通信的分析开始。步骤1400一般包括分析通信,以确定通信是否包括受到图像垃圾邮件处理的图像。在步骤1410,操作方案执行通信的结构分析,以确定图像是否包括垃圾邮件。接着在步骤1420分析图像的头部。图像头部的分析允许系统确定关于图像格式本身是否存在异常情况(例如,协议错误、讹误,等等)。在步骤1430分析图像的特征。特征分析旨在确定图像的任何特征是否是异常的。The process begins at step 1400 with the analysis of communications. Step 1400 generally includes analyzing the communication to determine whether the communication includes images that are subject to image spam. At step 1410, the operational scheme performs a structural analysis of the communication to determine whether the image comprises spam. Next at step 1420 the header of the image is analyzed. Analysis of the image headers allows the system to determine whether there are anomalies (eg, protocol errors, corruption, etc.) with respect to the image format itself. At step 1430 the image is analyzed for features. Feature analysis aims to determine whether any feature of an image is anomalous.

可在步骤1440标准化图像。图像的标准化一般包括移除可能被垃圾邮件发送者添加以避免图像指纹识别技术的随机噪声。图像标准化旨在将图像转换成在图像中可容易比较的格式。可对被标准化的图像执行指纹分析,以确定图像是否匹配来自以前接收的已知图像垃圾邮件的图像。The images may be normalized at step 1440 . Normalization of images generally involves removing random noise that may be added by spammers to avoid image fingerprinting techniques. Image normalization aims to convert images into a format that is easily comparable across images. Fingerprinting may be performed on the normalized images to determine if the images match images from previously received known image spam.

图15A是示出用于分析通信的结构的操作方案的流程图。操作方案在步骤1500以消息结构的分析开始。在步骤1505,分析通信的超文本标记语言(HTML)结构,以引入n-元文法(n-gram)标记作为贝叶斯分析的额外符号(token)。这样的处理可为异常情况分析包括在图像垃圾邮件通信中的文本1320。可分析消息的HTML结构,以定义元令牌(meta-token)。元令牌是消息的HTML内容,其被处理以丢弃任何不相关的HTML标记,并通过移除白空区而被压缩以生成用于贝叶斯分析的“符号”。上述符号中的每个可用作对贝叶斯分析的输入,以与以前接收的通信比较。15A is a flowchart illustrating an operational scheme for analyzing the structure of a communication. The operational scheme begins at step 1500 with the analysis of the message structure. At step 1505, the hypertext markup language (HTML) structure of the communication is analyzed to introduce n-gram tags as additional tokens for Bayesian analysis. Such processing may analyze text 1320 included in image spam communications for anomalies. The HTML structure of the message may be analyzed to define meta-tokens. The meta-token is the HTML content of the message, which is processed to discard any irrelevant HTML markup, and compressed by removing white space to generate a "symbol" for Bayesian analysis. Each of the above symbols can be used as input to a Bayesian analysis for comparison with previously received communications.

操作方案接着在步骤1515包括图像检测。图像检测可包括将图像分割成多个部分,以及对这些部分执行指纹识别来确定指纹是否匹配以前接收的图像的部分。The operational protocol then includes image detection at step 1515 . Image detection may include segmenting the image into portions, and performing fingerprinting on the portions to determine whether the fingerprint matches previously received portions of the image.

图15B是示出用于下述过程的操作方案的流程图,即分析图像的特征,以提取用于输入到聚类引擎(clustering engine)中的消息的特征,以便识别符合已知图像垃圾邮件的图像的组成部分。操作方案在步骤1520开始,在这里图像的多个高水平特征被检测,以用在机器学习算法中。这样的特征可包括数值,例如独特的颜色的数量、噪声黑色像素(noise black pixel)的数量、水平方向中边缘(形状之间的锐转变)的数量,等等。Figure 15B is a flowchart illustrating an operational scheme for the process of analyzing features of an image to extract features for messages input into a clustering engine in order to identify messages consistent with known image spam components of the image. The operational scheme begins at step 1520, where a number of high level features of the image are detected for use in a machine learning algorithm. Such features may include numerical values such as the number of distinct colors, the number of noise black pixels, the number of edges (sharp transitions between shapes) in the horizontal direction, and the like.

操作方案所提取的特征之一可包括图像的柱状图模式的数量,如在步骤1525示出的。通过检查图像的光谱密度来产生模式的数量。如应理解的,人工图像一般包括比自然图像少的模式,这是因为自然图像颜色一般扩散到广谱(broad spectrum)。One of the features extracted by the operational protocol may include the number of histogram patterns of the image, as shown at step 1525 . The number of modes is generated by examining the spectral density of the image. As should be appreciated, artificial images generally include fewer patterns than natural images because natural image colors generally spread over a broad spectrum.

如上所述,从图像提取的特征可用于识别异常情况。在一些例子中,异常情况可包括分析消息的特征以确定多个特征与所储存的不想要的图像的特征的相似性的程度。可选地,在一些例子中,也可分析图像特征,以与已知的声誉好的图像比较,以确定与声誉好的图像的相似性。应理解,单独的所提取的特征都不能决定分类。例如,特定的特征可与60%的不想要的消息相关联,同时也与40%的想要的消息相关联。而且,当与特征相关联的数值变化时,消息是想要的或是不想要的概率可能变化。有很多可指示轻微倾向的特征。如果合并这些特征中的每个,则图像垃圾邮件检测系统可进行分类决定。As mentioned above, features extracted from images can be used to identify anomalies. In some examples, the anomaly may include analyzing features of the message to determine a degree of similarity of the features to features of the stored unwanted image. Optionally, in some examples, image features may also be analyzed for comparison with known reputable images to determine similarity to reputable images. It should be understood that none of the extracted features alone can determine the classification. For example, a particular characteristic may be associated with 60% of unwanted messages while also being associated with 40% of wanted messages. Also, as the value associated with a feature changes, the probability that a message is wanted or unwanted may change. There are many characteristics that can indicate a slight tendency. If each of these features is combined, an image spam detection system can make a classification decision.

接着在步骤1530检查高宽比,以确定关于图像尺寸或高宽比的是否存在任何异常情况。图像尺寸或高宽比与已知图像垃圾邮件所共有的已知尺寸或高宽比的相似性可指示这种在高宽比中的异常情况。例如,图像垃圾邮件能够以特定的尺寸出现,以使图像垃圾邮件看起来更像普通电子邮件。包括下述图像的消息更可能是垃圾邮件本身,即这些图像与已知垃圾邮件图像享有共同的尺寸。可选地,存在不有利于垃圾邮件的图像尺寸(例如,如果垃圾邮件发送者将消息插入图像中,则1英寸x1英寸的正方形图像可能是难以读取的)。已知不利于垃圾邮件的插入的包括图像的消息较不可能是图像垃圾邮件。因此,消息的高宽比可与在图像垃圾邮件中使用的共同的高宽比进行比较,以确定图像是不想要的图像或图像是声誉好的图像的概率。The aspect ratio is then checked at step 1530 to determine if there are any anomalies with respect to image size or aspect ratio. Similarity of image dimensions or aspect ratios to known dimensions or aspect ratios common to known image spam may indicate such anomalies in aspect ratios. For example, image spam can appear at a specific size to make image spam look more like regular email. Messages that include images that share dimensions with known spam images are more likely to be spam itself. Optionally, there are image sizes that are not conducive to spam (eg, a 1 inch by 1 inch square image may be difficult to read if a spammer inserts a message into the image). Messages including images that are known to be detrimental to the insertion of spam are less likely to be image spam. Thus, the aspect ratio of the message may be compared to common aspect ratios used in image spam to determine the probability that the image is an unwanted image or that the image is a reputable image.

在步骤1535,检查图像的频率分布。一般地,自然图像有具有相对少的明显的频率梯度(gradation)的均匀频率分布。另一方面,图像垃圾邮件一般包括常变的频率分布,这是因为黑色字母被放置在黑暗背景上。因此,这样的不均匀的频率分布可指示图像垃圾邮件。At step 1535, the frequency distribution of the image is checked. In general, natural images have a uniform frequency distribution with relatively few significant frequency gradients. Image spam, on the other hand, generally includes a constant frequency distribution because black letters are placed on a dark background. Therefore, such an uneven frequency distribution may be indicative of image spam.

在步骤1540,可分析信噪比。高信噪比可指示垃圾邮件发送者可能试图通过将噪声引入图像中来躲避指纹识别技术。由此增加噪声水平可指示图像是不想要的图像的概率增加。At step 1540, the signal-to-noise ratio may be analyzed. A high signal-to-noise ratio can indicate that spammers may be trying to evade fingerprinting techniques by introducing noise into the image. Thus increasing the noise level may indicate an increased probability that the image is an unwanted image.

应理解,可在整个图像的规模上提取一些特征,而可从图像的子部分提取其它特征。例如,图像可被细分成多个子部分。每个矩形可使用快速付立叶变换(FFT)变换到频域中。在被变换的图像中,在多个方向上的频率的优势(predominance)可作为特征被提取。也可检查所变换的图像的这些子部分,以确定高频和低频的数量。在被变换的图像中,离原点较远的点表现出较高的频率。类似于其它被提取的特征,这些特征可接着与已知的合法和不想要的图像比较,以确定未知图像与每个类型的已知图像共享哪些特性。而且,被变换的(例如频域)图像也可分成子部分(例如,片段(slice)、矩形、同心圆,等等),并与来自已知图像(例如,已知的不想要的图像和已知的合法的图像)的数据比较。It should be understood that some features may be extracted on the scale of the entire image, while other features may be extracted from sub-portions of the image. For example, an image may be subdivided into sub-sections. Each rectangle can be transformed into the frequency domain using a Fast Fourier Transform (FFT). In the transformed image, the predominance of frequencies in multiple directions can be extracted as features. These sub-portions of the transformed image can also be examined to determine the amount of high and low frequencies. In the transformed image, points farther from the origin exhibit higher frequencies. Like other extracted features, these features can then be compared to known legitimate and unwanted images to determine which characteristics the unknown image shares with each type of known image. Furthermore, the transformed (e.g. frequency domain) image can also be divided into sub-parts (e.g. slices, rectangles, concentric circles, etc.) known legitimate images) for data comparison.

图15C是示出用于标准化图像以用于垃圾邮件处理的的操作方案的流程图。在步骤1545,从图像除去模糊和噪声。如前所述,这些可能由垃圾邮件发送者引入来躲避指纹识别技术,例如通过改变无用信息的总数的散列法,使得它不与任何以前接收的已知图像垃圾邮件的无用信息的指纹匹配。模糊和噪声的移除可描述用于除去垃圾邮件发送者所引入的人为噪声的几种技术。应理解,人为噪声可包括垃圾邮件发送者所使用的技术,例如条带效应(其中包括在图像中的字体变化,以改变图像的无用信息)。Figure 15C is a flowchart illustrating an operational scheme for normalizing images for spam handling. At step 1545, blur and noise are removed from the image. As mentioned earlier, these may be introduced by spammers to evade fingerprinting techniques, e.g. by changing the hashing of the hash count so that it does not match any previously received hash fingerprints of known image spam . Blur and Noise Removal describes several techniques for removing the artifacts introduced by spammers. It should be understood that artifacts may include techniques used by spammers, such as banding (which includes font changes in an image to alter the meaning of the image).

在步骤1550,边缘检测算法可在标准化的图像上执行。在一些例子中,被进行边缘检测的图像被使用并提供到光学字符识别引擎,以将被进行边缘检测的图像转换成文本。边缘检测可用于从图片除去不必要的细节,该细节可能在相对于其他图像处理该图像中造成低效率。At step 1550, an edge detection algorithm may be performed on the normalized image. In some examples, the edge-detected image is used and provided to an optical character recognition engine to convert the edge-detected image into text. Edge detection can be used to remove unnecessary detail from a picture that may cause inefficiencies in processing that image relative to other images.

在步骤1555,可应用中值滤波。应用中值滤波来除去随机的像素噪声。这样的随机像素可对图像的内容分析造成问题。中值滤波可帮助除去垃圾邮件发送者所引入的单像素类型的噪声。应理解,单像素噪声由垃圾邮件发送者使用图像编辑器引入,以改变图像中的一个或多个像素,这可使图像在一些区域中看起来呈颗粒状的,从而使图像更难以检测。At step 1555, median filtering may be applied. Apply a median filter to remove random pixel noise. Such random pixels can pose problems for content analysis of images. Median filtering helps remove single-pixel type noise introduced by spammers. It should be understood that single-pixel noise is introduced by spammers using image editors to alter one or more pixels in an image, which can make the image look grainy in some areas, making the image more difficult to detect.

在步骤1560,量化图像。图像的量化除去不必要的颜色信息。这种颜色信息一般需要更多的处理,并与垃圾邮件的试图传播无关。而且,垃圾邮件发送者可稍微改变图像中的颜色方案,并再次改变杂乱信息,以便已知图像垃圾邮件的杂乱信息不匹配从颜色变化的图像垃圾邮件得出的杂乱信息。At step 1560, the image is quantized. Quantization of the image removes unnecessary color information. This color information generally requires more processing and has nothing to do with the attempted spread of spam. Also, the spammer can slightly change the color scheme in the image, and change the hash again, so that the hash of known image spam does not match the hash derived from color-changed image spam.

在步骤1565,执行对比度扩展。使用对比度扩展,图像中的颜色标度从黑到白被最大化,即使颜色只在灰度阴影中变化也是如此。给图像的最亮的阴影分配白值,而给图像中最暗的阴影分配黑值。与原始图像中最亮和最暗的阴影相比,给所有其它阴影分配他们在光谱(spectrum)中的相对位置。对比度扩展帮助限定图像中可能没有充分利用可用光谱的细节,因而可帮助阻止垃圾邮件发送者使用不同部分的光谱来避免指纹识别技术。垃圾邮件发送者有时故意改变图像的密度范围,以使一些类型的特征识别引擎无效。对比度扩展也可帮助标准化图像,以便它可与其它图像比较,以识别包含在图像中的共同特征。At step 1565, contrast extension is performed. With contrast expansion, the color scale in the image is maximized from black to white, even if the colors vary only in shades of gray. Assigns white values to the brightest shadows of the image, and black values to the darkest shadows in the image. All other shadows are assigned their relative positions in the spectrum compared to the lightest and darkest shadows in the original image. Contrast expansion helps limit details in an image that may not be fully utilizing the available spectrum, thus helping to stop spammers from using different parts of the spectrum to avoid fingerprinting techniques. Spammers sometimes intentionally alter the density range of images to invalidate some types of feature recognition engines. Contrast expansion can also help normalize an image so that it can be compared with other images to identify common features contained in the images.

图15D是示出用于分析图像的指纹以在多个图像中找到共同片段的操作方案的流程图。在步骤1570,操作方案通过界定图像内的区域开始。接着对所界定的区域执行风选算法(winnowing algorithm),以识别图像的相关部分,在步骤1575应在该图像上提取指纹。在步骤1580,操作方案对从风选操作得到的片段进行指纹识别,并确定在所接收的图像和已知垃圾邮件图像的指纹之间是否存在匹配。在每个专利申请公布号2006/0251068中描述了类似的风选指纹识别方法,该专利由此通过引用被并入。15D is a flowchart illustrating an operational scheme for analyzing fingerprints of images to find common segments in multiple images. At step 1570, the operational protocol begins by defining a region within the image. A winnowing algorithm is then performed on the defined area to identify the relevant portion of the image on which the fingerprint should be extracted at step 1575. At step 1580, the operational scheme fingerprints the segments resulting from the winnowing operation and determines whether there is a match between the fingerprints of the received image and known spam images. A similar winnowing fingerprinting method is described in each of Patent Application Publication No. 2006/0251068, which is hereby incorporated by reference.

如这里在说明书中使用的且在接下来的全部权利要求中,“一(a)”、“一个(an)”和“所述(the)”的意思包括复数涵义,除非上下文另外清楚地指出。此外,如这里在说明书中使用的且在接下来的全部权利要求中,“在…中”的意思包括、“在…中”和“在…上”,除非上下文另外清楚地指出。最后,如这里在说明书中使用的且在接下来的全部权利要求中,“和”和“或”的意思包括联合的和分离的涵义,并可互换地使用,除非上下文另外清楚地指出。As used herein in the specification and in all the claims that follow, the meanings of "a", "an" and "the" include plural reference unless the context clearly dictates otherwise . Furthermore, as used herein in the specification and in all the claims that follow, the meaning of "in" includes, "in" and "on" unless the context clearly dictates otherwise. Finally, as used herein in the specification and throughout the claims that follow, the meanings of "and" and "or" include both combined and disjunctive meanings and are used interchangeably unless the context clearly dictates otherwise.

范围可在这里表示为从“大约”一个特定的值和/或到“大约”另一特定的值。当表示这样的范围时,另一实施方式包括从一个特定的值和/或到另一特定的值。类似地,当值被表示为近似值时,通过使用前面的“大约”,应理解,特定的值形成另一实施方式。应进一步理解,每个范围的端点相对于另一端点来说是重要的,并独立于另一端点。Ranges can be expressed herein as from "about" one particular value, and/or to "about" another particular value. When such a range is expressed, another embodiment includes from the one particular value and/or to the other particular value. Similarly, when values are expressed as approximations, by use of the preceding "about," it will be understood that the particular value forms another embodiment. It is further to be understood that the endpoints of each range are relative to, and independent of, the other endpoints.

描述了本发明的很多实施方式。然而,应理解,可进行各种更改,而不偏离本发明的实质和范围。因此,其它实施方式处于下面的权利要求的范围内。A number of embodiments of the invention have been described. However, it should be understood that various changes may be made without departing from the spirit and scope of the invention. Accordingly, other implementations are within the scope of the following claims.

Claims (135)

1.一种计算机实现的方法,其可操作来将声誉分配给与超文本传输协议通信相关联的基于网络的实体,所述方法包括以下步骤:1. A computer-implemented method operable to assign a reputation to a network-based entity associated with a hypertext transfer protocol communication, the method comprising the steps of: 在边缘保护设备处接收超文本传输协议通信;receiving hypertext transfer protocol communications at the edge protection device; 识别与所接收的所述超文本传输协议通信相关联的实体;identifying an entity associated with the received hypertext transfer protocol communication; 查询声誉引擎以得到与所述实体相关联的声誉指示符;querying a reputation engine for a reputation indicator associated with said entity; 从所述声誉引擎接收所述声誉指示符;receiving the reputation indicator from the reputation engine; 根据与所述实体相关联的所接收的所述声誉指示符,来关于所述超文本传输协议通信采取动作。An action is taken with respect to the hypertext transfer protocol communication based on the received reputation indicator associated with the entity. 2.如权利要求1所述的方法,其中所述实体是包括目的地统一资源定位符、域或IP地址的网络实体。2. The method of claim 1, wherein the entity is a network entity comprising a destination uniform resource locator, domain or IP address. 3.如权利要求1所述的方法,其中所述实体的声誉基于从所述实体接收的以前的通信以及可得到的关于所述实体的公共或专用网络信息,所述公共或专用网络信息包括所有权或托管信息。3. The method of claim 1, wherein the entity's reputation is based on previous communications received from the entity and available public or private network information about the entity, the public or private network information including Ownership or Escrow Information. 4.如权利要求3所述的方法,其中所述以前的通信包括下述项中的一个或更多个:电子消息、超文本传输协议通信、即时消息、文件传输协议通信、简单对象访问协议消息、实时传输协议分组、短消息服务通信、多媒体消息服务通信,或互联网协议语音电话通信。4. The method of claim 3, wherein the previous communications include one or more of the following: electronic messaging, hypertext transfer protocol communications, instant messaging, file transfer protocol communications, Simple Object Access Protocol messages, real-time transport protocol packets, short message service communications, multimedia message service communications, or voice over internet protocol telephony communications. 5.如权利要求1所述的方法,其中所述动作是丢弃所述通信并通知与所述超文本传输协议通信相关联的企业网用户。5. The method of claim 1, wherein the action is discarding the communication and notifying an intranet user associated with the hypertext transfer protocol communication. 6.如权利要求1所述的方法,其中所述实体与多种不同类型的网络通信相关联,所述网络通信包括至少超文本传输协议类型的通信,以及包括电子邮件通信、文件传输协议通信、即时消息通信、gopher通信、短消息服务通信或互联网协议语音电话通信中的至少一个。6. The method of claim 1, wherein the entity is associated with a plurality of different types of network communications including at least Hypertext Transfer Protocol type communications, and including email communications, file transfer protocol communications , instant message communication, gopher communication, short message service communication or voice over internet protocol communication. 7.如权利要求1所述的方法,其中所述声誉引擎根据与所述实体相关联的声誉好的标准和与所述实体相关联的声誉差的标准的汇聚来确定所述声誉指示符。7. The method of claim 1, wherein the reputation engine determines the reputation indicator based on an aggregation of reputation-worthy criteria associated with the entity and reputation-bad criteria associated with the entity. 8.如权利要求7所述的方法,其中所述声誉指示符是根据多个不同的标准来指示声誉的矢量的。8. The method of claim 7, wherein the reputation indicator is a vector indicating reputation according to a plurality of different criteria. 9.如权利要求8所述的方法,进一步包括检查声誉矢量,以根据所述实体的声誉矢量来确定与所述边缘保护设备所保护的企业网相关联的策略是否允许与所述实体的通信。9. The method of claim 8, further comprising examining a reputation vector to determine whether a policy associated with an enterprise network protected by the edge protection device permits communication with the entity based on the entity's reputation vector . 10.如权利要求1所述的方法,其中所述声誉引擎是可操作来给多个边缘保护设备提供声誉信息的声誉服务器。10. The method of claim 1, wherein the reputation engine is a reputation server operable to provide reputation information to a plurality of edge protection devices. 11.如权利要求10所述的方法,其中所述声誉引擎可操作来储存全局声誉指示符,并在输出所述声誉指示符之前使用局部偏置来偏置所述全局声誉指示符。11. The method of claim 10, wherein the reputation engine is operable to store a global reputation indicator and to bias the global reputation indicator using a local bias before outputting the reputation indicator. 12.如权利要求1所述的方法,其中所述声誉指示符包括声誉矢量,所述声誉矢量包括所述实体的多维分类。12. The method of claim 1, wherein the reputation indicator comprises a reputation vector comprising a multidimensional classification of the entity. 13.如权利要求12所述的方法,其中所述多维分类包括以色情文学类别、新闻类别、计算机类别、安全类别、网络钓鱼类别、间谍软件类别、病毒类别或攻击类别中的两个或更多个进行的消息的分类。13. The method of claim 12, wherein the multi-dimensional classification comprises two or more of a pornography category, a news category, a computer category, a security category, a phishing category, a spyware category, a virus category, or an attack category. Classification of multiple ongoing messages. 14.如权利要求12所述的方法,其中所述声誉指示符进一步包括与所述实体的所述多维分类中的每一个相关联的置信度。14. The method of claim 12, wherein the reputation indicator further comprises a confidence level associated with each of the multidimensional classifications of the entity. 15.如权利要求1所述的方法,进一步包括检测统一资源定位符的随机化。15. The method of claim 1, further comprising detecting randomization of Uniform Resource Locators. 16.如权利要求15所述的方法,其中通过产生所述统一资源定位符的杂乱信息并比较所述杂乱信息与以前识别的声誉差的统一资源定位符,来确定所述统一资源定位符的随机化。16. The method of claim 15, wherein the URL of the URL is determined by generating a hash of the URL and comparing the hash to previously identified URLs of poor reputation. randomize. 17.如权利要求15所述的方法,其中通过对所述统一资源定位符的多个部分进行指纹识别并比较所述杂乱信息与以前识别的声誉差的统一资源定位符,来确定所述统一资源定位符的随机化。17. The method of claim 15, wherein the uniform resource locator is determined by fingerprinting portions of the uniform resource locator and comparing the clutter to previously identified URLs of poor reputation. Randomization of resource locators. 18.一种在边缘保护设备上的网络声誉系统,所述网络声誉系统可操作来接收网络通信并向与所述通信相关联的实体分配声誉,所述系统包括:18. A network reputation system on an edge protection device, the network reputation system operable to receive network communications and assign reputations to entities associated with the communications, the system comprising: 通信接口,其可操作来接收网络通信;a communication interface operable to receive network communications; 通信分析器,其可操作来分析所述网络通信以确定与所述网络通信相关联的实体;a communication analyzer operable to analyze the network communication to determine entities associated with the network communication; 声誉引擎,其可操作来根据以前收集的与所述实体相关联的数据来提供与所述实体相关联的声誉,以及a reputation engine operable to provide a reputation associated with the entity based on previously collected data associated with the entity, and 决策引擎,其可操作来从所述声誉引擎接收声誉指示符,并确定所述网络通信是否被传递到接收者。a decision engine operable to receive a reputation indicator from the reputation engine and determine whether the network communication was delivered to a recipient. 19.如权利要求18所述的系统,其中所述实体的所述声誉基于从所述实体接收的以前的通信,所述以前的通信包括下述项中的一个或更多个:电子消息、超文本传输协议通信、即时消息、文件传输协议通信、简单对象访问协议消息、实时传输协议分组、短消息服务通信、或互联网协议语音电话通信。19. The system of claim 18, wherein the reputation of the entity is based on previous communications received from the entity, the previous communications including one or more of the following: electronic messages, Hypertext transfer protocol communications, instant messaging, file transfer protocol communications, simple object access protocol messages, real-time transport protocol packets, short message service communications, or voice over internet protocol communications. 20.如权利要求18所述的系统,其中所述决策引擎可操作来在所述通信没有传输到所述接收者的情况下通知与所述超文本传输协议通信相关联的企业网用户。20. The system of claim 18, wherein the decision engine is operable to notify an intranet user associated with the hypertext transfer protocol communication if the communication is not transmitted to the recipient. 21.如权利要求18所述的系统,其中所述声誉引擎根据与所述实体相关联的声誉好的标准和与所述实体相关联的声誉差的标准来确定所述声誉指示符。21. The system of claim 18, wherein the reputation engine determines the reputation indicator based on criteria of a good reputation associated with the entity and criteria of a bad reputation associated with the entity. 22.如权利要求21所述的系统,其中所述声誉指示符是根据多个不同的标准指示声誉的矢量。22. The system of claim 21, wherein the reputation indicator is a vector indicating reputation according to a plurality of different criteria. 23.如权利要求22所述的系统,进一步包括检查声誉矢量,以根据所述实体的声誉矢量确定与所述边缘保护设备所保护的企业网相关联的策略是否允许与所述实体的通信。23. The system of claim 22, further comprising examining a reputation vector to determine whether a policy associated with an enterprise network protected by the edge protection device permits communication with the entity based on the entity's reputation vector. 24.如权利要求18所述的系统,其中所述声誉引擎是可操作来给多个边缘保护设备提供声誉信息的声誉服务器,并且所述声誉引擎可操作来储存全局声誉指示符,以及在输出所述声誉指示符之前使用局部偏置来偏置所述全局声誉指示符。24. The system of claim 18, wherein the reputation engine is a reputation server operable to provide reputation information to a plurality of edge protection devices, and the reputation engine is operable to store a global reputation indicator, and to output The reputation indicator previously biased the global reputation indicator using a local bias. 25.如权利要求18所述的系统,进一步包括询问引擎,所述询问引擎可操作来对所述通信执行多个测试并确定与所述网络通信相关联的参数文件。25. The system of claim 18, further comprising a query engine operable to perform a plurality of tests on the communication and determine a profile associated with the network communication. 26.如权利要求25所述的系统,其中所述决策引擎可操作来根据与所述网络通信相关联的所述参数文件来确定是否转发所述网络通信。26. The system of claim 25, wherein the decision engine is operable to determine whether to forward the network communication based on the profile associated with the network communication. 27.如权利要求26所述的系统,其中所述声誉引擎可操作来使用所述参数文件更新与所述实体相关联的声誉信息。27. The system of claim 26, wherein the reputation engine is operable to use the profile to update reputation information associated with the entity. 28.如权利要求18所述的系统,其中所述声誉包括声誉矢量,所述声誉矢量包括所述实体的多维分类。28. The system of claim 18, wherein the reputation comprises a reputation vector comprising a multidimensional classification of the entity. 29.如权利要求28所述的系统,其中所述多维分类包括以色情文学类别、新闻类别、计算机类别、安全类别、网络钓鱼类别、间谍软件类别、病毒类别或攻击类别中的两个或更多个进行的消息的分类。29. The system of claim 28 , wherein the multi-dimensional classification includes two or more of pornography categories, news categories, computer categories, security categories, phishing categories, spyware categories, virus categories, or attack categories. Classification of multiple ongoing messages. 30.如权利要求28所述的系统,其中所述声誉进一步包括与所述实体的所述多维分类中的每一个相关联的置信度。30. The system of claim 28, wherein the reputation further includes a confidence level associated with each of the multidimensional classifications of the entity. 31.如权利要求18所述的系统,进一步包括检测统一资源定位符的随机化。31. The system of claim 18, further comprising detecting randomization of Uniform Resource Locators. 32.如权利要求31所述的方法,其中通过产生所述统一资源定位符的杂乱信息并比较所述杂乱信息与以前识别的声誉差的统一资源定位符,来确定所述统一资源定位符的随机化。32. The method of claim 31 , wherein the URL of the URL is determined by generating a hash of the URL and comparing the hash to previously identified URLs of poor reputation. randomize. 33.如权利要求31所述的方法,其中通过对所述统一资源定位符的多个部分进行指纹识别并比较所述杂乱信息与以前识别的声誉差的统一资源定位符,来确定所述统一资源定位符的随机化。。33. The method of claim 31 , wherein the uniform Randomization of resource locators. . 34.具有软件程序代码的一个或更多个计算机可读介质,所述软件程序代码可操作来向与所接收的通信相关联的发送消息的实体分配声誉,所述软件程序代码包括:34. One or more computer-readable media having software program code operable to assign a reputation to a sending entity associated with a received communication, the software program code comprising: 在边缘保护设备处接收超文本传输协议通信;receiving hypertext transfer protocol communications at the edge protection device; 识别与所接收的所述超文本传输协议通信相关联的实体;identifying an entity associated with the received hypertext transfer protocol communication; 查询声誉引擎以得到与所述实体相关联的声誉指示符;querying a reputation engine for a reputation indicator associated with said entity; 从所述声誉引擎接收所述声誉指示符;receiving the reputation indicator from the reputation engine; 根据与所述实体相关联的所接收的所述声誉指示符,关于所述超文本传输协议通信采取行动。An action is taken with respect to the hypertext transfer protocol communication based on the received reputation indicator associated with the entity. 35.一种声誉系统,所述系统包括:35. A reputation system, said system comprising: 集中式声誉引擎,其可操作来从多个局部声誉引擎接收反馈,所述多个局部声誉引擎可操作来根据一个或更多个实体以及分别地相关联的所述局部声誉引擎而确定局部声誉;a centralized reputation engine operable to receive feedback from a plurality of local reputation engines operable to determine local reputations from one or more entities and the respectively associated local reputation engines ; 汇聚引擎,其可操作来根据多个局部声誉的汇聚得到被查询的实体的全局声誉;以及an aggregation engine operable to derive the global reputation of the queried entity from the aggregation of multiple local reputations; and 其中所述集中式声誉引擎可操作来响应于从所述局部声誉引擎中的一个或更多个接收声誉查询而向所述局部声誉引擎中的所述一个或更多个提供被查询的实体的全局声誉。wherein the centralized reputation engine is operable to, in response to receiving a reputation query from one or more of the local reputation engines, provide the one or more of the local reputation engines with the queried entity global reputation. 36.如权利要求35所述的系统,其中所述汇聚引擎可操作来储存与分别的局部声誉引擎相关联的置信值,所述汇聚引擎进一步可操作来使用与所述多个局部声誉中的每一个相关联的所述置信值、通过其分别的局部声誉引擎,来汇聚所述多个局部声誉。36. The system of claim 35, wherein the aggregation engine is operable to store confidence values associated with respective local reputation engines, the aggregation engine is further operable to use the confidence values associated with the plurality of local reputations Each associated said confidence value aggregates said plurality of local reputations through its respective local reputation engine. 37.如权利要求36所述的系统,其中所述局部声誉系统是所述集中式声誉系统的子系统,并根据所述局部声誉引擎所接收的通信在局部规模上执行声誉评分,且所述集中式声誉引擎根据所述集中式声誉引擎所接收的通信和从所述局部声誉引擎接收的声誉信息来执行声誉评分。37. The system of claim 36, wherein the local reputation system is a subsystem of the centralized reputation system and performs reputation scoring on a local scale based on communications received by the local reputation engine, and the A centralized reputation engine performs reputation scoring based on communications received by the centralized reputation engine and reputation information received from the local reputation engines. 38.如权利要求36所述的系统,其中所述局部声誉在所述局部声誉的汇聚之前根据其分别的置信值而被加权。38. The system of claim 36, wherein the local reputations are weighted according to their respective confidence values prior to aggregation of the local reputations. 39.如权利要求38所述的系统,其中根据从所述多个局部声誉引擎接收的反馈来调节所述置信值。39. The system of claim 38, wherein the confidence value is adjusted based on feedback received from the plurality of local reputation engines. 40.如权利要求35所述的系统,其中所述局部声誉和全局声誉是识别其所相关联的分别的实体的特征的矢量。40. The system of claim 35, wherein the local reputation and the global reputation are vectors identifying characteristics of respective entities with which they are associated. 41.如权利要求40所述的系统,其中所述特征包括下述项中的一个或更多个:垃圾邮件特征、网络钓鱼特征、群发邮件特征、病毒源特征、合法通信特征、入侵特征、攻击特征、间谍软件特征,或地理位置特征。41. The system of claim 40, wherein the signatures include one or more of: spam signatures, phishing signatures, mass mailing signatures, virus source signatures, legitimate communication signatures, intrusion signatures, Attack signatures, spyware signatures, or geographic location signatures. 42.如权利要求35所述的系统,其中所述局部声誉基于声誉好的标准和声誉差的标准的汇聚。42. The system of claim 35, wherein the partial reputation is based on an aggregation of reputable criteria and unreputable criteria. 43.如权利要求35所述的系统,其中所述集中式声誉系统可操作来根据发起声誉查询的所述局部声誉引擎而对所述全局声誉应用局部声誉偏置。43. The system of claim 35, wherein the centralized reputation system is operable to apply a local reputation bias to the global reputation based on the local reputation engine originating a reputation query. 44.如权利要求43所述的系统,其中所述局部声誉偏置是基于从发起所述声誉查询的所述局部声誉引擎接收的输入的。44. The system of claim 43, wherein the local reputation bias is based on input received from the local reputation engine that originated the reputation query. 45.如权利要求43所述的系统,其中所述局部声誉偏置是基于从发起所述声誉查询的所述局部声誉引擎接收的反馈的。45. The system of claim 43, wherein the local reputation bias is based on feedback received from the local reputation engine that originated the reputation query. 46.如权利要求43所述的系统,其中所述局部声誉偏置可操作来根据所述局部声誉偏置增强声誉的某种标准,同时减少声誉的另一种标准。46. The system of claim 43, wherein the local reputation bias is operable to enhance a certain criterion of reputation while reducing another criterion of reputation according to the local reputation bias. 47.如权利要求35所述的系统,其中局部声誉引擎可操作来在将所述全局声誉应用于从被查询的所述实体接收的通信之前将局部声誉偏置应用于所述全局声誉。47. The system of claim 35, wherein a local reputation engine is operable to apply a local reputation bias to the global reputation prior to applying the global reputation to communications received from the entity being queried. 48.如权利要求35所述的系统,其中关于与所述局部声誉引擎相关联的被保护的企业网,所述局部声誉引擎响应于接收与外部实体相关联的通信而发起声誉查询。48. The system of claim 35, wherein the local reputation engine initiates a reputation query in response to receiving a communication associated with an external entity with respect to a secured enterprise network associated with the local reputation engine. 49.如权利要求48所述的系统,其中所述局部声誉引擎响应于与不确定的所述外部实体相关联的局部声誉而发起所述声誉查询。49. The system of claim 48, wherein the local reputation engine initiates the reputation query in response to a local reputation associated with the external entity being uncertain. 50.如权利要求35所述的系统,其中所述集中式声誉引擎进一步可操作来汇聚与所述多个实体中的一个或更多个相关联的多个身份的声誉。50. The system of claim 35, wherein the centralized reputation engine is further operable to aggregate reputations of a plurality of identities associated with one or more of the plurality of entities. 51.如权利要求50所述的系统,其中所述集中式声誉引擎进一步可操作来使关联的属性与不同的身份相关联,以识别所述身份之间的关系,并将与一个实体相关联的声誉的一部分分配给另一个实体的声誉,其中在实体之间识别关系。51. The system of claim 50, wherein the centralized reputation engine is further operable to associate associated attributes with different identities to identify relationships between the identities and to associate with an entity A portion of a reputation is assigned to another entity's reputation, where a relationship is identified between entities. 52.一种产生全局声誉的方法,包括以下步骤:52. A method of generating a global reputation comprising the steps of: 从请求的局部声誉引擎接收声誉查询;Receive reputation queries from the requesting local reputation engine; 取回多个局部声誉,所述局部声誉分别与多个局部声誉引擎相关联;retrieving a plurality of local reputations, the partial reputations being respectively associated with a plurality of local reputation engines; 汇聚所述多个局部声誉;aggregating the plurality of partial reputations; 从所述局部声誉的汇聚得到全局声誉;以及deriving a global reputation from the aggregation of said local reputations; and 以所述全局声誉响应所述声誉查询。Responding to the reputation query with the global reputation. 53.如权利要求52所述的方法,进一步包括取回与所述局部声誉引擎相关联的置信值,所述取回步骤使用所述置信值来得出所述全局声誉。53. The method of claim 52, further comprising retrieving a confidence value associated with the local reputation engine, the retrieving step using the confidence value to derive the global reputation. 54.如权利要求53所述的方法,其中所述得出步骤进一步包括使用所述全局声誉的分别的置信值来对所述全局声誉加权,并合并被加权的声誉以产生所述全局声誉。54. The method of claim 53, wherein the step of deriving further comprises weighting the global reputation using respective confidence values of the global reputation, and combining the weighted reputations to generate the global reputation. 55.如权利要求54所述的方法,进一步包括根据来自所述多个局部声誉引擎的反馈来调节所述置信值。55. The method of claim 54, further comprising adjusting the confidence value based on feedback from the plurality of local reputation engines. 56.如权利要求52所述的方法,其中所述局部声誉和全局声誉是识别其所相关联的分别的实体的特征的矢量。56. The method of claim 52, wherein the local reputation and global reputation are vectors identifying characteristics of respective entities with which they are associated. 57.如权利要求56所述的方法,其中所述特征包括下述项中的一个或更多个:垃圾邮件特征、网络钓鱼特征、群发邮件特征、间谍软件特征,或合法邮件特征。57. The method of claim 56, wherein the signatures include one or more of: spam signatures, phishing signatures, mass mailing signatures, spyware signatures, or legitimate email signatures. 58.如权利要求52所述的方法,其中所述局部声誉是基于声誉好的标准和声誉差的标准的汇聚的。58. The method of claim 52, wherein the partial reputation is based on an aggregation of reputable criteria and unreputable criteria. 59.如权利要求52所述的方法,进一步包括将局部声誉偏置应用于所述局部声誉的汇聚以产生全局声誉矢量,所述局部声誉偏置是基于所述请求的局部声誉引擎的。59. The method of claim 52, further comprising applying a local reputation bias to the aggregation of the local reputations to produce a global reputation vector, the local reputation bias being based on the requested local reputation engine. 60.如权利要求59所述的方法,其中所述局部声誉偏置是基于从所述请求的局部声誉引擎接收的输入的。60. The method of claim 59, wherein the local reputation bias is based on input received from the requested local reputation engine. 61.如权利要求59所述的方法,其中所述局部声誉偏置是基于从所述请求的局部声誉引擎接收的反馈的。61. The method of claim 59, wherein the local reputation bias is based on feedback received from the requesting local reputation engine. 62.如权利要求59所述的方法,进一步包括根据所述局部声誉偏置增强声誉的某种标准,并且根据所述局部声誉偏置减少声誉的另一种标准。62. The method of claim 59, further comprising enhancing a certain criterion of reputation based on said partial reputation bias and decreasing another criterion of reputation based on said partial reputation bias. 63.如权利要求52所述的方法,其中关于与所述请求的局部声誉引擎相关联的被保护的企业网,所述请求的局部声誉引擎响应于接收与外部实体相关联的通信而发起所述声誉查询。63. The method of claim 52, wherein the requesting local reputation engine initiates the Describe the reputation query. 64.如权利要求63所述的方法,其中所述请求的局部声誉引擎响应于与不确定的所述外部实体相关联的局部声誉而发起所述声誉查询。64. The method of claim 63, wherein the requesting local reputation engine initiates the reputation query in response to a local reputation associated with the external entity being uncertain. 65.如权利要求52所述的方法,其中得到所述全局声誉的所述步骤进一步基于所述多个局部声誉引擎中的任何一个都不能得到的公共信息和专用信息。65. The method of claim 52, wherein said step of deriving said global reputation is further based on public and private information not available to any of said plurality of local reputation engines. 66.具有软件程序代码的一个或更多个计算机可读介质,所述软件程序代码可操作来执行汇聚多个局部声誉矢量以产生全局声誉矢量的步骤,所述步骤包括:66. One or more computer readable media having software program code operable to perform the step of aggregating a plurality of local reputation vectors to produce a global reputation vector, the steps comprising: 从请求的局部声誉引擎接收声誉查询;Receive reputation queries from the requesting local reputation engine; 取回多个局部声誉,所述局部声誉分别与多个局部声誉引擎相关联;retrieving a plurality of local reputations, the partial reputations being respectively associated with a plurality of local reputation engines; 汇聚所述多个局部声誉;aggregating the plurality of partial reputations; 从所述局部声誉的汇聚得到全局声誉;以及deriving a global reputation from the aggregation of said local reputations; and 以所述全局声誉响应声誉查询。Reputation queries are responded to with the global reputation. 67.一种声誉系统,所述系统包括:67. A reputation system, the system comprising: 通信接口,其可操作来从中央服务器接收全局声誉信息,所述中央服务器可操作来根据从一个或更多个局部声誉引擎接收的反馈确定全局声誉,所述全局声誉分别与一个或更多个实体相关联;a communication interface operable to receive global reputation information from a central server operable to determine a global reputation based on feedback received from one or more local reputation engines, the global reputations being respectively associated with one or more entity association; 声誉引擎,其可操作来根据所定义的局部偏好而偏置从所述中央服务器接收的所述全局声誉;以及a reputation engine operable to bias the global reputation received from the central server according to defined local preferences; and 其中所述集中式声誉引擎可操作来响应于从所述通信接口接收声誉查询而向所述通信接口提供所查询的实体的全局声誉。Wherein the centralized reputation engine is operable to provide a global reputation of the queried entity to the communication interface in response to receiving a reputation query from the communication interface. 68.一种声誉系统,所述系统包括:68. A reputation system, the system comprising: 通信接口,其可操作来从一个或更多个分布式声誉引擎接收分布的声誉信息,所述分布式声誉引擎可操作来检查通信并得出与发起所述通信的一个或更多个实体相关联的声誉;a communication interface operable to receive distributed reputation information from one or more distributed reputation engines operable to examine communications and derive Union's reputation; 声誉模块,其可操作来汇聚所述分布的声誉信息并根据所述分布的声誉信息的汇聚得出全局声誉,所述声誉模块进一步可操作来根据所述声誉模块所接收的通信得出局部声誉信息;以及a reputation module operable to aggregate the distributed reputation information and derive a global reputation from the aggregation of the distributed reputation information, the reputation module further operable to derive a local reputation from communications received by the reputation module information; and 业务量控制模块,其可操作来根据所述全局声誉和所述局部声誉确定与通信相关联的处理。A traffic control module operable to determine handling associated with communications based on the global reputation and the local reputation. 69.一种基于声誉的网络安全系统,所述系统包括:69. A reputation-based network security system, the system comprising: 通信接口,其可操作来接收与网络相关联的进入的通信和传出的通信;a communication interface operable to receive incoming and outgoing communications associated with the network; 通信分析器,其可操作来得到与通信相关联的外部实体;a communication analyzer operable to obtain external entities associated with the communication; 声誉引擎,其可操作来得到与所述外部实体相关联的声誉矢量,所述声誉矢量包括以多个类别进行的声誉好的和声誉差的标准的汇聚,所述多个类别包括不同类型的通信;a reputation engine operable to obtain a reputation vector associated with the external entity, the reputation vector comprising an aggregation of reputable and unreputable criteria in a plurality of categories, the plurality of categories including different types of communication; 安全引擎,其可操作来接收所述声誉矢量并向多个询问引擎中的一个或更多个发送所述通信,其中所述安全引擎可操作来根据所述声誉矢量确定向所述多个询问引擎中的哪一个发送所述通信。a security engine operable to receive the reputation vector and send the communication to one or more of a plurality of challenge engines, wherein the security engine is operable to determine from the reputation vector to question the plurality of Which of the engines sends the communication. 70.如权利要求69所述的系统,其中所述安全引擎可操作来避免向未经授权的无用询问引擎发送所述通信,其中所述声誉矢量不指示所述外部实体具有参与所述未经授权的询问引擎所识别的活动的声誉。70. The system of claim 69, wherein the security engine is operable to avoid sending the communication to an unauthorized useless interrogation engine, wherein the reputation vector does not indicate that the external entity has involvement in the unauthorized The reputation of the activity identified by the authorized query engine. 71.如权利要求69所述的系统,其中所述一个或更多个询问引擎中的每一个包括所述询问引擎的多个实例。71. The system of claim 69, wherein each of the one or more query engines includes multiple instances of the query engine. 72.如权利要求71所述的系统,其中在选择询问引擎时,所述安全引擎能够选择所述询问引擎的选定实例,其中所述询问引擎的所述选定实例是根据所述询问引擎的所述选定实例的能力而被选择的。72. The system of claim 71 , wherein upon selection of a query engine, the security engine is capable of selecting a selected instance of the query engine, wherein the selected instance of the query engine is based on The capabilities of the selected instance are selected. 73.如权利要求69所述的系统,其中所述安全引擎可操作来在所述外部实体是声誉好的实体的情况下将高优先级分配给与所述多个询问引擎相关联的询问队列中的通信,并在所述外部实体是声誉差的实体的情况下将低优先级分配给所述询问队列中的通信。73. The system of claim 69, wherein the security engine is operable to assign high priority to query queues associated with the plurality of query engines if the external entity is a reputable entity and assigning low priority to communications in the query queue if the external entity is an entity with a poor reputation. 74.如权利要求73所述的系统,其中对声誉好的实体最大化服务质量,而对声誉差的实体最小化服务质量。74. The system of claim 73, wherein quality of service is maximized for entities with a good reputation and minimized for entities with a poor reputation. 75.如权利要求69所述的系统,其中所述一个或更多个询问引擎中的每一个包括所述询问引擎的多个实例,所述询问引擎的所述实例可操作来驻留在边缘保护设备或企业客户机设备上。75. The system of claim 69, wherein each of the one or more query engines comprises multiple instances of the query engine, the instances of the query engines operable to reside at an edge protection device or enterprise client device. 76.如权利要求69所述的系统,其中所述声誉引擎是可操作来向多个边缘保护设备或客户机设备提供声誉信息的声誉服务器。76. The system of claim 69, wherein the reputation engine is a reputation server operable to provide reputation information to a plurality of edge protection devices or client devices. 77.一种基于声誉的网络安全系统,所述系统包括:77. A reputation-based network security system, the system comprising: 通信接口,其可操作来接收与网络相关联的进入的和传出的通信;a communication interface operable to receive incoming and outgoing communications associated with the network; 通信分析器,其可操作来得到与通信相关联的外部实体;a communication analyzer operable to obtain external entities associated with the communication; 声誉引擎,其可操作来得到与所述外部实体相关联的声誉,所述声誉包括与所述外部实体相关联的声誉好的和声誉差的标准的汇聚;a reputation engine operable to obtain a reputation associated with said external entity, said reputation comprising an aggregation of reputable and reputable criteria associated with said external entity; 安全引擎,其可操作来给通信分配优先权信息,其中所述安全引擎可操作来接收所述声誉并在所述外部实体是声誉好的实体的情况下给通信分配高优先权,且在所述外部实体是声誉差的实体的情况下给通信分配低优先权,由此所述优先权信息被一个或更多个询问引擎使用来提高声誉好的实体的服务质量。a security engine operable to assign priority information to communications, wherein the security engine is operable to receive the reputation and assign a high priority to communications if the external entity is a reputable entity, and where the Low priority is assigned to communications where the external entity is an entity with a poor reputation, whereby the priority information is used by one or more query engines to improve quality of service for entities with a good reputation. 78.一种计算机实现的方法,其可操作来根据与外部实体相关联的声誉而有效地处理通信,所述方法包括以下步骤:78. A computer-implemented method operable to efficiently process communications based on a reputation associated with an external entity, the method comprising the steps of: 根据与所述通信相关联的发源或目的地信息来接收与外部实体相关联的通信;receiving a communication associated with an external entity based on origination or destination information associated with the communication; 识别与所接收的所述通信相关联的所述外部实体;identifying the external entity associated with the received communication; 根据与所述外部实体相关联的声誉好的和声誉差的标准得出与所述外部实体相关联的声誉;deriving a reputation associated with the external entity based on criteria of good reputation and bad reputation associated with the external entity; 根据与所述外部实体相关联的所得出的声誉向所述通信分配优先权;assigning priority to the communication based on the derived reputation associated with the external entity; 根据分配给所述通信的所述优先权对所述通信执行一个或更多个测试。One or more tests are performed on the communication according to the priority assigned to the communication. 79.如权利要求78所述的方法,进一步包括对于被分配了高优先权的消息最大化服务质量。79. The method of claim 78, further comprising maximizing quality of service for messages assigned high priority. 80.如权利要求78所述的方法,其中所得到的所述声誉是声誉矢量,所述声誉矢量以多个类别传递所述外部实体相关联的声誉。80. The method of claim 78, wherein the reputation obtained is a reputation vector conveying the reputation associated with the external entity in a plurality of categories. 81.如权利要求80所述的方法,进一步包括如果与所述通信相关联的所述声誉矢量指示所述外部实体关于被绕过的测试所测试的标准是声誉好的实体,则绕过所述一个或更多个测试中的任何一个。81. The method of claim 80, further comprising bypassing the external entity if the reputation vector associated with the communication indicates that the external entity is a reputable entity with respect to the criteria tested by the bypassed test. Any one of the one or more tests described above. 82.如权利要求78所述的方法,其中所述一个或更多个测试中的每一个包括可操作来执行所述一个或更多个测试的多个引擎。82. The method of claim 78, wherein each of the one or more tests includes a plurality of engines operable to perform the one or more tests. 83.如权利要求82所述的方法,其中所述安全引擎可操作来根据所述引擎的能力而均匀地在多个引擎上分配通信的测试,所述通信包括所接收的通信。83. The method of claim 82, wherein the security engine is operable to distribute testing of communications, including received communications, evenly across a plurality of engines according to capabilities of the engines. 84.如权利要求78所述的方法,其中所述一个或更多个测试由可操作来执行所述测试的多个引擎执行,所述引擎可操作来驻留在边缘保护设备或企业客户设备上。84. The method of claim 78, wherein the one or more tests are performed by a plurality of engines operable to perform the tests, the engines operable to reside on an edge protection device or an enterprise client device superior. 85.如权利要求78所述的方法,其中所述声誉从声誉服务器取回,所述声誉服务器可操作来向多个边缘保护设备和客户设备提供声誉信息。85. The method of claim 78, wherein the reputation is retrieved from a reputation server operable to provide reputation information to a plurality of edge protection devices and client devices. 86.如权利要求78所述的方法,其中所述声誉从局部声誉引擎取回。86. The method of claim 78, wherein the reputation is retrieved from a local reputation engine. 87.一种计算机实现的方法,其可操作来根据与外部实体相关联的声誉而有效地处理通信,所述方法包括:87. A computer-implemented method operable to efficiently process communications based on a reputation associated with an external entity, the method comprising: 根据与所述通信相关联的发源或目的地信息来接收与外部实体相关联的通信;receiving a communication associated with an external entity based on origination or destination information associated with the communication; 识别与所接收的超文本传输协议通信相关联的所述外部实体;identifying said external entity associated with the received hypertext transfer protocol communication; 根据与所述外部实体相关联的声誉好的和声誉差的标准得出与所述外部实体相关联的声誉;deriving a reputation associated with the external entity based on criteria of good reputation and bad reputation associated with the external entity; 将所述通信分配给从多个询问引擎中选择的一个或更多个询问引擎,所述一个或更多个询问引擎的选择是基于与所述外部实体相关联的所得出的声誉以及所述询问引擎的能力的;以及assigning the communication to one or more query engines selected from a plurality of query engines based on the derived reputation associated with the external entity and the that query the capabilities of the engine; and 对所述通信执行所述一个或更多个询问引擎。The one or more query engines are executed on the communication. 88.具有软件程序代码的一个或更多个计算机可读介质,所述软件程序代码可操作来根据与通信相关联的外部实体的声誉有效地处理所述通信,所述软件程序代码包括:88. One or more computer-readable media having software program code operable to efficiently process a communication based on the reputation of an external entity associated with the communication, the software program code comprising: 根据与所述通信相关联的发源或目的地信息来接收与外部实体相关联的通信;receiving a communication associated with an external entity based on origination or destination information associated with the communication; 识别与所接收的超文本传输协议通信相关联的所述外部实体;identifying said external entity associated with the received hypertext transfer protocol communication; 根据与所述外部实体相关联的声誉好的和声誉差的标准得到与所述外部实体相关联的声誉;deriving a reputation associated with the external entity based on criteria of good reputation and bad reputation associated with the external entity; 根据与所述外部实体相关联的所得到的声誉将优先权分配给所述通信;assigning priority to the communication based on the resulting reputation associated with the external entity; 根据分配给所述通信的所述优先权对所述通信执行一个或更多个测试。One or more tests are performed on the communication according to the priority assigned to the communication. 89.一种计算机实现的方法,其可操作来根据与外部实体相关联的声誉来处理通信,所述方法包括:89. A computer-implemented method operable to process communications based on a reputation associated with an external entity, the method comprising: 根据与所述通信相关联的发源或目的地信息来接收与外部实体相关联的通信;receiving a communication associated with an external entity based on origination or destination information associated with the communication; 识别与所接收的所述通信相关联的所述外部实体;identifying the external entity associated with the received communication; 根据与所述外部实体相关联的声誉好的和声誉差的标准得出与所述外部实体相关联的声誉;deriving a reputation associated with the external entity based on criteria of good reputation and bad reputation associated with the external entity; 根据与所述外部实体相关联的所得出的声誉向所述通信分配处理路径。A processing path is assigned to the communication based on the derived reputation associated with the external entity. 90.一种用于互联网协议语音电话通信的基于声誉的连接抑制系统,所述系统包括:90. A reputation-based connection suppression system for voice over internet protocol telephony communications, the system comprising: 通信接口,其可操作来在外部实体和与所述通信接口相关联的被保护网络之间建立连接之前,接收与所述外部实体相关联的互联网协议语音电话连接请求;a communication interface operable to receive a voice over internet protocol connection request associated with an external entity prior to establishing a connection between the external entity and a protected network associated with the communication interface; 声誉引擎,其可操作来得出与所述外部实体相关联的声誉;以及a reputation engine operable to derive a reputation associated with said external entity; and 连接控制引擎,其可操作来根据与所述互联网协议语音电话连接请求相关联的所述外部实体的所得出的声誉拒绝到所述被保护网络的所述互联网协议语音电话连接请求。A connection control engine operable to deny the voice over internet protocol connection request to the protected network based on the derived reputation of the external entity associated with the voice over internet protocol connection request. 91.如权利要求90所述的系统,其中所述声誉引擎根据与所述外部实体相关联的声誉好的标准和声誉差的标准的汇聚而得出所述外部实体的声誉。91. The system of claim 90, wherein the reputation engine derives the reputation of the external entity from an aggregation of reputable criteria and unreputable criteria associated with the external entity. 92.如权利要求90所述的系统,其中所述连接控制引擎防止声誉差的实体产生与所述被保护网络的连接。92. The system of claim 90, wherein the connection control engine prevents entities with a bad reputation from making connections to the protected network. 93.如权利要求92所述的系统,其中所述声誉差的实体可操作来试图将互联网协议语音电话通信发送到所述被保护网络,力图对不合法的活动产生与所述被保护网络的前文本互联网协议语音电话连接并利用所述前文本互联网协议语音电话连接。93. The system of claim 92, wherein said reputable entity is operable to attempt to send Voice over Internet Protocol telephony communications to said protected network in an attempt to create a conflict with said protected network for illegal activity. Pre-Voice-over-Text-Internet-Protocol connection and utilizing said Pre-Voice-over-Text-Internet-Protocol connection. 94.如权利要求90所述的系统,其中所述通信接口进一步可操作来接收短消息服务连接请求,且所述连接控制引擎可操作来根据与发起所述短消息服务连接请求的短消息服务实体相关联的声誉来拒绝所述短消息服务连接请求。94. The system as claimed in claim 90, wherein said communication interface is further operable to receive a short message service connection request, and said connection control engine is operable to communicate with the short message service that initiated the short message service connection request The reputation associated with the entity to reject the SMS connection request. 95.如权利要求90所述的系统,进一步包括消息询问引擎,所述消息询问引擎可操作来检查从所述外部实体发起的通信的内容,以确定所述外部实体是否使用互联网协议语音电话连接。95. The system of claim 90, further comprising a message query engine operable to examine the content of communications initiated from the external entity to determine whether the external entity uses a Voice over Internet Protocol telephony connection . 96.如权利要求90所述的系统,其中所述声誉引擎是声誉服务器,所述声誉服务器可操作来从所述连接控制引擎接收声誉查询并给所述连接控制引擎提供所得到的声誉。96. The system of claim 90, wherein the reputation engine is a reputation server operable to receive reputation queries from the connection control engine and provide the resulting reputation to the connection control engine. 97.如权利要求96所述的系统,其中所述声誉服务器通过汇聚与所述外部实体相关联的多个局部声誉来得到所述外部实体的所述声誉,所述多个局部声誉由多个局部声誉引擎提供。97. The system of claim 96, wherein the reputation server derives the reputation of the external entity by aggregating a plurality of partial reputations associated with the external entity, the plurality of partial reputations being determined by a plurality of Provided by the local reputation engine. 98.如权利要求90所述的系统,所述连接控制引擎包括策略,所述声誉与所述策略比较以确定是否允许所述互联网协议语音电话连接请求。98. The system of claim 90, the connection control engine to include a policy against which the reputation is compared to determine whether to allow the Voice over Internet Protocol telephony connection request. 99.如权利要求98所述的系统,所述策略定义外部实体的一个或更多个类别,到所述外部实体的互联网协议语音电话请求被允许。99. The system of claim 98, the policy defining one or more categories of external entities to which Voice over Internet Protocol telephony requests are allowed. 100.如权利要求90所述的系统,所述连接控制引擎可操作来对于从声誉差的外部实体接收的任何连接降低服务质量,并对于从声誉好的外部实体接收的任何连接最大化服务质量。100. The system of claim 90, the connection control engine operable to reduce quality of service for any connection received from an external entity with a poor reputation and to maximize quality of service for any connection received from an external entity with a good reputation . 101.如权利要求90所述的方法,进一步包括:接收多个同时的连接请求;关联所述同时的连接请求以确定所述请求包括攻击;以及更新与关联于所述同时的连接请求的一个或更多个实体相关联的声誉,以便引起所述多个连接请求的抑制。101. The method of claim 90, further comprising: receiving a plurality of simultaneous connection requests; correlating the simultaneous connection requests to determine that the requests comprise an attack; and updating a or more reputations associated with the entities to cause suppression of the plurality of connection requests. 102.如权利要求90所述的方法,进一步包括得到与所述外部相关联的声誉,所述声誉指示所述外部实体的参与拒绝服务攻击的声誉,其中参与拒绝服务攻击的声誉根据来自电话听筒的输入或策略触发所述连接控制引擎以立即抑制连接。102. The method of claim 90, further comprising deriving a reputation associated with the external, the reputation indicating the external entity's reputation for participating in a denial-of-service attack, wherein the reputation for participating in a denial-of-service attack is based on data from a telephone handset An input or policy triggers the connection control engine to immediately suppress connections. 103.如权利要求90所述的方法,其中请求到所述被保护网络上的设备的连接,所述设备包括移动的位置感知设备。103. The method of claim 90, wherein a connection is requested to a device on the protected network, the device comprising a mobile location aware device. 104.一种用于短消息通信的基于声誉的连接抑制系统,所述系统包括:104. A reputation-based connection suppression system for short message communication, the system comprising: 通信接口,其可操作来在所述外部实体和与所述通信接口相关联的被保护网络之间建立连接之前,接收与外部实体相关联的短消息服务连接请求;a communication interface operable to receive a short message service connection request associated with an external entity prior to establishing a connection between said external entity and a protected network associated with said communication interface; 声誉引擎,其可操作来得到与所述外部实体相关联的声誉;以及a reputation engine operable to obtain a reputation associated with said external entity; and 连接控制引擎,其可操作来根据与所述短消息服务连接请求相关联的得到的所述外部实体的声誉,拒绝到所述被保护网络的所述短消息服务连接请求。A connection control engine operable to deny the short message service connection request to the protected network based on the derived reputation of the external entity associated with the short message service connection request. 105.如权利要求104所述的系统,其中所述声誉引擎根据与所述外部实体相关联的声誉好的标准和声誉差的标准的汇聚,来得到所述外部实体的所述声誉。105. The system of claim 104, wherein the reputation engine derives the reputation of the external entity based on an aggregation of reputable criteria and unreputable criteria associated with the external entity. 106.如权利要求105所述的系统,其中所述连接控制引擎防止声誉差的实体产生与所述被保护网络的连接。106. The system of claim 105, wherein the connection control engine prevents entities with a bad reputation from making connections to the protected network. 107.如权利要求106所述的系统,其中所述声誉差的实体可操作来试图将短消息服务通信发送到所述被保护网络,力图对于不合法的活动产生与所述被保护网络的前文本短消息服务连接并利用所述前文本短消息服务连接。107. The system of claim 106, wherein said reputable entity is operable to attempt to send Short Message Service communications to said protected network in an attempt to create a prior relationship with said protected network for illegal activity. A text short message service connection and utilizes said previous text short message service connection. 108.如权利要求104所述的系统,进一步包括消息询问引擎,所述消息询问引擎可操作来检查从所述外部实体发起的通信的内容,以确定所述外部实体是否使用短消息服务连接。108. The system of claim 104, further comprising a message query engine operable to examine the content of communications initiated from the external entity to determine whether the external entity is connected using a Short Message Service. 109.如权利要求104所述的系统,其中所述声誉引擎是声誉服务器,所述声誉服务器可操作来从所述连接控制引擎接收声誉查询并给所述连接控制引擎提供所得到的声誉。109. The system of claim 104, wherein the reputation engine is a reputation server operable to receive reputation queries from the connection control engine and provide the resulting reputation to the connection control engine. 110.如权利要求109所述的系统,其中所述声誉服务器通过汇聚与所述外部实体相关联的多个局部声誉来得到所述外部实体的声誉,所述多个局部声誉由多个局部声誉引擎提供。110. The system of claim 109, wherein the reputation server derives the reputation of the external entity by aggregating a plurality of local reputations associated with the external entity, the plurality of partial reputations being composed of a plurality of local reputations engine provided. 111.如权利要求104所述的系统,其中所述连接控制引擎包括策略,所述声誉与所述策略比较以确定是否允许所述互联网协议语音电话连接请求。111. The system of claim 104, wherein the connection control engine includes a policy against which the reputation is compared to determine whether the voice over internet protocol connection request is allowed. 112.如权利要求111所述的系统,其中所述策略定义外部实体的一个或个多个类别,到所述外部实体的互联网协议语音电话请求被允许。112. The system of claim 111, wherein the policy defines one or more categories of external entities to which Voice over Internet Protocol telephony requests are allowed. 113.一种基于声誉的连接抑制的方法,包括以下步骤:113. A method of reputation-based connection suppression comprising the steps of: 接收互联网协议语音电话连接请求,所述互联网协议语音电话连接请求与外部实体有关;receiving a voice over internet protocol telephony connection request, the voice over internet protocol telephony connection request being related to an external entity; 查询声誉引擎以得到与所述外部实体相关联的声誉;querying a reputation engine for reputations associated with said external entity; 将所述声誉与相关联于被保护的企业网的策略进行比较;Comparing the reputation to policies associated with the protected corporate network; 根据确定与所述互联网协议语音电话连接请求有关的所述外部实体的所述声誉遵守所述策略,来允许所述连接请求。Allowing the connection request is based on determining that the reputation of the external entity related to the voice over internet protocol connection request complies with the policy. 根据确定与所述互联网协议语音电话连接请求有关的所述外部实体的所述声誉不遵守所述策略,来抑制所述连接请求。The connection request is suppressed based on a determination that the reputation of the external entity associated with the voice over internet protocol connection request does not comply with the policy. 114.一种基于声誉的连接抑制的方法,包括以下步骤:114. A method of reputation-based connection suppression comprising the steps of: 接收连接请求,所述连接请求请求外部实体和被保护的企业网之间的连接;receiving a connection request requesting a connection between an external entity and the protected enterprise network; 查询声誉引擎以得到与所述外部实体相关联的声誉,所述声誉包括与所述外部实体相关联的声誉好的和声誉差的标准的汇聚;querying a reputation engine for a reputation associated with the external entity, the reputation comprising an aggregation of reputable and reputable criteria associated with the external entity; 将所述声誉与相关联于所述被保护的企业网的策略进行比较;comparing the reputation to policies associated with the protected corporate network; 根据确定与所述互联网协议语音电话连接请求有关的所述外部实体的所述声誉遵守所述策略,来允许所述连接请求。Allowing the connection request is based on determining that the reputation of the external entity related to the voice over internet protocol connection request complies with the policy. 根据确定与所述互联网协议语音电话连接请求有关的所述外部实体的所述声誉不遵守所述策略,来抑制所述连接请求。The connection request is suppressed based on a determination that the reputation of the external entity associated with the voice over internet protocol connection request does not comply with the policy. 115.一种基于声誉的防火墙,包括:115. A reputation based firewall comprising: 防火墙,其可操作来接收被送往被保护网络的数据分组并根据与所述被保护网络相关联的安全策略来确定所述数据分组的处理,所述安全策略包括基于与所述数据分组相关联的外部实体的声誉的至少一个规则;a firewall operable to receive a data packet destined for a protected network and determine the handling of the data packet in accordance with a security policy associated with the protected network, the security policy including at least one rule on the reputation of an associated external entity; 声誉引擎,其可操作来确定与所述数据分组相关联的所述外部实体,并根据所述外部实体的确定向所述防火墙提供声誉;以及a reputation engine operable to determine the external entity associated with the data packet and provide a reputation to the firewall based on the determination of the external entity; and 其中处理步骤包括允许所述数据分组进入到所述被保护网络或拒绝所述数据分组进入到所述被保护网络。The processing step includes allowing the data packet to enter the protected network or denying the data packet to enter the protected network. 116.一种系统,包括:116. A system comprising: 安全控制接口,其可操作来产生多个安全控制表示,所述多个安全控制表示中的每一个可操作来控制与被保护实体相关联的多个安全设置;以及a security control interface operable to generate a plurality of security control representations, each of the plurality of security control representations operable to control a plurality of security settings associated with the protected entity; and 策略控制接口,其可操作来产生多个策略控制表示,所述多个策略控制表示中的每一个可操作来控制与被保护实体相关联的多个策略设置;a policy control interface operable to generate a plurality of policy control representations, each of the plurality of policy control representations operable to control a plurality of policy settings associated with the protected entity; 过滤模块,其可操作来根据所述多个安全设置并根据所述多个策略设置来过滤一个或更多个通信流。A filtering module operable to filter one or more communication flows according to the plurality of security settings and according to the plurality of policy settings. 117.如权利要求116所述的系统,其中所述安全控制表示包括在多个安全类别中的多个安全滑块表示,所述安全滑块表示可操作来控制与所述被保护网络相关联的所述安全设置。117. The system of claim 116, wherein the security control representations include a plurality of security slider representations in a plurality of security categories, the security slider representations operable to control of the security settings. 118.如权利要求117所述的系统,其中所述多个安全类别包括病毒类别、网络钓鱼类别、蠕虫类别或特洛伊木马类别中的两个或更多个。118. The system of claim 117, wherein the plurality of security categories include two or more of a virus category, a phishing category, a worm category, or a Trojan horse category. 119.如权利要求118所述的系统,其中所述多个安全控制表示每一个都可操作来对于所述安全设置中相关联的一个安全设置调节阈灵敏度。119. The system of claim 118, wherein the plurality of security control representations are each operable to adjust threshold sensitivity for an associated one of the security settings. 120.如权利要求119所述的系统,其中所述阈灵敏度包括通信流特征和与所述安全类别相关联的特征之间的相似性水平。120. The system of claim 119, wherein the threshold sensitivity includes a level of similarity between communication flow characteristics and characteristics associated with the security category. 121.如权利要求117所述的系统,其中所述策略控制表示包括在多个策略类别中的多个策略滑块表示,所述策略滑块表示可操作来控制与所述被保护网络相关联的所述策略设置。121. The system of claim 117, wherein the policy control representations include a plurality of policy slider representations in a plurality of policy categories, the policy slider representations operable to control The policy setting for the . 122.如权利要求121所述的系统,其中所述多个策略类别包括垃圾邮件类别、内容类别、间谍软件类别或群发邮件类别中的两个或更多个。122. The system of claim 121, wherein the plurality of policy categories includes two or more of a spam category, a content category, a spyware category, or a mass mailing category. 123.如权利要求122所述的系统,其中所述多个策略控制表示每一个都可操作来对于所述策略设置中相关联的一个策略设置调节阈灵敏度。123. The system of claim 122, wherein the plurality of policy control representations are each operable to adjust threshold sensitivity for an associated one of the policy settings. 124.如权利要求123所述的系统,其中所述阈灵敏度包括通信流特征和与所述策略类别相关联的特征之间的相似性水平。124. The system of claim 123, wherein the threshold sensitivity includes a level of similarity between communication flow characteristics and characteristics associated with the policy category. 125.如权利要求116所述的系统,其中所述被保护实体是计算设备、通信设备、移动设备,或网络中之一。125. The system of claim 116, wherein the protected entity is one of a computing device, a communication device, a mobile device, or a network. 126.如权利要求116所述的系统,其中所述安全控制接口和所述策略控制接口由管理员控制。126. The system of claim 116, wherein the security control interface and the policy control interface are controlled by an administrator. 127.如权利要求41所述的系统,其中所述安全控制接口和所述策略控制接口由终端用户控制。127. The system of claim 41, wherein the security control interface and the policy control interface are controlled by an end user. 128.如权利要求127所述的系统,其中所述安全控制接口包括与所述多个安全控制表示相关联的多个范围,所述安全控制设置可操作来在所述范围内被调节。128. The system of claim 127, wherein the security control interface includes a plurality of ranges associated with the plurality of security control representations, the security control setting being operable to be adjusted within the ranges. 129.一种计算机实现的方法,包括:129. A computer implemented method comprising: 从管理员接收多个范围;Receive multiple ranges from the admin; 向用户提供安全控制接口,所述安全控制接口包括与安全控制相关联的多个安全控制表示,每个安全控制机制包括来自所述多个范围中的相关联的范围,所述相关联的范围限定与分别的安全控制相关联的最小设置和最大设置;providing a user with a security control interface comprising a plurality of security control representations associated with a security control, each security control mechanism comprising an associated scope from among the plurality of scopes, the associated scope defining minimum and maximum settings associated with respective security controls; 通过所述安全控制接口从所述用户接收多个安全控制设置;receiving a plurality of security control settings from the user via the security control interface; 调节与从所述用户接收的多个控制设置有关的多个阈值,所述多个阈值与可能的违反安全的类别的容忍度相关联;以及adjusting a plurality of thresholds associated with a plurality of control settings received from the user, the plurality of thresholds being associated with tolerances for categories of possible security breaches; and 根据所述多个阈值过滤来自与所述用户相关联的被保护实体的通信流。Communication flows from protected entities associated with the user are filtered according to the plurality of thresholds. 130.如权利要求129所述的系统,其中所述安全控制表示包括在多个安全类别中的多个安全滑块表示,所述安全滑块表示可操作来控制与所述被保护网络相关联的所述安全设置。130. The system of claim 129, wherein the security control representations include a plurality of security slider representations in a plurality of security categories, the security slider representations operable to control of the security settings. 131.如权利要求130所述的系统,其中所述多个安全类别包括病毒类别、网络钓鱼类别、蠕虫类别、特洛伊木马类别、垃圾邮件类别、内容类别、间谍软件类别或群发邮件类别中的两个或更多个。131. The system of claim 130, wherein the plurality of security categories include two of a virus category, a phishing category, a worm category, a Trojan horse category, a spam category, a content category, a spyware category, or a mass mailing category. or more. 132.如权利要求131所述的系统,其中所述多个安全控制表示每一个都可操作来对于所述安全设置中相关联的一个安全设置调节阈灵敏度。132. The system of claim 131, wherein the plurality of security control representations are each operable to adjust threshold sensitivity for an associated one of the security settings. 133.如权利要求132所述的系统,其中所述阈灵敏度包括通信流特征和与所述安全类别相关联的特征之间的相似性水平。133. The system of claim 132, wherein the threshold sensitivity includes a level of similarity between communication flow characteristics and characteristics associated with the security category. 134.如权利要求129所述的系统,其中所述被保护实体是计算设备、通信设备、移动设备或网络中之一。134. The system of claim 129, wherein the protected entity is one of a computing device, a communication device, a mobile device, or a network. 135.具有软件程序代码的一个或更多个计算机可读介质,所述软件程序代码可操作来实现对进入和传出的通信流的过滤调节,所述软件程序代码包括:135. One or more computer-readable media having software program code operable to effectuate filtering conditioning of incoming and outgoing communication streams, the software program code comprising: 从管理员接收多个范围;Receive multiple ranges from the admin; 向用户提供安全控制接口,所述安全控制接口包括与多个安全控制设置相关联的多个安全控制表示,每个安全控制机制包括来自所述多个范围中的相关联的范围,所述相关联的范围限定与分别的安全控制相关联的最小设置和最大设置;providing a user with a security control interface comprising a plurality of security control representations associated with a plurality of security control settings, each security control mechanism comprising an associated scope from the plurality of scopes, the associated Associated scopes define minimum and maximum settings associated with respective security controls; 通过所述安全控制接口从所述用户接收输入,所述输入要求所述多个安全控制设置的调节;receiving input from the user through the security control interface, the input requiring adjustment of the plurality of security control settings; 调节与从所述用户接收的多个控制设置有关的多个阈值,所述多个阈值与可能的违反安全的类别的容忍度相关联;以及adjusting a plurality of thresholds associated with a plurality of control settings received from the user, the plurality of thresholds being associated with tolerances for categories of possible security breaches; and 根据所述多个阈值过滤来自与所述用户相关联的被保护实体的通信流。Communication flows from protected entities associated with the user are filtered according to the plurality of thresholds.
CN200880009672A 2007-01-24 2008-01-24 Network reputation scoring Pending CN101730892A (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US11/626,644 2007-01-24
US11/626,620 US7779156B2 (en) 2007-01-24 2007-01-24 Reputation based load balancing
US11/626,644 US8179798B2 (en) 2007-01-24 2007-01-24 Reputation based connection throttling
US11/626,479 2007-01-24
US11/626,470 2007-01-24
US11/626,470 US8561167B2 (en) 2002-03-08 2007-01-24 Web reputation scoring
US11/626,479 US7937480B2 (en) 2005-06-02 2007-01-24 Aggregation of reputation data
US11/626,620 2007-01-24
PCT/US2008/051865 WO2008091980A1 (en) 2007-01-24 2008-01-24 Web reputation scoring

Publications (1)

Publication Number Publication Date
CN101730892A true CN101730892A (en) 2010-06-09

Family

ID=39644880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200880009672A Pending CN101730892A (en) 2007-01-24 2008-01-24 Network reputation scoring

Country Status (4)

Country Link
EP (1) EP2115642A4 (en)
CN (1) CN101730892A (en)
AU (1) AU2008207924B2 (en)
WO (1) WO2008091980A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685200A (en) * 2011-02-17 2012-09-19 微软公司 Managing unwanted communications using template generation and fingerprint comparison features
US8549611B2 (en) 2002-03-08 2013-10-01 Mcafee, Inc. Systems and methods for classification of messaging entities
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US8589503B2 (en) 2008-04-04 2013-11-19 Mcafee, Inc. Prioritizing network traffic
US8621559B2 (en) 2007-11-06 2013-12-31 Mcafee, Inc. Adjusting filter or classification control settings
US8621638B2 (en) 2010-05-14 2013-12-31 Mcafee, Inc. Systems and methods for classification of messaging entities
US8635690B2 (en) 2004-11-05 2014-01-21 Mcafee, Inc. Reputation based message processing
CN103559413A (en) * 2013-11-15 2014-02-05 北京搜房科技发展有限公司 Data processing method and device
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US8762537B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Multi-dimensional reputation scoring
CN106716508A (en) * 2014-09-26 2017-05-24 迈克菲股份有限公司 Context-aware reputation of a place
CN107241280A (en) * 2016-03-28 2017-10-10 瞻博网络公司 Dynamic prioritization of reputation-based network traffic
CN108876270A (en) * 2018-09-19 2018-11-23 惠龙易通国际物流股份有限公司 Automatic source of goods auditing system and method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10938844B2 (en) 2016-07-22 2021-03-02 At&T Intellectual Property I, L.P. Providing security through characterizing mobile traffic by domain names

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004061703A1 (en) * 2002-12-23 2004-07-22 Microsoft Corporation Reputation system for web services
US20060015942A1 (en) * 2002-03-08 2006-01-19 Ciphertrust, Inc. Systems and methods for classification of messaging entities
US20060095404A1 (en) * 2004-10-29 2006-05-04 The Go Daddy Group, Inc Presenting search engine results based on domain name related reputation

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040177120A1 (en) * 2003-03-07 2004-09-09 Kirsch Steven T. Method for filtering e-mail messages
US20060155553A1 (en) * 2004-12-30 2006-07-13 Brohman Carole G Risk management methods and systems
US7912192B2 (en) * 2005-02-15 2011-03-22 At&T Intellectual Property Ii, L.P. Arrangement for managing voice over IP (VoIP) telephone calls, especially unsolicited or unwanted calls
WO2006094271A2 (en) * 2005-03-02 2006-09-08 Markmonitor, Inc. Distribution of trust data
US7822620B2 (en) * 2005-05-03 2010-10-26 Mcafee, Inc. Determining website reputations using automatic testing
US20060277259A1 (en) * 2005-06-07 2006-12-07 Microsoft Corporation Distributed sender reputations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060015942A1 (en) * 2002-03-08 2006-01-19 Ciphertrust, Inc. Systems and methods for classification of messaging entities
WO2004061703A1 (en) * 2002-12-23 2004-07-22 Microsoft Corporation Reputation system for web services
US20060095404A1 (en) * 2004-10-29 2006-05-04 The Go Daddy Group, Inc Presenting search engine results based on domain name related reputation

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549611B2 (en) 2002-03-08 2013-10-01 Mcafee, Inc. Systems and methods for classification of messaging entities
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US8635690B2 (en) 2004-11-05 2014-01-21 Mcafee, Inc. Reputation based message processing
US8763114B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Detecting image spam
US10050917B2 (en) 2007-01-24 2018-08-14 Mcafee, Llc Multi-dimensional reputation scoring
US9544272B2 (en) 2007-01-24 2017-01-10 Intel Corporation Detecting image spam
US9009321B2 (en) 2007-01-24 2015-04-14 Mcafee, Inc. Multi-dimensional reputation scoring
US8762537B2 (en) 2007-01-24 2014-06-24 Mcafee, Inc. Multi-dimensional reputation scoring
US8621559B2 (en) 2007-11-06 2013-12-31 Mcafee, Inc. Adjusting filter or classification control settings
US8606910B2 (en) 2008-04-04 2013-12-10 Mcafee, Inc. Prioritizing network traffic
US8589503B2 (en) 2008-04-04 2013-11-19 Mcafee, Inc. Prioritizing network traffic
US8621638B2 (en) 2010-05-14 2013-12-31 Mcafee, Inc. Systems and methods for classification of messaging entities
CN102685200A (en) * 2011-02-17 2012-09-19 微软公司 Managing unwanted communications using template generation and fingerprint comparison features
CN103559413A (en) * 2013-11-15 2014-02-05 北京搜房科技发展有限公司 Data processing method and device
CN103559413B (en) * 2013-11-15 2016-11-02 北京搜房科技发展有限公司 A kind of data processing method and device
CN106716508A (en) * 2014-09-26 2017-05-24 迈克菲股份有限公司 Context-aware reputation of a place
CN106716508B (en) * 2014-09-26 2019-07-09 迈克菲有限公司 The context aware reputation in place
US11397761B2 (en) 2014-09-26 2022-07-26 Mcafee, Llc Context-aware reputation of a place
CN107241280A (en) * 2016-03-28 2017-10-10 瞻博网络公司 Dynamic prioritization of reputation-based network traffic
CN108876270A (en) * 2018-09-19 2018-11-23 惠龙易通国际物流股份有限公司 Automatic source of goods auditing system and method
CN108876270B (en) * 2018-09-19 2022-08-12 惠龙易通国际物流股份有限公司 Automatic goods source auditing system and method

Also Published As

Publication number Publication date
AU2008207924B2 (en) 2012-09-27
EP2115642A1 (en) 2009-11-11
WO2008091980A1 (en) 2008-07-31
AU2008207924A1 (en) 2008-07-31
EP2115642A4 (en) 2014-02-26

Similar Documents

Publication Publication Date Title
CN101730904B (en) Correlation and analysis of entity attributes
CN101730903B (en) Multidimensional reputation scoring
US7779156B2 (en) Reputation based load balancing
US9544272B2 (en) Detecting image spam
US7937480B2 (en) Aggregation of reputation data
US8179798B2 (en) Reputation based connection throttling
US8561167B2 (en) Web reputation scoring
AU2008207924B2 (en) Web reputation scoring
US9215241B2 (en) Reputation-based threat protection
US20120174219A1 (en) Identifying mobile device reputations
US20110280160A1 (en) VoIP Caller Reputation System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100609